Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-23131 PoC — Unsafe client-side session storage leading to authentication bypass/instance takeover via Zabbix Frontend with configure

Source
Associated Vulnerability
Title:Unsafe client-side session storage leading to authentication bypass/instance takeover via Zabbix Frontend with configured SAML (CVE-2022-23131)
Description:In the case of instances where the SAML SSO authentication is enabled (non-default), session data can be modified by a malicious actor, because a user login stored in the session was not verified. Malicious unauthenticated actor may exploit this issue to escalate privileges and gain admin access to Zabbix Frontend. To perform the attack, SAML authentication is required to be enabled and the actor has to know the username of Zabbix user (or use the guest account, which is disabled by default).
Description
Zabbix Frontend Authentication Bypass Vulnerability
Readme
# CVE-2022-23131
Zabbix Frontend Authentication Bypass Vulnerability

## Description
This script is an exploit for **CVE-2022-23131**, a vulnerability in the Zabbix SSO (Single Sign-On) mechanism. The vulnerability allows an attacker to bypass authentication via a specially crafted `zbx_session` cookie, giving unauthorized access to the Zabbix dashboard.

Zabbix versions 5.4.0 through 5.4.8 and 6.0.0alpha2 through 6.0.0rc1 are vulnerable.

## Usage
This script checks if a target is vulnerable to **CVE-2022-23131** and retrieves the `zbx_session` cookie for further use.
To  successfully run this script you will need a valid username of Zabbix user.

### How to Run the Exploit
1. Clone the repository to your local machine:
   ```bash
   git clone https://github.com/davidzzo23/cve-2022-23131.git
   cd cve-2022-23131-exploit
   ```
2. Run the script with the following command:
   ```bash
   python3 CVE-2022-23131.py <target_url> <username>
   ```
3. Example usage:
   ```bash
   python3 exploit.py https://192.168.210.13 admin
   ```
4. Copy and paste the cookie value into the "zbx_session" Cookie and refresh the page to get authenticated as the specified user.

## Disclaimer

This script is intended for educational purposes only. Unauthorized use of this exploit on systems without permission is illegal. The author is not responsible for any misuse or damages caused by this exploit.
File Snapshot

[4.0K] /data/pocs/69ebc07f1c0af5dde14947ac4699d48e73abfa27 ├── [3.0K] CVE-2022-23131.py └── [1.4K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →