Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-17382 PoC — Zabbix SIA Zabbix 授权问题漏洞

Source
Associated Vulnerability
Title:Zabbix SIA Zabbix 授权问题漏洞 (CVE-2019-17382)
Description:Zabbix SIA Zabbix是拉脱维亚Zabbix SIA公司的一套开源的监控系统。该系统支持网络监控、服务器监控、云监控和应用监控等。 Zabbix 4.4及之前版本中的zabbix.php?action=dashboard.view&dashboardid=1存在授权问题漏洞。该漏洞源于网络系统或产品中缺少身份验证措施或身份验证强度不足。
Readme
# CVE-2019-17382 - Zabbix Authentication Bypass

A critical vulnerability discovered in Zabbix versions up to 4.4. The issue exists within the zabbix.php file when accessing the dashboard.view action with dashboardid=1. It enables attackers to bypass the login page, granting unauthorized access to the dashboard creation feature. Consequently, an attacker can create Dashboards, Reports, Screens, or Maps without the need for valid credentials (Username/Password), essentially operating anonymously.

# Vulnerability Impact

By exploiting this vulnerability, unauthorized elements (Dashboard/Report/Screen/Map) can be created, all of which remain accessible not only to the attacker but also to other users and administrators within the system.

# Vulnerability Identification

The vulnerability can be identified by accessing the zabbix.php file with the following parameters:

/zabbix.php?action=dashboard.view&dashboardid=1

# Steps to Reproduce

    Access the Zabbix interface.
    Directly navigate to /zabbix.php?action=dashboard.view&dashboardid=1 in a web browser.
    Observe the ability to create Dashboard, Report, Screen, or Map without valid login credentials.

# Mitigation

It is highly recommended to upgrade to a patched version of Zabbix beyond 4.4 to mitigate this vulnerability. Additionally, restrict access to the affected endpoint and consider implementing stricter authentication controls to prevent unauthorized access.

# Disclaimer

This PoC is only meant for educational purposes! You are responsible for your own actions.
File Snapshot

[4.0K] /data/pocs/48fc65456234c46c2afd0dc7f6ea921c405b6590 ├── [3.7K] CVE-2019-17382.py └── [1.5K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.