Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-23131 PoC — Zabbix 安全漏洞

Source
Associated Vulnerability
Title:Zabbix 安全漏洞 (CVE-2022-23131)
Description:Zabbix是拉脱维亚Zabbix公司的一套开源的监控系统。该系统支持网络监控、服务器监控、云监控和应用监控等。 Zabbix 存在安全漏洞,该漏洞源于在启用 SAML SSO 身份验证(非默认)的情况下,恶意行为者可以修改会话数据,因为存储在会话中的用户登录未经过验证。 未经身份验证的恶意攻击者可能会利用此问题来提升权限并获得对 Zabbix 前端的管理员访问权限。
Description
Zabbix SSO Bypass
Readme
# Zabbix SSO Auth Bypass CVE-2022-23131

```
usage: zabbix_session_exp.py [-h] [-t TARGET] [-u USERNAME] [-p PROXY] [-f FILES]

optional arguments:
  -h, --help            show this help message and exit
  -t TARGET, --target TARGET
                        Zabbix Server
  -u USERNAME, --username USERNAME
                        Zabbix Admin User
  -p PROXY, --proxy PROXY
                        Proxy for debugging
  -f FILES, --files FILES
                        Files of URLS of Zabbix Servers to Test
  
 ```
 
 Try this on a VPS Link Below

[![DigitalOcean Referral Badge](https://web-platforms.sfo2.cdn.digitaloceanspaces.com/WWW/Badge%201.svg)](https://www.digitalocean.com/?refcode=e22bbff5f6f1&utm_campaign=Referral_Invite&utm_medium=Referral_Program&utm_source=badge)

File Snapshot

[4.0K] /data/pocs/1ef317525a9970ffec9872bf0a779b1b034f2f39 ├── [ 782] README.md └── [3.2K] zabbix.py 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.