This lab look involves gathering data and locating a flag
First thing I’m going to do is scan the machine and see what available ports are open
We located a few juicy open ports (ftp/http/ssh)
Seems to be running an apache service on port 80
Next Im going to run Gobuster against this machine
navigating to /simple we are presented with CMS
Bottom of the page states “This site is powered by CMS Made Simple version 2.2.8”
CVE we are going to utilize is CVE-2019-9053
https://www.exploit-db.com/exploits/46635
Downloaded the exploit and attempted to run it
Looks like we’ll need some arguments with it
Troubleshooting for some time I was able to narrow down that python2 is required for this work properly.
Then ran into an issue where “requests” was needed, so I installed with command sudo apt-get install python-requests
It then required a module called termcolor using sudo apt-get install python-termcolor
Ran it again and boom!
password we get is secret
From here we have a username (mitch) and a password (secret).
Lets go ahead and login with SSH
Had to add a -p argument since ssh is running on port 2222
in the home directory we find another user
from here we want to elevate priviledges.
Running sudo -l we see that Vim can run
off to GTFO bins we go!
From there we find we can run the command to get a root shell
sudo vim -c ‘:!/bin/sh’