Lazy Admin
Last updated
Was this helpful?
Last updated
Was this helpful?
Covers:
Service Discovery
Finding Vulnerabilities
Exploitation
Privilege Escalation
IP: 10.10.209.190
Using nmap
Services Discovered
SSH
22
OpenSSH 7.2p2
HTTP
80
Apache httpd 2.4.18
Finding Directories on HTTP server using GoBuster
Directories Discovered:
/content
On visiting /content page, the server's using Basic CMS with Sweet Rice installed
manager
42f749ade7f9e195bf475f37a44cafcb
Passwordxxx
we don't know login page yet!
Moving to parent directory /content/inc/
, we get access to all the files , from where we get Sweet Rice version /content/inc/lastest.txt
which is 1.5.1
On reading the exploit, we get the admin page link as /as
but admin page is different which is /content/as
Visit /content/as
with the admin credentials above
We can add custom php code from ADS tab
TL;DR;
Sweet Rice
Sweet Rice 1.5.1
Create an evil reverse shell adversitement
Start listener using netcat
From content/inc/ads/
we can execute the uploaded reverse shell
We have access to the shell
We can run perl and /home/itguy/backup.pl as root
Finding Escalation Vectors
We can run perl and /home/itguy/backup.pl as root
Victim's shell
Root Shell on Attacker's machine
User Flag
Root Flag
From 1st vulnerability, after visting /content/inc/mysql_backup/
link we get SQL database file, from where we get username and password hash, which can be easily cracked online using various tools such as
On Searching for Sweet Rice 1.5.1 vulnerabilities
on Search Engine, it leads to
Using PentestMonkey , we can get access to shell, by chaning ip
variable to our attacker's vpn ip, and then upload