Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-23131— Unsafe client-side session storage leading to authentication bypass/instance takeover via Zabbix Frontend with configured SAML

CVSS 9.1 · Critical KEV EPSS 94.05% · P100
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2022-23131

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Unsafe client-side session storage leading to authentication bypass/instance takeover via Zabbix Frontend with configured SAML
Source: NVD (National Vulnerability Database)
Vulnerability Description
In the case of instances where the SAML SSO authentication is enabled (non-default), session data can be modified by a malicious actor, because a user login stored in the session was not verified. Malicious unauthenticated actor may exploit this issue to escalate privileges and gain admin access to Zabbix Frontend. To perform the attack, SAML authentication is required to be enabled and the actor has to know the username of Zabbix user (or use the guest account, which is disabled by default).
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
使用欺骗进行的认证绕过
Source: NVD (National Vulnerability Database)
Vulnerability Title
Zabbix 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Zabbix是拉脱维亚Zabbix公司的一套开源的监控系统。该系统支持网络监控、服务器监控、云监控和应用监控等。 Zabbix 存在安全漏洞,该漏洞源于在启用 SAML SSO 身份验证(非默认)的情况下,恶意行为者可以修改会话数据,因为存储在会话中的用户登录未经过验证。 未经身份验证的恶意攻击者可能会利用此问题来提升权限并获得对 Zabbix 前端的管理员访问权限。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
ZabbixFrontend 5.4.0 - 5.4.8 -

II. Public POCs for CVE-2022-23131

#POC DescriptionSource LinkShenlong Link
1Nonehttps://github.com/qq1549176285/CVE-2022-23131POC Details
2cve-2022-23131 exphttps://github.com/jweny/CVE-2022-23131POC Details
3cve-2022-23131 zabbix-saml-bypass-exphttps://github.com/Mr-xn/cve-2022-23131POC Details
4Nonehttps://github.com/1mxml/CVE-2022-23131POC Details
5Nonehttps://github.com/0tt7/CVE-2022-23131POC Details
6pochttps://github.com/zwjjustdoit/cve-2022-23131POC Details
7cve-2022-23131https://github.com/L0ading-x/cve-2022-23131POC Details
8Zabbix SSO Bypasshttps://github.com/random-robbie/cve-2022-23131-expPOC Details
9Nonehttps://github.com/trganda/CVE-2022-23131POC Details
10Nonehttps://github.com/pykiller/CVE-2022-23131POC Details
11Nonehttps://github.com/Fa1c0n35/zabbix-cve-2022-23131POC Details
12Zabbix - SAML SSO Authentication Bypasshttps://github.com/kh4sh3i/CVE-2022-23131POC Details
13CVE-2022-23131漏洞利用工具开箱即用。https://github.com/Kazaf6s/CVE-2022-23131POC Details
14CVE-2022-23131漏洞批量检测与利用脚本https://github.com/SCAMagic/CVE-2022-23131poc-exp-zabbix-POC Details
15Zabbix-SAML-Bypass: CVE-2022-23131https://github.com/Vulnmachines/Zabbix-CVE-2022-23131POC Details
16Nonehttps://github.com/wr0x00/cve-2022-23131POC Details
17zabbix saml bypasshttps://github.com/Arrnitage/CVE-2022-23131_expPOC Details
18Nonehttps://github.com/clearcdq/Zabbix-SAML-SSO-_CVE-2022-23131POC Details
19Nonehttps://github.com/r10lab/CVE-2022-23131POC Details
20CVE-2022-23131 Zabbix Server SAML authentication exploithttps://github.com/fork-bombed/CVE-2022-23131POC Details
21Zabbix Frontend Authentication Bypass Vulnerabilityhttps://github.com/davidzzo23/CVE-2022-23131POC Details
22Nonehttps://github.com/dagowda/Zabbix-cve-2022-23131-SSO-bypassPOC Details
23cve-2022-23131 exphttps://github.com/motherlytig/CVE-2022-23131POC Details
24cve-2022-23131 exphttps://github.com/worstundersh/CVE-2022-23131POC Details
25When SAML SSO authentication is enabled (non-default), session data can be modified by a malicious actor because a user login stored in the session was not verified.https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2022/CVE-2022-23131.yamlPOC Details
26Nonehttps://github.com/Threekiii/Awesome-POC/blob/master/%E4%B8%AD%E9%97%B4%E4%BB%B6%E6%BC%8F%E6%B4%9E/Zabbix%20SAML%E8%BA%AB%E4%BB%BD%E7%BB%95%E8%BF%87%E6%BC%8F%E6%B4%9E%20CVE-2022-23131.mdPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2022-23131

登录查看更多情报信息。

Same Patch Batch · Zabbix · 2022-01-13 · 4 CVEs total

CVE-2022-231336.3 MEDIUMStored XSS in host groups configuration window in Zabbix Frontend
CVE-2022-231343.7 LOWPossible view of the setup pages by unauthenticated users if config file already exists
CVE-2022-231323.3 LOWIncorrect permissions of [/var/run/zabbix] forces dac_override

IV. Related Vulnerabilities

V. Comments for CVE-2022-23131

No comments yet


Leave a comment