BoardLight

Recon

nmap_scan.log|h-50%

HTTP (80)

Pasted_image_20240527235805.png

Hmm.. nothing We do have email linked to board.htb, let's add it to hosts and try enumerate subdomains.Pasted_image_20240528000035.png

crm.board.htb

Pasted_image_20240528000258.png

Searching for version we end up with CVE: https://www.swascan.com/security-advisory-dolibarr-17-0-0/

We are able to login with default credentials:Pasted_image_20240528000551.png

Creds: admin:admin

Pasted_image_20240528000734.png

RCE

CVE-2023-30253.py|h-50%

The fricking app was deleting my website in like 5 seconds so I just created a PoC script.

Config

SSH

We are able to ssh with database password.

Creds: larissa:serverfun2$2023!!

User.txt

Privilege Escalation

dirtypipe also failed to gain root.

If we take a look at suid binaries on system we see some odd files from enlightenment:

Root.txt

Quick google shows us known exploit: https://github.com/MaherAzzouzi/CVE-2022-37706-LPE-exploit

Last updated