Devvortex
文章描述了通过利用Joomla API漏洞(CVE-2023–23752)在Devvortex机器上进行渗透测试的过程。攻击者通过curl工具泄露数据库凭证,获得管理员访问权限后上传插件实现远程代码执行,并进一步破解用户密码哈希和利用apport-cli漏洞(CVE-2023–1326)提升至root权限。 2025-10-4 07:58:3 Author: infosecwriteups.com(查看原文) 阅读量:22 收藏

Hack The Box: Machine

Andrew Paul

© Hack The Box

Devvortex

Release Date: November 25th, 2023
OS: Linux
Categories: Web Application, Vulnerability Assessment
Area of Interest: Databases, Common Applications
Difficulty: Easy
Created By: 7u9y
Link: https://app.hackthebox.com/machines/577
Soundtrack: If You Only Knew — Blackwater Holylight

Summary

In this walkthrough, we explore the Devvortex machine, focusing on a Joomla API vulnerability that allows information disclosure. After identifying the vulnerability (CVE-2023–23752) in the Joomla API, we exploit it using curl to leak database credentials for the user lewis. These credentials grant administrator panel access, enabling the upload of a plugin for Remote Code Execution as the www-data user. Subsequent database enumeration reveals a password hash for user logan, which is cracked using hashcat. Final privilege escalation to root is achieved by exploiting a vulnerability (CVE-2023–1326) in apport-cli accessed via sudo.

Information Gathering

Nmap Scan


文章来源: https://infosecwriteups.com/devvortex-08b1821005e5?source=rss----7b722bfd1b8d---4
如有侵权请联系:admin#unsafe.sh