yes you can
make sure that the important stuff is not encoded
Need help on how to trigger the RCE, any advice? Feel free to dm to discuss so I can talk about what I already did in detail.
Read more carefully the message of @sifona ; what are the particularity of ssh keys ?
Can anyone PM me about RCE. I think I understand the exploit, but I cant get an connect back.
I dont really find a posibility for a valid keyā¦Where did you find itā¦in the path /usr/lib/pythonā¦server.pem it doesnāt seem to work
iām in the same step. In the document you found it is just test environment.
Iām also trying to find any pem file there but without success
Please can anyone give us a hint ?
Thanx a lot
The strange thing is, on a standard debian you have these files too
maybe you could add a private key to some known locationā¦
Like in a log file? Or more in the application file
found it, thanx
Now Iām just more confused
Wow this machine is really hard. Iām struggling with the PE for the root.
Iām really struggling to find .pem file guys little help please
Read the Part with RCE really carefully Path Traversal Vulnerabilities in Icinga Web | Sonar
Need a hint. Can caps help me to escape?
any tips for escaping ?
So found a .pem using the vulnerability and am looking at this article to figure out the RCE. Am I on the right track or do I need to try something else? Iāve tried the instructions on constructing the payload with no luck. Thanks
what part are you doing
Any hints on privesc to administrator once on the Windows box?