I am currently stuck at achieving RCE at “Other Notable Applications”.
I was able to figure out the vulnerable application and a suitable CVE 2020-14*** with a Python Script “Server Remote Code Execution”.
However, I was not able to insert a suitable command to obatain a reverse shell.
Uploading NC.exe or MSF windows/shell_reverse_tcp via Python Server does not work. I also tried Powershell One-Liner without success.
The python exploit includes the instruction for usage: "powershell.exe -c Invoke-WebRequest -Uri http://your_listener"
This simple HTTP GET request is the only connection I am able to receive on my attack box.
It’s been a very long time since I finished the module.
At the moment I cannot memorize how I finally solved it.
I will have to look into that again and give it a try. That might take a bit of time, however!