pentestmedium
Interpreter (Mirth Connect → f-string Injection)
hackthebox
Task: HackTheBox machine with Mirth Connect 4.4.0 healthcare integration engine. Solution: CVE-2023-43208 XStream deserialization for initial RCE as mirth user, then privilege escalation via Python f-string double eval injection in internal Flask service running as root, using chr() encoding to bypass regex filter.
$ ls tags/ techniques/
flaskrcedeserializationinternal_servicepython_evalchr_encodingprivescmirth_connectcve-2023-43208xstreamfstring_injectionhl7healthcareregex_bypass
xstream_deserialization_rcefstring_double_evalchr_bypass_regexbase64_command_exfiltrationwget_post_file_exfilinternal_service_abusexml_injection_to_eval
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Create a free account with GitHub, then upgrade to Pro.
$ssh [email protected]