You’ll find this vm here : https://www.vulnhub.com/entry/devguru-1,620/
Port Scan
1  |  | 
Information Gathering
URL : http://10.0.2.254/
Manual Information Gathering
1  |  | 
Wappalyzer result
1  |  | 
Directory Scan
1  |  | 
Directory Scan using Dirb
1  |  | 
GitTools - Git Dumper
Resource : https://github.com/internetwache/GitTools.git
1  |  | 
GitTools - Git Extractor
1  |  | 
Found Database Credentials
1  |  | 
Adminer Login - Change October CMS password
URL : http://devguru.local/adminer.php
New Password for frank user
BCrypt Password hash : $2a$10$9Jp/609z7cFQSVL5Rv1wfOjzCo5E.lDqLsYZ/7PyJEZrsjDAful7. Plaintext Password : alienumattack
October CMS Login - Code Execution
Login Page : http://devguru.local/backend
Credentials => frank:alienumattack
Modify the Code and the Markup of the homepage
Resource : https://docs.octobercms.com/2.x/services/response-view.html#returning-strings-from-a-cms-method
1  |  | 
1  |  | 
PoC
1  |  | 
Reverse Shell
Resource : https://www.revshells.com/
- Browser
 
1  |  | 
Privileges Escalation - Frank
1  |  | 
linpeas
1  |  | 
Found the backup of the app.ini here : /var/backups/app.ini.bak
1  |  | 
MySQL Login
1  |  | 
Change Gitea password
Resource : https://github.com/go-gitea/gitea/blob/main/models/user/user.go
Generate new hash
Run the program online : https://go.dev/play/
1  |  | 
Result : 399f18fb256de6ea2f4f61ec77ae3d3ded89d442e7372739c4eb6e8264091a00054a3ed4e0f95f257b91814cd603802bfd93
Update the gitea password hash
1  |  | 
GiTea Authenticated Remote Code Execution using git hooks
Resource : https://podalirius.net/en/articles/exploiting-cve-2020-14144-gitea-authenticated-remote-code-execution/
URL => http://devguru.local:8585/ Credentials => frank:alienumattack2
The Process
- create the repository and we go into
 
- Settings -> Git Hooks -> Post Receive
 
User Owned
1  |  | 
Vertical Privileges Escalation
Resource : https://gtfobins.github.io/gtfobins/sqlite3/ Resource : https://www.exploit-db.com/exploits/47502 Info : Sudo version 1.8.21p2