Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2022-23131 PoC — Unsafe client-side session storage leading to authentication bypass/instance takeover via Zabbix Frontend with configure

Source
Associated Vulnerability
Title:Unsafe client-side session storage leading to authentication bypass/instance takeover via Zabbix Frontend with configured SAML (CVE-2022-23131)
Description:In the case of instances where the SAML SSO authentication is enabled (non-default), session data can be modified by a malicious actor, because a user login stored in the session was not verified. Malicious unauthenticated actor may exploit this issue to escalate privileges and gain admin access to Zabbix Frontend. To perform the attack, SAML authentication is required to be enabled and the actor has to know the username of Zabbix user (or use the guest account, which is disabled by default).
Readme
# Zabbix-cve-2022-23131-SSO-bypass
To bypass the Zabbix SSO login portal,make sure to take the cookie from your browser.Replace it with the one, that is in the script.
Make sure to also change  the username you wnat to login as and run the exploit(most of the time its going to be "Admin" in Zabbix).
Now take the "encoded payload" part which is printed(thats you new modified jwt) and replace it with your current jwt token to login.

File Snapshot

[4.0K] /data/pocs/91115ded96f81ae1371e17845c8abdde957a2665 ├── [1.7K] cve-2022-23131.py └── [ 436] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →