Skip to content

Exfiltrated 🔹

Enumeration

Add exfiltrated.offsec to /etc/hosts.

The webserver shows a Kickstart page.

We can log in with admin:admin.

Initial Access

https://github.com/Swammers8/SubrionCMS-4.2.1-File-upload-RCE-auth-

Privilege Escalation

Get a reverse shell.

There is a script using exiftool that is being executed every minute.

Following this guide, we can generate a malicious jpg: https://ine.com/blog/exiftool-command-injection-cve-2021-22204-exploitation-and-prevention-strategies

Transfer the jpg with the payload to the path of the script and set a listener.

Post Exploitation

Get the flags.