Simple ctf
Enumeration:
nmap scan results:
gobuster result:
/simple implements cms 2.4.8 which is vulnerable to sql injection based attack CVE-2019-2053
exploit link
modifying the cve to run on python3 not just on python
now running the exploit
python3 -u http://10.10.172.2/simple
which starts bruteforcing
running ssh to user mitcuL at port 2222
did not let us log becaus eof the incorrect exploit
i ran the correct exploit and got this
[+] Salt for password found: 1dac0d92e9fa6bb2 [+] Username found: mitch [+] Email found: [email protected] [+] Password found: 0c01f4468bd75d7a84c7eb73846e8d96 which gave me the password secret
0c01f4468bd75d7a84c7eb73846e8d96
rootflag: W3ll d0n3. You made it!