Reconnaissance

Host Setup

Add the machine to /etc/hosts for hostname resolution:

echo "10.129.17.5  devarea.htb" | sudo tee -a /etc/hosts

Port Scan

nmap -sS -sV 10.129.17.5

Results:

Port

Service

Version / Notes

21

FTP

vsftpd 3.0.5

22

SSH

OpenSSH 9.6p1 Ubuntu

80

HTTP

Apache httpd 2.4.58 - static frontend

8080

HTTP

Jetty 9.4.27 - Apache CXF SOAP service

8500

HTTP Proxy

Hoverfly forward proxy

8888

HTTP API

Hoverfly admin API (Go HTTP server)

The interesting attack surface is port 8080 (Apache CXF - known vulnerable to CVE-2022-46364) and ports 8500/8888 (Hoverfly proxy and admin interface).

Foothold

CVE-2022-46364 - Apache CXF MTOM Local File Inclusion

What is this vulnerability?

Apache CXF supports MTOM (Message Transmission Optimization Mechanism), a SOAP extension for transmitting binary data efficiently. When MTOM is enabled, the xop:Include element can reference external URIs - including file:// paths. An unauthenticated attacker can inject this element into any SOAP string parameter, causing the server to read the referenced file and return its contents base64-encoded in the SOAP response. This effectively gives arbitrary file read on the server without any authentication.

Step 1 - Confirming the SOAP Endpoint

First, probe port 8080 to confirm the service is live:

curl http://devarea.htb:8080/employeeservice

Response:

<soap:Envelope xmlns:soap="...">
  <soap:Body>
    <soap:Fault>
      <faultcode>soap:Server</faultcode>
      <faultstring>No binding operation info while invoking unknown method...</faultstring>
    </soap:Fault>
  </soap:Body>
</soap:Envelope>

A SOAP fault confirms the endpoint is active. Next, retrieve the WSDL to understand the service structure:

curl http://devarea.htb:8080/employeeservice?wsdl

Key information extracted from WSDL:

  • Operation: submitReport

  • Namespace: http://devarea.htb/

  • Vulnerable parameter: content (type xs:string) - this is where we inject xop:Include

🔐 PREMIUM WRITEUP - MEMBERSHIP REQUIRED

This machine is still active in HTB, so the full walkthrough, exploitation path, and flags cannot be publicly released.

But you can access the entire premium writeup right now.

🌟 Get Instant Access

Unlock the complete step-by-step solution, techniques used, notes, and exclusive insights by becoming a member.

Why Go Premium?

  • Early access to full detailed writeups

  • Passwords for active CTF solutions

  • Advanced exploitation techniques

Upgrade once - unlock everything instantly.

Keep hacking, keep learning, keep winning. 🎯

Keep Reading