Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | None | https://github.com/qq1549176285/CVE-2022-23131 | POC Details |
| 2 | cve-2022-23131 exp | https://github.com/jweny/CVE-2022-23131 | POC Details |
| 3 | cve-2022-23131 zabbix-saml-bypass-exp | https://github.com/Mr-xn/cve-2022-23131 | POC Details |
| 4 | None | https://github.com/1mxml/CVE-2022-23131 | POC Details |
| 5 | None | https://github.com/0tt7/CVE-2022-23131 | POC Details |
| 6 | poc | https://github.com/zwjjustdoit/cve-2022-23131 | POC Details |
| 7 | cve-2022-23131 | https://github.com/L0ading-x/cve-2022-23131 | POC Details |
| 8 | Zabbix SSO Bypass | https://github.com/random-robbie/cve-2022-23131-exp | POC Details |
| 9 | None | https://github.com/trganda/CVE-2022-23131 | POC Details |
| 10 | None | https://github.com/pykiller/CVE-2022-23131 | POC Details |
| 11 | None | https://github.com/Fa1c0n35/zabbix-cve-2022-23131 | POC Details |
| 12 | Zabbix - SAML SSO Authentication Bypass | https://github.com/kh4sh3i/CVE-2022-23131 | POC Details |
| 13 | CVE-2022-23131漏洞利用工具开箱即用。 | https://github.com/Kazaf6s/CVE-2022-23131 | POC Details |
| 14 | CVE-2022-23131漏洞批量检测与利用脚本 | https://github.com/SCAMagic/CVE-2022-23131poc-exp-zabbix- | POC Details |
| 15 | Zabbix-SAML-Bypass: CVE-2022-23131 | https://github.com/Vulnmachines/Zabbix-CVE-2022-23131 | POC Details |
| 16 | None | https://github.com/wr0x00/cve-2022-23131 | POC Details |
| 17 | zabbix saml bypass | https://github.com/Arrnitage/CVE-2022-23131_exp | POC Details |
| 18 | None | https://github.com/clearcdq/Zabbix-SAML-SSO-_CVE-2022-23131 | POC Details |
| 19 | None | https://github.com/r10lab/CVE-2022-23131 | POC Details |
| 20 | CVE-2022-23131 Zabbix Server SAML authentication exploit | https://github.com/fork-bombed/CVE-2022-23131 | POC Details |
| 21 | Zabbix Frontend Authentication Bypass Vulnerability | https://github.com/davidzzo23/CVE-2022-23131 | POC Details |
| 22 | None | https://github.com/dagowda/Zabbix-cve-2022-23131-SSO-bypass | POC Details |
| 23 | cve-2022-23131 exp | https://github.com/motherlytig/CVE-2022-23131 | POC Details |
| 24 | cve-2022-23131 exp | https://github.com/worstundersh/CVE-2022-23131 | POC Details |
| 25 | When SAML SSO authentication is enabled (non-default), session data can be modified by a malicious actor because a user login stored in the session was not verified. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2022/CVE-2022-23131.yaml | POC Details |
| 26 | None | https://github.com/Threekiii/Awesome-POC/blob/master/%E4%B8%AD%E9%97%B4%E4%BB%B6%E6%BC%8F%E6%B4%9E/Zabbix%20SAML%E8%BA%AB%E4%BB%BD%E7%BB%95%E8%BF%87%E6%BC%8F%E6%B4%9E%20CVE-2022-23131.md | POC Details |
No public POC found.
Login to generate AI POC| CVE-2022-23133 | 6.3 MEDIUM | Stored XSS in host groups configuration window in Zabbix Frontend |
| CVE-2022-23134 | 3.7 LOW | Possible view of the setup pages by unauthenticated users if config file already exists |
| CVE-2022-23132 | 3.3 LOW | Incorrect permissions of [/var/run/zabbix] forces dac_override |
No comments yet