CVE-2019-14287

Difficulty: Easy
2024-08-01 by Rashad Aliyev

CVE-2019-14287 Virtual Machine Escalate Privilege Using CVE-2019-14287 Vulnerability.

Start a virtual machine (VM) in VirtualBox, launch the VirtualBox application and select the desired VM from the list on the left. Click the Start button to power on the VM. As the VM boots up, the assigned IP address will be displayed on the server screen within the VM. This IP address is essential for network connectivity and can be used to access the VM remotely or to configure network-related settings.

SSH to server port 22
user: cve2019
password is: cve2019

Escalate Privilege Using CVE-2019-14287 Vulnerability.
Find the flag from the file located at /root/flag.txt

Command:
cat /root/flag.txt

Configuration

Open VirtualBox and in the VirtualBox Manager, navigate to the File menu at the top left corner and select Import Appliance.... In the Appliance to Import window, click the folder icon to choose a virtual appliance file to import. Browse to the location of your .ova file, select it, and click Open.

Review the Appliance Settings window that appears. Here, you can review and change the settings if necessary, such as the name of the virtual machine, CPU count, and memory allocation. Once you are satisfied with the settings, click Next and then Import to begin the import process. VirtualBox will start importing the .ova file, and this process may take a few minutes depending on the size of the .ova file and your system's performance. Once the import is complete, your virtual machine will be ready to use.

Network
DHCP: Enabled
IP Address Assignment: Automatically assigned (visible upon server startup)

Files

Open Virtual Appliance (OVA) package.