Boardlight

Enumeration
Port Scan
Directory Scan
Subdomain Scan
Web Attack
Under subdomain we can see it's hosting dolibarr (v17.0.0). This version is vulnerable to RCE.
You can login with default credentials (
admin:admin) on (crm.board.htb)
Resource
https://github.com/advisories/GHSA-9wqr-5jp4-mjmh
https://www.swascan.com/security-advisory-dolibarr-17-0-0/
Alternative: https://www-swascan-com.translate.goog/it/security-advisory-dolibarr-17-0-0/?_x_tr_sl=it&_x_tr_tl=en&_x_tr_hl=en&_x_tr_pto=sc
Shell www-data
After we exploit, we get a www-data shell

The default config files are under htdocs/conf/conf.php
Shell - user
We can ssh into the box for proper tty shell.
Shell root
If we google about enlightenment, we see it's a WM for Xorg.
After googling the version, we can find the exploit, https://github.com/MaherAzzouzi/CVE-2022-37706-LPE-exploit/blob/main/exploit.sh
________________________heapbytes' still pwning
Last updated