HTB - Tenten

Tenten

Getting Root:

  1. Discovered the box is using WordPress 4.7.3 which has vulnerable plugin

  2. Exploiting the vulnerable plugin takes us a protected link with an image

  3. Using steghide on the image gives us a private ssh key and we get a shell

  4. To get root, we abuse an executable with SUID

Nmap

Services

View Source

A quick visit to http://10.10.10.10 and view source reveals WordPress 4.7.3

Gobuster

Wpscan

Research on job-manager plugin

Google research on "WordPress job-manager 7.2.5" https://vagmour.eu/cve-2015-6668-cv-filename-disclosure-on-job-manager-wordpress-plugin/

From the website we can easily browse the different job applications

To make this easier, I created a simple bash script to search for all job applications:

The one that is very interesting is Number 13: Doing: 13<title>Job Application: HackerAccessGranted &#8211; Job Portal</title>

Let's use the python exploit from the page we found with the job-manager plugin discussing the CVE. I changed the year range given that WordPress was showing 2017 and I also added a few additional extensions.

Running the python exploit

Analyzing the image

Cracking the ssh private key

Accessing the box

Privilege Escalation

Last updated