-
Notifications
You must be signed in to change notification settings - Fork 176
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
PRP: Request CVE-2022-23131 Zabbix SAML Authentication Bypass vulnerability #228
Comments
Hi @hh-hunter, Since you have opened 2 detector requests about Zabbix, could you implement a tsunami fingerprint for Zabbix? The result of service finger printing would help us determine how relevant Zabbix vulnerabilities are. |
No problem~so do complete the detection first, or the tsunami fingerprint one first? |
The tsunami fingerprint first please. |
@tooryx Before, when I wanted to develop this plugin, I was advised to implement fingerprinting first. I have already implemented the fingerprinting and merged it into the main branch. Can we continue developing this issue? |
Hello.
I would like to start implementing a plugin to detect CVE-2022-23131
This vulnerability should be relatively new and has been patched.
The vulnerability has been assigned a CVE ID (CVSS score >= 7.0) and the severity level of the vulnerability is HIGH or CRITICAL: CVSS score: 9.8 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
With SAML SSO authentication enabled (not the default), a malicious actor can modify session data because the user login stored in the session is not authenticated. An unauthenticated malicious attacker could use this issue to elevate privileges and gain administrator access to the Zabbix frontend. To execute the attack, SAML authentication needs to be enabled and the attacker must know the username of the Zabbix user (or use a guest account that is disabled by default). In an automated attack, a predefined account can be selected to perform the blast.
The vulnerability can be exploited remotely without authentication and user interaction.
For the firing range of this vulnerability, I can provide the vmx image
Please let me know if this is in scope to start with its development.
The text was updated successfully, but these errors were encountered: