Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-23131 PoC — Zabbix 安全漏洞

Source
Associated Vulnerability
Title:Zabbix 安全漏洞 (CVE-2022-23131)
Description:Zabbix是拉脱维亚Zabbix公司的一套开源的监控系统。该系统支持网络监控、服务器监控、云监控和应用监控等。 Zabbix 存在安全漏洞,该漏洞源于在启用 SAML SSO 身份验证(非默认)的情况下,恶意行为者可以修改会话数据,因为存储在会话中的用户登录未经过验证。 未经身份验证的恶意攻击者可能会利用此问题来提升权限并获得对 Zabbix 前端的管理员访问权限。
Description
Zabbix Frontend Authentication Bypass Vulnerability
Readme
# CVE-2022-23131
Zabbix Frontend Authentication Bypass Vulnerability

## Description
This script is an exploit for **CVE-2022-23131**, a vulnerability in the Zabbix SSO (Single Sign-On) mechanism. The vulnerability allows an attacker to bypass authentication via a specially crafted `zbx_session` cookie, giving unauthorized access to the Zabbix dashboard.

Zabbix versions 5.4.0 through 5.4.8 and 6.0.0alpha2 through 6.0.0rc1 are vulnerable.

## Usage
This script checks if a target is vulnerable to **CVE-2022-23131** and retrieves the `zbx_session` cookie for further use.
To  successfully run this script you will need a valid username of Zabbix user.

### How to Run the Exploit
1. Clone the repository to your local machine:
   ```bash
   git clone https://github.com/davidzzo23/cve-2022-23131.git
   cd cve-2022-23131-exploit
   ```
2. Run the script with the following command:
   ```bash
   python3 CVE-2022-23131.py <target_url> <username>
   ```
3. Example usage:
   ```bash
   python3 exploit.py https://192.168.210.13 admin
   ```
4. Copy and paste the cookie value into the "zbx_session" Cookie and refresh the page to get authenticated as the specified user.

## Disclaimer

This script is intended for educational purposes only. Unauthorized use of this exploit on systems without permission is illegal. The author is not responsible for any misuse or damages caused by this exploit.
File Snapshot

[4.0K] /data/pocs/69ebc07f1c0af5dde14947ac4699d48e73abfa27 ├── [3.0K] CVE-2022-23131.py └── [1.4K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.