Astronaut
Summary
Apache server hosting GravCMS was found on port 80.
Exploited a known GravCMS RCE vulnerability to get a foothold.
Used a one-liner Python reverse shell for stable access (as Meterpreter was unstable).
Privilege escalation achieved via SUID misconfiguration in PHP binary.
π§΅ Let's Unpack
Enumeration
sudo nmap -sV -sC -p- -Pn 192.168.229.12Open Ports:
22/tcpβ OpenSSH 8.2p180/tcpβ Apache httpd 2.4.41, directory listing reveals:/grav-admin
Initial Foothold
π Target: GravCMS (on /grav-admin)
Public exploit found:
Also available as a Metasploit module:
exploit/linux/http/gravcms_exec
βοΈ Execution
Meterpreter payload was unstable.
Used a Python one-liner reverse shell for stability:
β Got a stable shell as www-data.
Privilege Escalation
SUID Binaries Enumeration:
Found:
phpwith SUID bit set
Exploit: Abuse SUID PHP to execute shell with elevated privileges
β Got root shell!
Last updated