Hint LFI:
You can find the solution on the topic “Exploiting a Vulnerable Plugin”. Also you can check manually all plugins on Exploit-DB.
My Shell Problem:
I have some problems with the shell. I have the passwords an login, it works. But i cant upload the shell with metasploit i got the follow message:
[+] Authenticated with WordPress
[] Preparing payload…
[] Uploading payload…
[] Executing the payload at /wp-content/plugins/pWwazjprXa/obGHIQqZmr.php…
[!] This exploit may require manual cleanup of ‘obGHIQqZmr.php’ on the target
[!] This exploit may require manual cleanup of ‘pWwazjprXa.php’ on the target
[!] This exploit may require manual cleanup of ‘…/pWwazjprXa’ on the target
[] Exploit completed, but no session was created.
or
[-] Exploit aborted due to failure: no-access: Failed to authenticate with WordPress
[*] Exploit completed, but no session was created.
What errors are you getting? As long as everything is setup correctly, that should hit pretty close. Although you have to take care where you have spaces. So instead of 404.php?cmd=ls / it should be 404.php?cmd=ls+/.
DM me with what you are sending and I will see if I can push you along.
-onthesauce
I have logged in to the admin site and want to insert a shell-parameter, like in the section RCE via the Theme Editor. But every time i click on Update File it loads endless until i get an error. Anyone with the same problem? Or can someone confirm that this is the (un-)intentional behavior of the theme-editor in the Skill Assessment?
EDIT: Solved it with the help of @onthesauce . Make sure you are editing the right theme.
I guess it depends on what you are putting in the theme editor. I didn’t have an issue with it 2 weeks ago. Feel free to DM me the line you are using in the theme editor.
Do you use the SQLi vulnerability or do you crack the password of admin to gain initial access? Any hints on which password list to use? as I tried a lot of them with no luck.
Also - a HINT using WPSCAN register for the API as wpscan it will then tell you the vulnerabilities in plugin you can use to solve some of the questions.
Feel free to reach out in PM if you get stuck with others. I am doing the bug bounty track so this is my life right now lol. But always good to share ideas.