← Writeups
MediumLinuxHackTheBoxACTIVECVE-2023-43208

Interpreter — HackTheBox Writeup (Linux, Medium)

CVE-2023-43208 gives unauthenticated RCE on Mirth Connect 4.4.0 via Java deserialization. DB credentials lead to a PBKDF2 hash crack for SSH as sedric, then an SSTI in a Flask notif service running as root closes the chain.

2026-03-21

// Attack Chain

CVE-2023-43208 RCE → mirth → DB creds (mirth.properties) → PBKDF2 crack → sedric → HL7 MLLP → SSTI in notif.py → Root

Attack Chain Summary

CODE
CVE-2023-43208 (RCE) → mirth shell
        ↓
DB creds in mirth.properties → PBKDF2 hash extraction
        ↓
Python cracker → SSH as sedric
        ↓
HL7 MLLP channel analysis → SSTI in notif.py → root shell

Date: March 21, 2026 | Difficulty: Medium | OS: Linux


1. Reconnaissance

Port Scanning

I started with a full port scan using RustScan followed by Nmap for service detection.

BASH
rustscan -a 10.129.244.184 -r 1-65535
nmap -sC -sV 10.129.244.184 -p22,80,443 -Pn

The initial Nmap scan without -Pn showed the host as down because the target was blocking ICMP ping probes. Adding -Pn forced Nmap to skip host discovery and scan directly, revealing the open ports.

Open ports:

  • 22 — SSH
  • 80 — HTTP
  • 443 — HTTPS

Web Enumeration

Visiting port 80 via curl revealed a Mirth Connect Administrator login page — a Java-based healthcare integration engine by NextGen Healthcare.

I downloaded the webstart.jnlp file from the target and inspected it:

BASH
head webstart.jnlp

This confirmed the version:

CODE
<jnlp codebase="https://10.129.244.184:443" version="4.4.0">

I also verified the version directly via the Mirth REST API. The first attempt failed because I forgot the required header:

BASH
# Failed — missing required header
curl https://10.129.244.184/api/server/version -k
# HTTP ERROR 400: All requests must have 'X-Requested-With' header

# Correct request
curl -k -H 'X-Requested-With: OpenAPI' https://10.129.244.184:443/api/server/version
# Response: 4.4.0

Mirth Connect 4.4.0 is vulnerable to CVE-2023-43208.


🔒

Machine Still Active

This machine is currently live on HackTheBox. The full writeup unlocks automatically once it retires.

Preview ends before: 2. Initial Access — CVE-2023-43208 (RCE)

← Back to writeups