At the webpages /home, /0, /index, and /index.php, we obtain valid credentials for the login page at /fuel. However, the pages /offline and /assets are inaccessible. The robots.txt file confirms what was discovered during the Nmap scan.
The default password has not yet been changed.
We're unable to upload a PHP file to obtain a web shell or reverse shell. Since Fuel is a CMS, we can investigate known vulnerabilities associated with it to find potential exploits.
Vulnerabilities research
Our fuel version is 1.4 so it is vulnerable to RCE attack.
Initial access
We can attempt to exploit the Remote Code Execution (RCE) vulnerabilities in Fuel CMS. By leveraging this vulnerability, we may be able to execute commands remotely and establish a reverse shell for deeper access to the system. We get the user flag at /home/www-data.
Escalation
Exploring the subdirectories, we discovered a database configuration file containing the root password. Fortunately, this root database password also serves as the root user’s Unix password, allowing us to gain root access to the system. The root flag is at /root.