Share
## https://sploitus.com/exploit?id=DE559930-E973-58DC-B0B8-224436D68B08
# CVE-2022-23131
Zabbix Frontend Authentication Bypass Vulnerability

## Description
This script is an exploit for **CVE-2022-23131**, a vulnerability in the Zabbix SSO (Single Sign-On) mechanism. The vulnerability allows an attacker to bypass authentication via a specially crafted `zbx_session` cookie, giving unauthorized access to the Zabbix dashboard.

Zabbix versions 5.4.0 through 5.4.8 and 6.0.0alpha2 through 6.0.0rc1 are vulnerable.

## Usage
This script checks if a target is vulnerable to **CVE-2022-23131** and retrieves the `zbx_session` cookie for further use.
To  successfully run this script you will need a valid username of Zabbix user.

### How to Run the Exploit
1. Clone the repository to your local machine:
   ```bash
   git clone https://github.com/davidzzo23/cve-2022-23131.git
   cd cve-2022-23131-exploit
   ```
2. Run the script with the following command:
   ```bash
   python3 CVE-2022-23131.py <target_url> <username>
   ```
3. Example usage:
   ```bash
   python3 exploit.py https://192.168.210.13 admin
   ```
4. Copy and paste the cookie value into the "zbx_session" Cookie and refresh the page to get authenticated as the specified user.

## Disclaimer

This script is intended for educational purposes only. Unauthorized use of this exploit on systems without permission is illegal. The author is not responsible for any misuse or damages caused by this exploit.