Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-23131 PoC — Zabbix 安全漏洞

Source
Associated Vulnerability
Title:Zabbix 安全漏洞 (CVE-2022-23131)
Description:Zabbix是拉脱维亚Zabbix公司的一套开源的监控系统。该系统支持网络监控、服务器监控、云监控和应用监控等。 Zabbix 存在安全漏洞,该漏洞源于在启用 SAML SSO 身份验证(非默认)的情况下,恶意行为者可以修改会话数据,因为存储在会话中的用户登录未经过验证。 未经身份验证的恶意攻击者可能会利用此问题来提升权限并获得对 Zabbix 前端的管理员访问权限。
Description
Zabbix-SAML-Bypass: CVE-2022-23131
Readme
# Zabbix-CVE-2022-23131
Zabbix-SAML-Bypass: CVE-2022-23131


### Description: 
Zabbix is vulnerable to Frontend Authentication Bypass Vulnerability with enabled
SAML SSO authentication, due to insecure client-side session storage. On successful exploit
of this issue, it allows a malicious actor to escalate privileges and unauthorized admin
access to Zabbix frontend.

#### Affected Version: 5.4.0 – 5.4.8; 6.0.0alpha1
### Dork: 
`http.favicon.hash:892542951`

### Mitigation 
It is recommended to upgrade all the instances that are running with Zabbix Web
Frontend to 6.0.0beta2, 5.4.9, 5.0.19, or 4.0.37

#### Follow us 
#### [Vulnmachines Platform](https://www.vulnmachines.com)
#### [YouTube](https://www.youtube.com/c/vulnmachines)
#### [Twitter](https://www.twitter.com/vulnmachines)
#### [Facebook](https://www.facebook.com/vulnmachines)
#### [LinkedIn](https://www.linkedin.com/company/vulnmachines)
File Snapshot

[4.0K] /data/pocs/996241c367fceec38c101e68b3a5f8364246c186 └── [ 911] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.