Exploitation
We know we have access to admin login, we know we can upload a php file and access at a particular location.
Login Credentials
For the login page, chances are that the page has default credentials. nibbles/nibbles, admin/nibbles,admin/password, admin/admin...etc

Exploitation: PHP file upload
Based on our earlier enumeration, we are able to upload files that ARE NOT Images on nibblesblog 4.0.3. This is located on the plugins/images settings.

Uploading Reverse PHP shell and Information Disclosure

After uploading a php shell, a user is displayed with information that should not be visible.
After the shell is uploaded and our listener is set up on the proper port, we get a reverse connection when we access /content/private/plugins/my_image/image.php


Note:
Page could have a lockout mechanism, be careful with brute force as this can lock you out.
Last updated
Was this helpful?