Lavita 🔸
Enumeration
Page shows a template
Feroxbuster finds a register path
We can create an account and
Initial Access
Searching exploits for laravel and debug we find https://github.com/rocketscientist911/CVE-2021-3129
We need to clone https://github.com/ambionics/phpggc.git to the same folder as the py file and edit the exploit with the url and the payload
Get the flag
Privilege Escalation
Using pspy64 we notice a task with the user skunk that uses artisan
So we replace artisan with a reverse php shell
Now using sudo -l
This user can execute composer in that specific path so reading on gtfobins
I'll use the first user www-data to put the payload in the composer.json
And now execute composer with skunk
Post Exploitation
Get the flag