Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-23131 PoC — Zabbix 安全漏洞

Source
Associated Vulnerability
Title:Zabbix 安全漏洞 (CVE-2022-23131)
Description:Zabbix是拉脱维亚Zabbix公司的一套开源的监控系统。该系统支持网络监控、服务器监控、云监控和应用监控等。 Zabbix 存在安全漏洞,该漏洞源于在启用 SAML SSO 身份验证(非默认)的情况下,恶意行为者可以修改会话数据,因为存储在会话中的用户登录未经过验证。 未经身份验证的恶意攻击者可能会利用此问题来提升权限并获得对 Zabbix 前端的管理员访问权限。
Description
Zabbix - SAML SSO Authentication Bypass
Readme
# CVE-2022-23131
Zabbix - SAML SSO Authentication Bypass

## Description
 In the case of instances where the SAML SSO authentication is enabled (non-default), session data can be modified by a malicious actor, because a user login stored in the session was not verified.

 ## Dork:
  ```
  shodan-query: http.favicon.hash:892542951
  ```
  
  ```
  fofa-query: app="ZABBIX-监控系统" && body="saml"
 ```
 
 
 ## usage
 ````
 python3 zabbix_session_exp.py  -t https:target.com -u Admin
 ````
 
 
 ### refrences
 * https://nvd.nist.gov/vuln/detail/CVE-2022-23131
 * https://blog.sonarsource.com/zabbix-case-study-of-unsafe-session-storage
 * https://github.com/Mr-xn/cve-2022-23131
 * https://github.com/projectdiscovery/nuclei-templates
File Snapshot

[4.0K] /data/pocs/6cd606463f144b6ca3b5a98c469ca93274d2cafc ├── [1.3K] CVE-2022-23131.yaml ├── [ 739] README.md └── [4.1K] zabbix_session_exp.py 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.