toc2 (cms made simple 2.1.6 exploit + linux .c program race condition)
https://github.com/sroettger/35c3ctf_chals/blob/master/logrotate/exploit/rename.c
Services
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 7.6p1 Ubuntu 4ubuntu0.3 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey:
| 2048 84:4e:b1:49:31:22:94:84:83:97:91:72:cb:23:33:36 (RSA)
| 256 cc:32:19:3f:f5:b9:a4:d5:ac:32:0f:6e:f0:83:35:71 (ECDSA)
|_ 256 bd:d8:00:be:49:b5:15:af:bf:d5:85:f7:3a:ab:d6:48 (ED25519)
80/tcp open http Apache httpd 2.4.29 ((Ubuntu))
| http-robots.txt: 1 disallowed entry
|_/cmsms/cmsms-2.1.6-install.php
|_http-server-header: Apache/2.4.29 (Ubuntu)
|_http-title: Site Maintenance
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernelCMS information
CMS Made Simple / Reverse Shell
User flag
Escalate your privileges and acquire root.txt
Lateral move (www-data -> frank)
The readcreds binary
Race condition
Root flag
PreviousWWBuddy (SQLi new way + php cmd injection + USER env var privesc)NextVulnNet Active (Windows Redis + SMB scheduled job + SharpGPOAbuse)
Last updated