Astronaut
Summary
Apache server hosting GravCMS was found on port 80.
Exploited a known GravCMS RCE vulnerability to get a foothold.
Used a one-liner Python reverse shell for stable access (as Meterpreter was unstable).
Privilege escalation achieved via SUID misconfiguration in PHP binary.
🧵 Let's Unpack
Enumeration
Open Ports:
22/tcp
→ OpenSSH 8.2p180/tcp
→ Apache httpd 2.4.41, directory listing reveals:/grav-admin
Initial Foothold
🔍 Target: GravCMS (on /grav-admin
)
Public exploit found:
Also available as a Metasploit module:
exploit/linux/http/gravcms_exec
⚙️ Execution
Meterpreter payload was unstable.
Used a Python one-liner reverse shell for stability:
✅ Got a stable shell as www-data.
Privilege Escalation
SUID Binaries Enumeration:
Found:
php
with SUID bit set
Exploit: Abuse SUID PHP to execute shell with elevated privileges
✅ Got root shell!
Last updated
Was this helpful?