Description

Obtain RCE on the host library.edu.stf (10.124.1.233).

To get the flag, run the script /home/rceflag.

First, we need to add library.edu.stf 10.124.1.233 to the /etc/hosts file.

Then, browsed to library.edu.stf and it was a WordPress site.

Notice that there was a link to library at the bottom of the page.

image.png

We landed on a feature that appears to be a file directory

image.png

Typically, we would need to identify vulnerabilities in this WordPress plugin through manual research or automated tools like wp-scan. We might also attempt to upload a webshell manually or find ways to bypass the file upload restrictions.

However, since the hints already tell us it's related to CVE-2023-2068, we can proceed directly to Metasploit to search for an available exploit module.

image.png