ir.inlanefreight.local

Simple WordPress blog page. I can write comments but they need to be approved by an admin.

So I run WPscan.

sudo wpscan -e ap -t 500 --url http://ir.inlanefreight.local

We can get informations on WP version, theme, plugins. I was happy to see mail-masta. It is old and got several vulnerabilities.

This is a file inclusion PoC for the specific version of the plugin. According to the exploit we can simple add the file we want to read:

Username Enumeration

So we got a username list. Lets brute force the first user ilfreightwp, it has WP in its name:

RCE

And I get credentials. With these credentials, Im gonna upload a proper shell. Or easier, use metasploit module exploit/unix/webapp/wp_admin_shell_upload

I couldn't make metasploit to work, so I uploaded the shell into the theme editor. Couldn't edit the make theme code as it showed as not writable. So I edited the twentytwenty themes 404 page.

Last updated