πŸ“„Fact

https://app.hackthebox.com/machines/Facts

Facts Walkthrough


1. Initial Reconnaissance

Service Enumeration

Result - SSH exposed - HTTP exposed - Web service redirected to CMS virtual host


2. Web Enumeration

Directory Enumeration

Discovered paths - /admin


3. CMS Identification

Checked page source of /admin and identified:


4. Privilege Escalation to Admin

CVE-2025-2304 --- Role Injection

  1. Register a low-privileged user

  2. Intercept password change request

  3. Modify POST body:

  1. Forward the request (do not replay)

  2. User role escalated to admin


5. Authenticated Arbitrary File Read

CVE-2024-46987

Vulnerable Endpoint

Example: Reading /etc/passwd


6. Sensitive File Discovery

Read User Home Directories

Extract SSH Private Key

Saved response locally as:


7. Cracking SSH Private Key

Convert Key for John

Crack with Wordlist

Show Result


8. SSH Access

Fix Permissions (WSL/Linux)

Login Using Key

Enter key passphrase when prompted.


9. Sudo Enumeration

Result


10. Privilege Escalation to Root

Abusing Facter Custom Facts

Create Malicious Fact

Execute as Root

Verify

Expected:


11. Impact

  • Admin takeover via parameter injection

  • Arbitrary file read on server

  • SSH access via cracked private key

  • Root privilege escalation via misconfigured sudo


Vulnerabilities Summary

Step Issue


CMS Admin Escalation CVE-2025-2304 Arbitrary File Read CVE-2024-46987 Root Escalation Sudo misconfiguration (facter)


End of report

Last updated