80
When visiting non-existent web pages: It's running Laravel 8.4.0
Using this exploit:
Checking the chains available:
Trying RCE2:
Now run a listener:
We get a shell.
Running linpeas we can find that skunk is in sudo group.
Running pspy64: We have a file running called artisan:
Now putting a reverse shell in it From pentestmonkey.
Start a listener:
Running sudo -l
:
We can run composer without password.
Now in /var/www/html/lavita
edit composer.json WITH SHELL AS WWW-DATA:
Now run command:
We get a root shell:
Last updated