BoardLight
Last updated
Last updated
Date: 14, jun, 2024
Author: H3cktor
Using NMAP to make Recon
-sV => Attempts to determine the version of the service running on port
-sC => Scan with default NSE scripts. Considered useful for discovery and safe
After the nmap scan we can see an apache server listening on port 80:
Lets add this to our host file:
Lets first try to do a directory search to try to find any hidden files/directory's. I will use gobuster to do this:
Make subdomain enumeration Using FFUF
See i found the Subdomain crm.10.10.11.11
I Found the crm panel
Ok Now Found the Dolibarr version 17.0.0 and i Search in Google to get any CVE
i found Dolibarr-17.0.0-CVE-2023-30253
Reverse Shell POC exploit for Dolibarr <= 17.0.0 (CVE-2023-30253)
, PHP Code Injection
listen revers shell => Must run listening in First
First I provided a listener and then executed the exploit.py file. Then I provided the credentials as well as my attacker ip and the listening port. After executing, I successfully got a reverse shell
B0000000M!
I cat Found in pass or Cardantional
put i see the user name larissa
I found the main database password in the file.