13337
Available methods:
Using /logs
This means the access is denied for our host but maybe the localhost can access.
Intercept the request:
Now we can use X-Forwarded-For
Header to spoof the localhost:
We have file read:
We have a user called clumsyadmin
We can create an ELF reverse shell executeable:
Now start a python server:
Now we can use /update
: But no shell when visiting /restart. This is intended path but we do not get a shell.
Now we can get main.py using /logs
We can try command injection: Using payload:
We get a shell:
Running linpeas: We have wget as an SUID binary.

Last updated
Was this helpful?