HTB - Tenten

Getting Root:
Discovered the box is using WordPress 4.7.3 which has vulnerable plugin
Exploiting the vulnerable plugin takes us a protected link with an image
Using steghide on the image gives us a private ssh key and we get a shell
To get root, we abuse an executable with SUID
Nmap
Services
View Source
A quick visit to http://10.10.10.10 and view source reveals WordPress 4.7.3

Gobuster
Wpscan
Research on job-manager plugin
Google research on "WordPress job-manager 7.2.5" https://vagmour.eu/cve-2015-6668-cv-filename-disclosure-on-job-manager-wordpress-plugin/
From the website we can easily browse the different job applications


To make this easier, I created a simple bash script to search for all job applications:
The one that is very interesting is Number 13:
Doing: 13<title>Job Application: HackerAccessGranted – Job Portal</title>
Let's use the python exploit from the page we found with the job-manager plugin discussing the CVE. I changed the year range given that WordPress was showing 2017 and I also added a few additional extensions.
Running the python exploit
Visiting the link shows an image

Analyzing the image
Cracking the ssh private key
Accessing the box
Privilege Escalation
Last updated