From the quick nmap scan I saw that two ports were open
SSH and http
By browsing into the port 80, I get to know that litecart is during
by running gobuster I found /backup directory
From there I got a tar file. I downloaded it my local machine
From the file at shop/admin/login.php from the tar file I got a new location to browse for
on browsing i got admin password
username : admin
password: theNextGenSt0r3!~
By logging in with the above credential at /shop/admin I was able to confirm the version of litecart
https://www.exploit-db.com/exploits/45267
This exploit will not work directly. I did some edits to the file
and along with php bypass file I was able to get RCE
I got the byepass code from below exploit
https://www.exploit-db.com/exploits/47462
python LiteCart.py -p 'theNextGenSt0r3!~' -u admin -t http://10.10.10.207/shop/admin/
I got RCE on browser
I found that mysql is there as user
on running
http://10.10.10.207/shop/vqmod/xml/mybypass.php?c=mysql -u root -pchangethis -e "select exec_cmd('whoami')"
I generated a key pair on my local machine
http://10.10.10.207/shop/vqmod/xml/mybypass.php?c=mysql -u root -pchangethis -e "select exec_cmd(echo *publick key*
> /var/lib/mysql/.ssh/authorized_keys')"
I have changed the key of mysql user with key I have generated
Now I should be able to SSH into the system as mysql user
After loggin in and a enumerating the files I got a intresting output
Password = 3*NLJE32I$Fe
I tried to ssh as sysadmin using the password
With the clue I got I searched for file which was recently modified i found /lib/x86_64-linux-gnu/security/.pam_unix.so
I downloaded the file
scp [email protected]:/lib/x86_64-linux-gnu/security/pam_unix.so ./pam.so
I opened it using gihdra
I started a new project
After that I just dragged the .so file onto the application
from opening the authenticate file
This is equivalent to zlke~U3Env82m2-
Leave a Reply