In this post, I would like to share a walkthrough of the Bizness Machine from Hack the Box

This room will be considered an Easy machine on Hack the Box

What will you gain from the Bizness machine?

For the user flag, you will need to exploit CVE-2023-49070, an authentication bypass vulnerability in Apache OFBiz.

As for the root flag, you need to be able to analyze the source code of the application’s hashing function to understand how the password hash is generated and then reverse the process. The required hash value can be obtained using CyberChef.

Information Gathering on Bizness Machine

Once we have started the VPN connection which requires a download from Hackthebox, we can start scanning the port

└──╼ $nmap -sC -sV -oA intial 
Starting Nmap 7.93 ( ) at 2024-05-24 21:57 EDT
Nmap scan report for
Host is up (0.27s latency).
Not shown: 997 closed tcp ports (conn-refused)
22/tcp  open  ssh      OpenSSH 8.4p1 Debian 5+deb11u3 (protocol 2.0)
| ssh-hostkey: 
|   3072 3e21d5dc2e61eb8fa63b242ab71c05d3 (RSA)
|   256 3911423f0c250008d72f1b51e0439d85 (ECDSA)
|_  256 b06fa00a9edfb17a497886b23540ec95 (ED25519)
80/tcp  open  http     nginx 1.18.0
|_http-server-header: nginx/1.18.0
|_http-title: Did not follow redirect to https://bizness.htb/
443/tcp open  ssl/http nginx 1.18.0
|_http-title: Did not follow redirect to https://bizness.htb/
| tls-nextprotoneg: 
|_  http/1.1
| tls-alpn: 
|_  http/1.1
|_http-server-header: nginx/1.18.0
|_ssl-date: TLS randomness does not represent time
| ssl-cert: Subject: organizationName=Internet Widgits Pty Ltd/stateOrProvinceName=Some-State/countryName=UK
| Not valid before: 2023-12-14T20:03:40
|_Not valid after:  2328-11-10T20:03:40
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

Service detection performed. Please report any incorrect results at .
Nmap done: 1 IP address (1 host up) scanned in 65.09 seconds
└──╼ $

Let’s access the website interface

Nothing interesting has been found on the website interface.

The source of structure for the Apache OFBiz here

Let’s jump into the structure that we found earlier after the research on the internet from GitHub.

On the website bottom, we managed to notice the 18.12 version of the Apache OFBiz.

CVE-2023-49070 Vulnerability

While looking for known security issues, we found a recent one called CVE-2023-49070. This issue allows attackers to bypass security checks when changing passwords because of a mistake in how the system handles these requests. Using this flaw, attackers can take control of the system by exploiting another problem found earlier in the software.

Pre-auth RCE Apache OFBiz 18.12.09

This security issue involves a way to bypass login checks in the outdated XML-RPC interface of OFBiz. The system incorrectly handles a parameter that can be used with requirePasswordChange, allowing access even with empty or incorrect login details. This flaw lets attackers skip the usual authentication process.

Java version 11 must be installed on the attacker’s machine for this exploit to work.

The source for the exploit can be found here

The Python script is run, and an error is provided stating that ysoserial-all.jar has not been found in the same directory.

We need to download the jar file from the same directory

Let’s run the command above to obtain the shell on our attacker’s machine

We have successfully on the reverse shell connection back to us.

We can read the user flag by typing the “cat user.txt” command

Escalate to Root Privileges Access

We have successfully sighted the hash while analysing the progress

Let’s crack the hash with Hashcat

After a few minutes, we managed to obtain the password for the root

Therefore, we should able to change to root privileges access

We can read the root flag by typing the “cat root.txt” command

Extra Information