Description
Obtain RCE on the host library.edu.stf (10.124.1.233).
To get the flag, run the script /home/rceflag.
First, we need to add library.edu.stf 10.124.1.233 to the /etc/hosts file.
Then, browsed to library.edu.stf and it was a WordPress site.
Notice that there was a link to library at the bottom of the page.

We landed on a feature that appears to be a file directory

Typically, we would need to identify vulnerabilities in this WordPress plugin through manual research or automated tools like wp-scan. We might also attempt to upload a webshell manually or find ways to bypass the file upload restrictions.
However, since the hints already tell us it's related to CVE-2023-2068, we can proceed directly to Metasploit to search for an available exploit module.
