Does this POC requires you to have access to admin panel? or can you create a random email and sent the attachment to it?
Then check this file for mysql credentials
/var/www/prestashop/app/config/parameters.php
No, the challenge itself simulates admin login. it’s just enough to run the poc
thanks a lot you saved me
The user i created never receives the email in my alerts (assuming i will get it there).
i have done the following:
in the php reverse shell file: i changed to my ip
in exploit.html: i changed to url to shop.trickster.htb/admin (the admin path i found at the directory in .git)
when i run the exploit.py i submit the info as follow:
http://shop.trickster.htb
email: the one i created for the shop
message: blah blah
html file: ./exploit.html
What am i doing wrong? There must be something i am missing
Add reverse_shell.php
inside the malicious theme zip.
Root Hints
-
Scan the internal Docker network and locate the
changedetection
web application. -
Notice that it’s vulnerable to
CVE-2024-32651
, but you need to disable the password first. -
If you’ve made it this far, you already know the password!
After obtaining a Docker shell, inspect all the files to gain root access on the host machine.
Just another question, this step from james or from adam user ? thanks
I disabled the password but not getting a docker connection back. Was there an extra step you did?
we are directly rooting from james
.
got it thanks, i will check again
Which notification url are you using? Local web server on attack machine?
Check the documentation and create a valid notification URL. That’s enough.
sorry can i get hint i got shell but it colsed i got this error
[*] Got EOF while sending in interactive
can anyone please help i am stuck with shell last part
Log in to the web application yourself, identify the errors, review the logs carefully and then modify the exploit accordingly.
Exclusive content is now available for Trickster
.
What is Exclusive Content?
You can still ask for help and specific hints in this thread.
is the admin panel something related to the .git/refs/heads/admin_panel contents?
@SXBmaQqq you should download the git folder with GitHub - arthaud/git-dumper: A tool to dump a git repository from a website so you can find the admin folder
i’ve run
git-dumper http://shop.trickster.htb ./git but i can’t find the admin directory