Information
Room
- Name: Ignite
- Profile: tryhackme.com
- Difficulty: Easy
- Description: A new start-up has a few issues with their web server.
Write-up
Overview
Install tools used in this WU on BlackArch Linux:
Network enumeration
Web exploitation
Browsing http://10.10.1.243/ we can see this is FUEL CMS 1.4.
I created a Ruby exploit.
Let's create a web shell:
Start a web server:
Then download and execute it.
Stop the web server and start a reverse shell listener:
Then launch a reverse shell from weevely webshell:
Then upgrade our shell:
Grab user flag:
Flag: 6470e394cbf6dab6a91682cc8585059b
Elevation of Privilege
Let's try to find password in the application source code:
fuel/application/config/database.php
looks promising.
Then mysql and the system account share the same password:
Flag: b9bbcb33e11b80be759c4e844862482d