• (๑>؂•̀๑)
  • Home
  • Blog
  • Tags
  • Categories
  • Projects
  • Search ﹒◌﹒✦

Search

WordPress

Found 1 related articles

Back to Tags
  • 2024-10-01

    WalkingCMS - WordPress Exploitation via Theme Editor and SUID Privilege Escalation


    Technical writeup detailing the compromise of the WalkingCMS challenge. Initial access involves enumerating a WordPress installation via Gobuster, credential cracking using WPScan, and achieving a reverse shell by modifying the theme's index.php file. Final root access is achieved by exploiting a vulnerable SUID binary, '/usr/bin/env', using standard Linux privilege escalation techniques.

    DockerLabs WordPress WPScan Brute-Force Reverse-Shell SUID-Privilege-Escalation Linux-Exploitation Gobuster