The post explores the exploitation of a critical SQL injection vulnerability in a Zabbix server made public in December 2024. It details how to use the source code to extract data from the database, gain root access by exploiting sudo nmap with a custom wrapper, and achieve remote code execution (RCE). It also discusses
Sort: