nomisec
WORKING POC
154 stars
by Mr-xn · remote
https://github.com/Mr-xn/cve-2022-23131
This PoC exploits CVE-2022-23131, an authentication bypass vulnerability in Zabbix's SAML SSO implementation. It manipulates the `zbx_session` cookie to forge a session with arbitrary user credentials, bypassing authentication.
Classification
Working Poc 95%
Target:
Zabbix (versions affected by CVE-2022-23131)
No auth needed
Prerequisites:
Target must have SAML SSO enabled · Access to the target's login page
nomisec
WORKING POC
94 stars
by jweny · poc
https://github.com/jweny/CVE-2022-23131
This PoC exploits CVE-2022-23131, an authentication bypass vulnerability in Zabbix via SAML manipulation. It checks for the presence of SAML in the target and attempts to bypass authentication by modifying the session cookie to include a custom username.
Classification
Working Poc 95%
Target:
Zabbix (versions affected by CVE-2022-23131)
No auth needed
Prerequisites:
Target must have SAML enabled · Target must be vulnerable to CVE-2022-23131
nomisec
WORKING POC
29 stars
by L0ading-x · remote
https://github.com/L0ading-x/cve-2022-23131
This PoC exploits CVE-2022-23131, an authentication bypass vulnerability in Zabbix, by manipulating the SAML session data to generate a signed session cookie. The exploit allows an attacker to bypass authentication and gain administrative access by replacing the session cookie and using the SAML SSO login method.
Classification
Working Poc 90%
Target:
Zabbix (versions affected by CVE-2022-23131)
No auth needed
Prerequisites:
Target Zabbix instance URL · Admin username (default: 'Admin')
nomisec
WORKING POC
15 stars
by kh4sh3i · remote
https://github.com/kh4sh3i/CVE-2022-23131
This PoC exploits CVE-2022-23131, an authentication bypass vulnerability in Zabbix when SAML SSO is enabled. It manipulates session data by modifying the 'zbx_session' cookie to impersonate a user without proper validation.
Classification
Working Poc 95%
Target:
Zabbix (with SAML SSO enabled)
No auth needed
Prerequisites:
SAML SSO enabled in Zabbix · Access to the target Zabbix instance
nomisec
WORKING POC
11 stars
by Kazaf6s · infoleak
https://github.com/Kazaf6s/CVE-2022-23131
This PoC exploits CVE-2022-23131, an unsafe session storage vulnerability in Zabbix Frontend. It manipulates the `zbx_session` cookie to bypass authentication and escalate privileges to admin by injecting a modified SAML data payload.
Classification
Working Poc 95%
Target:
Zabbix Frontend (versions 5.4.8, 5.0.18, 4.0.36)
No auth needed
Prerequisites:
SAML SSO authentication enabled in Zabbix · Access to the target Zabbix instance
nomisec
WORKING POC
8 stars
by SCAMagic · poc
https://github.com/SCAMagic/CVE-2022-23131poc-exp-zabbix-
This repository contains a proof-of-concept exploit and scanner for CVE-2022-23131, an authentication bypass vulnerability in Zabbix. The scripts include a scanner for detecting vulnerable instances and an exploit that leverages Selenium to automate the exploitation process.
Classification
Working Poc 90%
Target:
Zabbix (versions affected by CVE-2022-23131)
No auth needed
Prerequisites:
Python 3 · Selenium · ChromeDriver · target URL
nomisec
WORKING POC
8 stars
by random-robbie · remote
https://github.com/random-robbie/cve-2022-23131-exp
This is a Python-based exploit for CVE-2022-23131, an authentication bypass vulnerability in Zabbix. It manipulates the `zbx_session` cookie to bypass SSO authentication by injecting a modified username into the decoded session data.
Classification
Working Poc 95%
Target:
Zabbix (versions affected by CVE-2022-23131)
No auth needed
Prerequisites:
Target Zabbix server with SSO enabled · Network access to the Zabbix server
nomisec
WORKING POC
4 stars
by fork-bombed · remote
https://github.com/fork-bombed/CVE-2022-23131
This Python script exploits CVE-2022-23131, a SAML authentication bypass in Zabbix, by manipulating the `zbx_session` cookie to generate an authenticated session for a specified user (default: Admin). It tests the session by accessing the Zabbix dashboard and outputs the authenticated session if successful.
Classification
Working Poc 95%
Target:
Zabbix (versions affected by CVE-2022-23131)
No auth needed
Prerequisites:
Target Zabbix server URL · Network access to the target · SAML misconfiguration on the target
nomisec
WORKING POC
3 stars
by davidzzo23 · infoleak
https://github.com/davidzzo23/CVE-2022-23131
This PoC exploits CVE-2022-23131, an authentication bypass vulnerability in Zabbix's SSO mechanism. It crafts a malicious `zbx_session` cookie to bypass authentication and gain unauthorized access to the Zabbix dashboard.
Classification
Working Poc 95%
Target:
Zabbix versions 5.4.0 through 5.4.8 and 6.0.0alpha2 through 6.0.0rc1
No auth needed
Prerequisites:
Valid username of a Zabbix user · Access to the target Zabbix instance
nomisec
SCANNER
3 stars
by 1mxml · poc
https://github.com/1mxml/CVE-2022-23131
This PoC is a simple scanner for CVE-2022-23131, a SAML SSO bypass vulnerability in Zabbix. It sends a crafted request with a malicious SAML session cookie and checks for a 302 redirect to confirm the vulnerability.
