CVE-2022-23131

CRITICAL KEV NUCLEI

Zabbix < 5.4.8 - Authentication Bypass by Spoofing

Title source: rule

Description

In the case of instances where the SAML SSO authentication is enabled (non-default), session data can be modified by a malicious actor, because a user login stored in the session was not verified. Malicious unauthenticated actor may exploit this issue to escalate privileges and gain admin access to Zabbix Frontend. To perform the attack, SAML authentication is required to be enabled and the actor has to know the username of Zabbix user (or use the guest account, which is disabled by default).

Exploits (22)

nomisec WORKING POC 154 stars
by Mr-xn · remote
https://github.com/Mr-xn/cve-2022-23131
nomisec WORKING POC 94 stars
by jweny · poc
https://github.com/jweny/CVE-2022-23131
nomisec WORKING POC 29 stars
by L0ading-x · remote
https://github.com/L0ading-x/cve-2022-23131
nomisec WORKING POC 15 stars
by kh4sh3i · remote
https://github.com/kh4sh3i/CVE-2022-23131
nomisec WORKING POC 11 stars
by Kazaf6s · infoleak
https://github.com/Kazaf6s/CVE-2022-23131
nomisec WORKING POC 8 stars
by SCAMagic · poc
https://github.com/SCAMagic/CVE-2022-23131poc-exp-zabbix-
nomisec WORKING POC 8 stars
by random-robbie · remote
https://github.com/random-robbie/cve-2022-23131-exp
nomisec WORKING POC 4 stars
by fork-bombed · remote
https://github.com/fork-bombed/CVE-2022-23131
nomisec WORKING POC 3 stars
by davidzzo23 · infoleak
https://github.com/davidzzo23/CVE-2022-23131
nomisec SCANNER 3 stars
by 1mxml · poc
https://github.com/1mxml/CVE-2022-23131
nomisec WRITEUP 2 stars
by Vulnmachines · poc
https://github.com/Vulnmachines/Zabbix-CVE-2022-23131
nomisec WORKING POC 2 stars
by pykiller · remote
https://github.com/pykiller/CVE-2022-23131
nomisec NO CODE 1 stars
by clearcdq · poc
https://github.com/clearcdq/Zabbix-SAML-SSO-_CVE-2022-23131
nomisec WORKING POC 1 stars
by wr0x00 · remote
https://github.com/wr0x00/cve-2022-23131
nomisec WORKING POC 1 stars
by Fa1c0n35 · poc
https://github.com/Fa1c0n35/zabbix-cve-2022-23131
nomisec WORKING POC 1 stars
by trganda · poc
https://github.com/trganda/CVE-2022-23131
nomisec WORKING POC 1 stars
by zwjjustdoit · remote
https://github.com/zwjjustdoit/cve-2022-23131
nomisec WORKING POC
by dagowda · remote
https://github.com/dagowda/Zabbix-cve-2022-23131-SSO-bypass
nomisec WORKING POC
by r10lab · remote
https://github.com/r10lab/CVE-2022-23131
nomisec WORKING POC
by Arrnitage · infoleak
https://github.com/Arrnitage/CVE-2022-23131_exp
vulncheck_xdb WORKING POC
remote
https://github.com/jweny/zabbix-saml-bypass-exp

Nuclei Templates (1)

Zabbix - SAML SSO Authentication Bypass
CRITICALby For3stCo1d,spac3wh1te
Shodan: http.favicon.hash:892542951 || http.title:"zabbix-server" || cpe:"cpe:2.3:a:zabbix:zabbix"
FOFA: app="ZABBIX-监控系统" && body="saml" || icon_hash=892542951 || app="zabbix-监控系统" && body="saml" || title="zabbix-server"

Scores

CVSS v3 9.1
EPSS 0.9405
EPSS Percentile 99.9%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

Details

CISA KEV 2022-02-22
VulnCheck KEV 2022-02-22
InTheWild.io 2022-02-22
ENISA EUVD EUVD-2022-28222
CWE
CWE-290
Status published
Products (2)
zabbix/zabbix 6.0.0 alpha1
zabbix/zabbix 5.4.0 - 5.4.8
Published Jan 13, 2022
KEV Added Feb 22, 2022
Tracked Since Feb 18, 2026