Index page: I checked the source code but got nothing.
There is only one interesting directory /cgi-bin/
. Let’s run gobuster
again on /cgi-bin
directory.
We can find a bash file user.sh
in directory /cgi-bin/
.
If we download that file user.sh
and check, it shows the result of executing script. after execute script. This is likely to be vulnerable to shellshock
.
As we expected, it says it is vulnerable to shellshock
.
Shellshock_PoC: https://github.com/mubix/shellshocker-pocs
Based on CVE I just modified code little bit and execute to check id
:
We can confirm that it is vulnerable to shellshock
and we can try to get reverse shell.
ShelloShock Exploit to get reverse shell:
NC
listener on attacking side:
Check for sudo
privilege:
user shelly
can run /usr/bin/perl
with root
privilege.
Spawn new shell with perl:
And we rooted !!