Andrew Paul

Blog Posts

Featured image for Session Fixation in Vvveb CMS v1.0.6.1

Vulnerability DisclosureCVE-2025–8517

Session Fixation in Vvveb CMS v1.0.6.1

A Session Fixation vulnerability, tracked as CWE-384, was found in Vvveb CMS version 1.0.6.1. The system's authentication process doesn't generate a new session ID after a user successfully logs in. This critical flaw allows an attacker to exploit two methods to take over a user's account: by using a valid session ID issued by the server, or by creating a completely new and arbitrary session ID. Both attack variations enable an attacker to hijack a user's session, which can result in a full account takeover.

Featured image for Devvortex

Hack The Box: MachineWalkthrough

Devvortex

In this walkthrough, we explore the Devvortex machine, focusing on a Joomla API vulnerability that allows information disclosure. After identifying the vulnerability (CVE-2023–23752) in the Joomla API, we exploit it using curl to leak database credentials for the user lewis. These credentials grant administrator panel access, enabling the upload of a plugin for Remote Code Execution as the www-data user. Subsequent database enumeration reveals a password hash for user logan, which is cracked using hashcat. Final privilege escalation to root is achieved by exploiting a vulnerability (CVE-2023–1326) in apport-cli accessed via sudo.

Featured image for Lame

Hack The Box: MachineWalkthrough

Lame

In this walkthrough, we explore the Lame machine, focusing on an SMB vulnerability that allows arbitrary command execution. After identifying the vulnerability (CVE-2007–2447) in the Samba service, we use a Metasploit module to exploit it. This grants us root access via a reverse TCP shell, and we enhance our control by upgrading to a Meterpreter session, enabling further enumeration and exploitation without needing privilege escalation.

Featured image for UFO-1

Hack The Box: SherlockWalkthrough

UFO-1

Being in the ICS Industry, your security team always needs to be up to date and should be aware of the threats targeting organizations in your industry. You just started as a Threat intelligence intern, with a bit of SOC experience. Your manager has given you a task to test your skills in research and how well can you utilize Mitre Att&ck to your advantage. Do your research on Sandworm Team, also known as BlackEnergy Group and APT44. Utilize Mitre ATT&CK to understand how to map adversary behavior and tactics in actionable form. Smash the assessment and impress your manager as Threat intelligence is your passion.