Maria
Enumeration
21/tcp open ftp vsftpd 3.0.3
| ftp-anon: Anonymous FTP login allowed (FTP code 230)
|_drwxr-xr-x 5 0 0 4096 Sep 21 2018 automysqlbackup
80/tcp open http Apache httpd 2.4.38 ((Debian))
|_http-generator: WordPress 5.7.1
| http-methods:
|_ Supported Methods: GET HEAD POST OPTIONS
|_http-server-header: Apache/2.4.38 (Debian)
|_http-title: Maria
3306/tcp open mysql MySQL 5.5.5-10.3.27-MariaDB-0+deb10u1
| mysql-info:
| Protocol: 10
| Version: 5.5.5-10.3.27-MariaDB-0+deb10u1$ wpscan --url http://192.168.153.167/ --api-token [REDACTED]
[+] WordPress version 5.7.1 identified
[I] duplicator v1.3.26
[I] easy-wp-smtp v1.4.1$ searchsploit wordpress easy wp smtp
Unpatched WordPress Easy WP SMTP installs version 1.4.2 or earlier. - Sensitive Data Exposure
$ searchsploit wordpress duplicator
Wordpress Plugin Duplicator 1.3.26 - Unauthentica | php/webapps/49288.rb
Exploit: Wordpress Plugin Duplicator 1.3.26 - Unauthenticated Arbitrary File Read (Metasploit)https://www.howtoforge.com/creating-mysql-backups-with-automysqlbackup-on-ubuntu-9.10
I could not crack the password with rockyou.
With the other exploit, we can use mysql to identfiy the log file to get admin reset link.
Wordpress -> Forgot password -> admin
Open the link, reset the admin password. Then login with new password.
Initial Access
Plugins -> Add New -> Upload Plugin -> Browse -> plugin-shell.zip -> Install Now
PrivEsc
Last updated