image.png

Want to run this Docker container locally?

docker run -d -p 9039:80 --restart always --name flag-w joshbeck2024/ctf-wordpress-wpspritz-rfi-flagw

IP Address: 172.25.200.200

Port: 9039

In this lab, we have one of the most common and widely exploited CMS frameworks on the planet: WordPress. Why is WordPress so darn vulnerable, you ask?

Summary: Vulnerable WordPress sites are everywhere.

There are a couple of different ways we can analyze WordPress sites. One of the first tools to reach for is wpscan. On Kali type:

wpscan --url http://IP_ADDRESS_OF_TARGET:9039

image.png

WPScan is a great tool. Be sure you trust, but verify!

We can verify this by checking the front page.

image.png

Whenever you target a WordPress site, you want to manually investigate every installed plugin and theme after automatic detection. In this case, it is indeed wp-with-spritz version 1.0

There is a tool on Kali called searchsploit That is tied to the exploit-db.com database, which can be helpful.