Zabbix - Authentication Bypass and Remote Code Execution (CVE-2022-23131)
- Severity
- CVSSv3 Score
- 9.8
- Vulnerability description
Zabbix server is affected by an Authentication Bypass vulnerability, located in the SSO endpoint. The root cause of this vulnerability consists in improper user login session verification. If SAML SSO authentication is enabled (disabled by default), a malicious attacker can modify the session data and gain access as a Zabbix user and then execute remote commands on the server by modifying the scripting functionality. The attacker needs to know the username of a Zabbix user to craft the session data. All the versions affected are up to and including 5.4.8, 5.0.18, and 4.0.36.
- Risk description
The risk exists that a remote unauthenticated attacker can fully compromise the Zabbix server to steal confidential information, install ransomware, or pivot to the internal network.
- Exploit capabilities
Sniper can gain unauthenticated Remote Code Execution on the target system and extract multiple artefacts as evidence.
- Recommendation
Upgrade the Zabbix Web Frontend server to the latest version or to a version higher or equal than 6.0.0beta2, 5.4.9, 5.0.19 or 4.0.37.
- References
https://nvd.nist.gov/vuln/detail/CVE-2022-23131
https://blog.sonarsource.com/zabbix-case-study-of-unsafe-session-storage
- Codename
- Not available
- Detectable with
- Network Scanner
- Exploitable with Sniper
- Yes
- Vuln date
- Jan 2022
- Published at
- Updated at
- Software Type
- Monitoring system
- Vendor
- Zabbix
- Product
- Zabbix