Boardlight

Enumeration

Port Scan

Directory Scan

Subdomain Scan

Web Attack

Under subdomain we can see it's hosting dolibarr (v17.0.0). This version is vulnerable to RCE.

  • You can login with default credentials (admin:admin) on (crm.board.htb)

Resource

Shell www-data

After we exploit, we get a www-data shell

The default config files are under htdocs/conf/conf.php

Shell - user

We can ssh into the box for proper tty shell.

Shell root

If we google about enlightenment, we see it's a WM for Xorg.

After googling the version, we can find the exploit, https://github.com/MaherAzzouzi/CVE-2022-37706-LPE-exploit/blob/main/exploit.sh

________________________heapbytes' still pwning

Last updated