pentestProhard
City (Информационный портал УК City)
standoff365
Task: Standalone machine with Bludit CMS 3.9.2 information portal, 6 flags total. Solution: CVE-2019-17240 brute-force bypass via X-Forwarded-For rotation, CVE-2019-16113 directory traversal upload for RCE, cap_setuid on python3.9 for LPE to root, cron-based defacement trigger for UE.
$ ls tags/ techniques/
sqlibrute_forcessrfrcepath_traversalphpfile_uploadwebshellcronapachelinux_capabilitiescap_setuidvsftpdcmsbluditcve-2019-17240cve-2019-16113lpedefacementmariadb
brute_force_bypass_xffdirectory_traversal_uploadphp_webshell_uploadcapability_setuid_privescmysql_skip_sslcron_defacement_triggersuid_binary_execution
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Sign in with GitHub to continue. No email required.
$sign in$ grep --similar
Similar writeups
- [infra][Pro]Подземелье (Dungeon)— hackerlab
- [web][Pro]Странный сервер (Strange Server)— hackerlab
- [infra][Pro]Скрипт-кидди (Script-kiddie)— hackerlab
- [infra][Pro]SREga CTF — 8-Level SRE Challenge— srega
- [web][Pro]Квантовый прорыв (Quantum Breakthrough)— hackerlab