11/2020
Target IP: 10.10.10.191.
The machine hosts a CMS system – Bludit version 3.9.2 which is vulnerable to a brute force mitigation bypass exploit (CVE-2019-17240). Initial access gained by brute-forcing passwords of a user mentioned in *todo.txt* file found on the web server directory. User access acquired by exploiting a Local File Inclusion vulnerability to upload a reverse shell to a known folder on the server and trigger it (CVE-2019-16113). The target machine is susceptible to sudo security bypass exploits which allows PE (CVE-2019-14287).
easy
User: b4d54f7900777b4017d9b89dcb735ab1
Root: 3f7e1a14027f840fb15dd72b4e9b5978

Nmap port scan result.
! Discovered service: HTTP (80)

Examining the Apache web server on the target machine.

A login form is found on /admin
! Discover product: Bludit CMS
<aside> 💡
Bludit is a free and open-source web and blog builder https://docs.bludit.com/en/
</aside>

Brute-forcing the directory of the targeted website with gobuster.
! todo.txt is not a default file generated by server deployment.

Examining the content of todo.txt .
! Discover a possible user: fergus