Nibbles
NibbleBlog 4.0.3 my_image Plugin Vulnerability - Replacing bash script PrivEsc
Scanning

Port 80 Enumeration


Let's search for some public exploits - nibbleblog
and meanwhile run the gobuster
gobuster dir -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt -u 10.10.10.75/nibbleblog



Initial Foothold

The vulnerability is in the “My image” plugin that allows the upload of PHP files. So it would allow us to upload a PHP reverse shell
It’s an authenticated vulnerability which means that we need admin credentials before we exploit this vulnerability
http://10.10.10.75/nibbleblog/admin.php

Trying out common credentials such as
admin/admin
administrator/password
Din't work !
admin/nibbles - worked !
Next, we need to navigate to the My Image plugin. Click on Plugins > My image > Configure

Upload the PHP reverse shell, and start a listener

Now trigger it by browsing this URL
http://10.10.10.75/nibbleblog/content/private/plugins/my_image/image.php

Privilege Escalation
sudo -l

Edit the
monitor.sh
file to get a reverse shell and run it as sudo
Last updated