@rocux said:
Can someone help me or give me a hint for initial step of the box? I have done some enumeration and dir busting to no avail. Any help or a link that refers to vulnerability is much appreciated. Please pm me.
HI all , im on this box from few days now, nothing of my try work … ,i found some hole but i dont know how to begin … any help is much appreciated. please pm
Anyone available for a PM? Been working on this for a few days now, got running locally and see what’s going on and able to execute the vulnerability using script that mirrors check but unable to envoke via app…
This box has been endless frustration… Able to get payload up locally but get posix error unless running dos2unix on the file, then it works using the check() function copied into a file check.py but every time I try with /check in browser I get bad request 400… I feel like I’m close but feel like a dog chasing his tale
If someone could drop me a DM please take a look at my script to “check” input, I’d really appreciate it! My very similar script to submit is working great, no more pickle errors etc when I run it with code pulled from app used to check
Would really love a PM regarding how to get a user shell. I have discovered a vulnerable service running on the box, but the exploit script I found does not work. It tells me that the commands have been executed, but I’m pretty sure they have not been.
@mxchai said:
Would really love a PM regarding how to get a user shell. I have discovered a vulnerable service running on the box, but the exploit script I found does not work. It tells me that the commands have been executed, but I’m pretty sure they have not been.