LaVita
Last updated
Was this helpful?
Last updated
Was this helpful?
Only two open ports: SSH (22) and a Laravel-based web app on port 80.
Identified Laravel log file path on the web server.
Leveraged CVE-2021-3129 – avia log poisoning and debugging mode.
Achieved code execution through poisoned logs.
Got reverse shell by modifying the exploit payload.
Enumeration
Open Ports:
22/tcp
→ OpenSSH 8.4p1 Debian
80/tcp
→ Apache 2.4.56 (Laravel app)
👀 Observed a default W3.CSS template on HTTP page.
Manually enumerating team names from the web app:
Jan Ringo
Kai Ringo
Rebecca Flex
Johnny Skunk
Useful for wordlists or user enumeration later.
Initial Foothold
🧨 Vulnerable Laravel app — exploited CVE-2021-3129 (Ignition RCE via log file):
Public exploit used: → Laravel Ignition RCE Exploit
📌 After verifying command execution, updated payload with reverse shell:
Got a reverse shell from the web server.
Privilege Escalation