HTB Watcher — From Zabbix CVE‑2024‑22120 to Admin/RCE and a ... #1475
+170
−2
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
🤖 Automated Content Update
This PR was automatically generated by the HackTricks News Bot based on a technical blog post.
📝 Source Information
🎯 Content Summary
Target
HTB Watcher (Linux, Ubuntu 22.04). Open ports: SSH(22), HTTP(80), Zabbix agent/server (10050/10051). Virtual hosts:
watcher.vl
(static Apache),zabbix.watcher.vl
(Zabbix GUI).Recon
- Full scan:
nmap -p- -vvv --min-rate 10000 10.129.214.16
- Version scan:
nmap -p 22,80,10050,10051 -sCV 10.129.214.16
→ OpenSSH 8.9p1 Ubuntu 3ubuntu0.13; Apache 2.4.52 (Ubuntu). TTL 63 suggests Linux one hop away.<b...🔧 Technical Details
Time‑based blind SQLi in Zabbix audit log (CVE‑2024‑22120): Trigger a Zabbix “Script” execution against any accessible host to force an Audit Log insert whose unsanitized
clientip
is exploitable for time‑based blind SQLi. Use a POC over trapper port 10051 with a guestsessionid
, a validhostid
, and an allowedscriptid
(e.g., 1 or 2) to brute theconfig.session_key
and adminsession_id
. Forge a validzbx_session
by Base64‑encoding JSON containingsessionid
and a correctsign
computed withsession_key
; authenticate as Admin and run Scripts for RCE.Admin cookie alternatives: Either use the Login‑as‑Admin PoC to output a ready cookie (comment its hardcoded proxy) or reset the Admin password directly in the database using the documented bcrypt for “zabbix”.
Stealing credentials via login hook: Patch
/usr/share/zabbix/ind...
🤖 Agent Actions
I analyzed the blog and related technical sources and updated HackTricks with a focused vendor page covering Zabbix security and the CVE‑2024‑22120 time-based blind SQL injection chain to Admin cookie forgery and RCE, plus post-exploitation pivoting techniques.
What I added/changed:
Created a new page: src/network-services-pentesting/pentesting-web/zabbix.md
Linked the new page in the web tech tricks list:
Why this is the right place:
Notes:
No other changes were necessary because:
This PR was automatically created by the HackTricks Feed Bot. Please review the changes carefully before merging.