Classification
Scanner 90%
Target:
Zabbix (version not specified)
No auth needed
Prerequisites:
Target must be a Zabbix instance with SAML SSO enabled
nomisec
WRITEUP
2 stars
by Vulnmachines · poc
https://github.com/Vulnmachines/Zabbix-CVE-2022-23131
This repository contains a writeup for CVE-2022-23131, an authentication bypass vulnerability in Zabbix with SAML SSO enabled. The issue allows privilege escalation to admin access due to insecure client-side session storage.
Classification
Writeup 90%
Target:
Zabbix 5.4.0 – 5.4.8; 6.0.0alpha1
No auth needed
Prerequisites:
Zabbix instance with SAML SSO enabled
nomisec
WORKING POC
2 stars
by pykiller · remote
https://github.com/pykiller/CVE-2022-23131
This PoC exploits CVE-2022-23131, an authentication bypass vulnerability in Zabbix's SSO mechanism. It manipulates the `zbx_session` cookie to forge a session and bypass authentication, potentially granting unauthorized access.
Classification
Working Poc 90%
Target:
Zabbix (versions affected by CVE-2022-23131)
No auth needed
Prerequisites:
Target URL list file · Network access to the Zabbix instance
nomisec
WORKING POC
1 stars
by wr0x00 · remote
https://github.com/wr0x00/cve-2022-23131
This PoC exploits CVE-2022-23131, an authentication bypass vulnerability in Zabbix, by crafting a malicious SAML session cookie. It decodes the existing session, modifies the username attribute, and re-encodes it to bypass authentication.
Classification
Working Poc 90%
Target:
Zabbix (versions affected by CVE-2022-23131)
No auth needed
Prerequisites:
Target must be running a vulnerable version of Zabbix with SAML enabled
nomisec
WORKING POC
1 stars
by Fa1c0n35 · poc
https://github.com/Fa1c0n35/zabbix-cve-2022-23131
This PoC exploits CVE-2022-23131, an authentication bypass vulnerability in Zabbix due to unsafe session storage. It manipulates the `zbx_session` cookie to bypass SAML authentication by injecting a crafted username into the session data.
Classification
Working Poc 95%
Target:
Zabbix (versions affected by CVE-2022-23131)
No auth needed
Prerequisites:
Target Zabbix instance with SAML authentication enabled · Network access to the Zabbix server
nomisec
WORKING POC
1 stars
by trganda · poc
https://github.com/trganda/CVE-2022-23131
This PoC exploits CVE-2022-23131, a SAML SSO authentication bypass in Zabbix. It manipulates the session cookie to inject a custom username, bypassing authentication.
Classification
Working Poc 95%
Target:
Zabbix (with SAML SSO enabled)
No auth needed
Prerequisites:
Zabbix instance with SAML SSO configured · Network access to the target
nomisec
WORKING POC
1 stars
by zwjjustdoit · remote
https://github.com/zwjjustdoit/cve-2022-23131
This repository contains a proof-of-concept exploit for CVE-2022-23131, a SAML SSO authentication bypass vulnerability in Zabbix. The exploit manipulates the `zbx_session` cookie to bypass authentication and gain admin access.
Classification
Working Poc 95%
Target:
Zabbix (versions affected by CVE-2022-23131)
No auth needed
Prerequisites:
Access to the Zabbix web interface · SAML SSO enabled
nomisec
WORKING POC
by dagowda · remote
https://github.com/dagowda/Zabbix-cve-2022-23131-SSO-bypass
This PoC exploits CVE-2022-23131, an authentication bypass vulnerability in Zabbix, by manipulating a JWT token in the 'zbx_session' cookie to impersonate an admin user. It decodes the cookie, modifies the payload to include an admin username, and re-encodes it for use in bypassing SSO.
Classification
Working Poc 90%
Target:
Zabbix (versions affected by CVE-2022-23131)
No auth needed
Prerequisites:
Valid 'zbx_session' cookie from a logged-in user · Knowledge of the target admin username (default: 'Admin')
nomisec
WORKING POC
by r10lab · remote
https://github.com/r10lab/CVE-2022-23131
This PoC exploits CVE-2022-23131, an authentication bypass vulnerability in Zabbix. It extracts session cookies, decodes them, and crafts a payload to bypass authentication by manipulating the SAML data.
Classification
Working Poc 90%
Target:
Zabbix (versions affected by CVE-2022-23131)
No auth needed
Prerequisites:
Target URL list in 'urls.txt' · Network access to the target
nomisec
WORKING POC
by Arrnitage · infoleak
https://github.com/Arrnitage/CVE-2022-23131_exp
This PoC exploits CVE-2022-23131, an authentication bypass vulnerability in Zabbix, by manipulating the SAML session cookie to impersonate an arbitrary user (default: Admin). It decodes the session cookie, modifies the username attribute, and re-encodes it for use in a forged session.
Classification
Working Poc 95%
Target:
Zabbix (versions affected by CVE-2022-23131)
No auth needed
Prerequisites:
Target Zabbix instance with SAML authentication enabled · Network access to the Zabbix web interface
vulncheck_xdb
WORKING POC
remote
https://github.com/jweny/zabbix-saml-bypass-exp
This repository contains a functional exploit for CVE-2022-23131, a SAML authentication bypass vulnerability in Zabbix. The PoC manipulates the 'zbx_session' cookie to forge SAML data, allowing unauthorized access as any user (default: Admin).
Classification
Working Poc 95%
Target:
Zabbix (versions with SAML support, likely <= 5.4.8, 6.0.0beta1)
No auth needed
Prerequisites:
SAML authentication enabled in Zabbix · Access to the target's login page