π΄ββ οΈHTB - Devvortex
p0db0t writeup of the easy-difficulty Linux machine Devvortex from https://hackthebox.eu

Enumeration Phase:
Nmap scan
First off, I started my enumeration with an Nmap scan of 10.10.11.242. The options I regularly use are: -sC is the equivalent to --script=default and runs a collection of Nmap enumeration scripts against the target, -sV does a service scan.

I added devvortex.htb to /etc/hosts next to the IP of the box which is 10.10.11.242
Since I still didn't have a way in, the next place to enumerate was HTTP on port 80. Navigating to http://devvortex.htb

Brute-force hidden directories:
After visiting http://devvortex.htb I decided to brute-force hidden directories with Gobuster and didn't find anything π’
Subdomain enumeration:
I used also gobuster for this host Subdomain enumeration and found dev.devvortex.htb

I added dev.devvortex.htb to /etc/hosts next to the IP of the box which is 10.10.11.242
After visiting http://dev.devvortex.htb

Brute-force hidden directories:
I decided to brute-force hidden directories with Dirsearch and find /administrator/ and /Readme.txt π

On the Administrator page, I found out that is the login page of Joomla CMS.

On the Readme.txt page, I found out the version of Joomla CMS 4.2.

Initial Foothold:
I found out that Joomla CMS 4.2 is Vulnerable to CVE-2023-23752 and used the tool Curl to get some sensitive information including the Username and Password of user Lewis. About CVE-2023-23752 more on this link:https://nvd.nist.gov/vuln/detail/CVE-2023-23752

After login on to the Administrator page with credentials that I found with Curl, I edited error.php which was located at /template/Cassiopeia/error.php and set up reverse shell script.

I ran Netcat to listen to incoming connections and used Curl to trigger a reverse shell at the error.php page.

Boom! I got the shell as www-data

Owning User:
Credentials that I found with Curl have also a Database name so I went for MySQL checking.


Bingo π I found the hash of Lewis and saved the hash locally in a .txt file.
I cracked the hash of Logan using the tool John The Ripper

Sweet !!!! I log in as a user Logan via SSH.

Owning Root:
The sudo -l command gives me some interesting output

I found out that Apport-cli is Vulnerable to CVE-2023-1326 About CVE-2023-1326 more on this link: https://bugs.launchpad.net/ubuntu/+source/apport/+bug/2016023

Last updated