
    <rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
      <channel>
        <title>Leopard&#39;s Blogsite</title>
        <link>https://le0pard.vercel.app/blog</link>
        <description></description>
        <language>en-us</language>
        <managingEditor>Leopardplaysctf@gmail.com (Yasir Mehmood)</managingEditor>
        <webMaster>Leopardplaysctf@gmail.com (Yasir Mehmood)</webMaster>
        <lastBuildDate>Mon, 08 Dec 2025 00:00:00 GMT</lastBuildDate>
        <atom:link href="https://le0pard.vercel.app/tags/xml/feed.xml" rel="self" type="application/rss+xml"/>
        
    <item>
      <guid>https://le0pard.vercel.app/blog/HTB-Editor-Writeup</guid>
      <title>Hack-The-Box - Easy - Linux - Editor</title>
      <link>https://le0pard.vercel.app/blog/HTB-Editor-Writeup</link>
      <description>This Hack-The-Box Editor write-up details exploiting an unauthenticated XWiki RCE (CVE-2025-24893) to gain an xwiki shell. Plaintext credentials found in config files allow pivoting to the oliver user, while final root access is achieved by abusing Netdata’s SUID ndsudo binary (CVE-2024-32019) through PATH hijacking.</description>
      <pubDate>Mon, 08 Dec 2025 00:00:00 GMT</pubDate>
      <author>Leopardplaysctf@gmail.com (Yasir Mehmood)</author>
      <category>ALL BLOGS</category><category>Hack-The-Box</category><category>Pentesting</category><category>Season-8</category><category>Linux</category><category>Easy</category><category>Xwiki</category><category>CVE-2025-24893</category><category>Netdata</category><category>Ndsudo</category><category>Path-Hijack</category><category>CVE-2024-32019</category><category>RCE</category><category>Groovy</category><category>SolrSearch</category><category>Jetty</category><category>SUID</category><category>Config-File</category><category>Custom-Binary</category><category>Port-Forwarding</category><category>Mega-CLI</category><category>XML</category><category>Whitelist-Bypassing</category><category>Pivoting</category>
    </item>
  
      </channel>
    </rss>
  