We only have ports 22,80 open.
Sub domain found
CRM subdomain is a login page using Dolibarr 17.0
Entering a random username sort of lets you log in and see a lot of information but you cant really do anything
We have an authenticated RCE vulnerability in this version of Dolibarr so we need to find creds
https://www.swascan.com/security-advisory-dolibarr-17-0-0/
I was actually wrong, admin admin is the login and we are able to create a rev shell. I saw the red error and figured we were unable to login but I was able to make a shell.
We need to click the “Websites” option in the top left and create a new website
Once created we can then setup a php shell in the page
Then we access the website(in my case i named it “test”) and we get a shell
http://crm.board.htb/public/website/index.php?website=test
mysql login found
www-data@boardlight:~/html/crm.board.htb/htdocs/conf$ cat conf.php
$dolibarr_main_db_name='dolibarr';
$dolibarr_main_db_prefix='llx_';
$dolibarr_main_db_user='dolibarrowner';
$dolibarr_main_db_pass='serverfun2$2023!!';
Hashes found in the llx_user table
Super admin: $2y$10$VevoimSke5Cd1/nX1Ql9Su6RstkTRe7UX1Or.cm8bZo56NjCMJzCm
Admin: $2y$10$gIEKOl7VZnr5KLbBDzGbL.YuJxwz5Sdl5ji3SEuiUSlULgAhhjH96
admin cracks to admin
Super admin was taking a while to crack so I checked to see if the mysql password was reused for larissa and it was.
larissa:serverfun2$2023!!
I tried a bunch of different exploits and missed one somehow
https://github.com/MaherAzzouzi/CVE-2022-37706-LPE-exploit
Copy the bash script and run it and we are root.