Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2019-17382 PoC — Zabbix SIA Zabbix 授权问题漏洞

Source
Associated Vulnerability
Title:Zabbix SIA Zabbix 授权问题漏洞 (CVE-2019-17382)
Description:An issue was discovered in zabbix.php?action=dashboard.view&dashboardid=1 in Zabbix through 4.4. An attacker can bypass the login page and access the dashboard page, and then create a Dashboard, Report, Screen, or Map without any Username/Password (i.e., anonymously). All created elements (Dashboard/Report/Screen/Map) are accessible by other users and by an admin.
Readme
# CVE-2019-17382 - Zabbix Authentication Bypass

A critical vulnerability discovered in Zabbix versions up to 4.4. The issue exists within the zabbix.php file when accessing the dashboard.view action with dashboardid=1. It enables attackers to bypass the login page, granting unauthorized access to the dashboard creation feature. Consequently, an attacker can create Dashboards, Reports, Screens, or Maps without the need for valid credentials (Username/Password), essentially operating anonymously.

# Vulnerability Impact

By exploiting this vulnerability, unauthorized elements (Dashboard/Report/Screen/Map) can be created, all of which remain accessible not only to the attacker but also to other users and administrators within the system.

# Vulnerability Identification

The vulnerability can be identified by accessing the zabbix.php file with the following parameters:

/zabbix.php?action=dashboard.view&dashboardid=1

# Steps to Reproduce

    Access the Zabbix interface.
    Directly navigate to /zabbix.php?action=dashboard.view&dashboardid=1 in a web browser.
    Observe the ability to create Dashboard, Report, Screen, or Map without valid login credentials.

# Mitigation

It is highly recommended to upgrade to a patched version of Zabbix beyond 4.4 to mitigate this vulnerability. Additionally, restrict access to the affected endpoint and consider implementing stricter authentication controls to prevent unauthorized access.

# Disclaimer

This PoC is only meant for educational purposes! You are responsible for your own actions.
File Snapshot

[4.0K] /data/pocs/48fc65456234c46c2afd0dc7f6ea921c405b6590 ├── [3.7K] CVE-2019-17382.py └── [1.5K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →