GETTING STARTED-Public Exploits

My question is “Try to identify the services running on the server above, and then try to search to find public exploits to exploit them. Once you do, try to get the content of the ‘/flag.txt’ file. (note: the web server may take a few seconds to start)”, i used nmap -Pn -cV -cS -p[port] [host] then gain:
"└─$ nmap -Pn -sC -sV -p31770 46.101.2.67
Starting Nmap 7.93 ( https://nmap.org ) at 2023-05-22 00:02 EDT
Nmap scan report for 46.101.2.67
Host is up (0.22s latency).

PORT STATE SERVICE VERSION
31770/tcp open http Apache httpd 2.4.41 ((Ubuntu))
|_http-title: Getting Started – Just another WordPress site
|_http-generator: WordPress 5.6.1
|_http-server-header: Apache/2.4.41 (Ubuntu)

Service detection performed. Please report any incorrect results at Nmap OS/Service Fingerprint and Correction Submission Page .
Nmap done: 1 IP address (1 host up) scanned in 31.80 seconds"
I tried searching on Google with ‘WordPress 5.6.1 exploit,’ but I couldn’t find any public exploits to use for ‘msf>search exploit [plugin_name].’ Can anyone help me with this step?

1 Like

plugin name is not WordPress, it is Simple Backup Plugin. Now try to exploit it.

1 Like

CVE-2024-31210

i doubt you still need help but i think this is it

Seems like others have already told you the exploit, however. for your own reference in the future, there is a tool known as wpscan - https://github.com/wpscanteam/wpscan

Good luck