IgniteTryHackMe Logo

This engagement involved exploiting a vulnerable FUEL CMS instance to gain remote code execution, followed by credential discovery and reuse to achieve full root access.

Reconnaissance

Port scanning revealed a single exposed service:

The web application was identified as FUEL CMS version 1.4, which is known to contain publicly disclosed vulnerabilities.

Initial Access

Default credentials were discovered for the admin panel, allowing access to the CMS dashboard. Attempts to upload a reverse shell directly were unsuccessful due to file restrictions.

A known public exploit targeting FUEL CMS was then used to achieve remote code execution, resulting in a web shell.

Write Up Image

Exploitation

The web shell was upgraded to a reverse shell, providing a more interactive session on the target system.

During post-exploitation enumeration, a configuration file (database.php) was discovered containing database credentials:

username: root
password: mememe

These credentials were reused to switch to the root user viasu, successfully achieving full system access.

Key Finding: Credential Reuse

Sensitive database credentials were stored in plaintext and reused for system-level authentication. This allowed immediate privilege escalation without the need for additional exploitation.

Credential reuse remains one of the most common and impactful security weaknesses in real-world environments.

Impact

Full system compromise was achieved. The attacker gained root-level access, enabling complete control over the system, including file manipulation, persistence, and potential lateral movement.