Wordpress: CVE-2021-29447

Room Link: https://tryhackme.com/r/room/obscuredarrow-up-right

Scans

Initial scan

Kali

nmap -A $VICTIM

Longer scan

Kali

TCP/80 - HTTP

Scan wordpress site

We can see wordpress version 5.6.2 is running

Kali

We are given the credentials for this box.

Kali

NAMEEVIL.dtd

Start the an http server in the same directory as the dtd file and then upload payload.wav to Wordpress.

Kali

Create a php file that base64 decodes the output from above

decode.php

Kali

Now lets do the same thing but get wp-config.php file

NAMEEVIL.dtd

Kali

decode.php

Kali

TCP/3306 - SQL

Kali

Kali(mysql)

Kali

Kali

Initial Shell

Login again into WordPress using the credentials found

Kali

Edit IP variable

Kali

Update the page with your reverse shell then save. This will make the plugin not appear anymore under Installed Plugins

Curl the page to activate it.

Kali

Victim

Last updated