当前位置:网站首页>Cve-2022-23131 - bypass SAML SSO authentication
Cve-2022-23131 - bypass SAML SSO authentication
2022-06-25 06:26:00 【Network security alliance station】
Vulnerability description
Security Assertion Markup Language (SAML) Is the most common single sign on (SSO) One of the standards . around XML Realization , It allows identity providers (IdP, An entity that can authenticate users ) Tell the service provider (SP, Here is Zabbix) who are you . You can use Zabbix Web The front end is configured to allow SAML User authentication , But it is not enabled by default , Because it needs to know the details of the identity provider . This is the most common setup for enterprise deployment .
In the activation of SAML SSO On an instance of authentication , It allows you to bypass authentication and gain administrator privileges . An attacker can use this access right on the linked Zabbix Server and Zabbix Agent Execute arbitrary commands on the instance .

scope
Zabbix Web Front end versions include
- 5.4.8
- 5.0.18
- 4.0.36
Vulnerability analysis
And SAML The code related to the authentication mechanism can be found in index_sso.php Find . In short , Its goal is to :
- Redirect users to IdP;
- After the user is authenticated , Verify incoming SAML Format and signature of the payload . Create a file called
saml_dataTo remember the user's attributes ; - If there is a session named saml_data The entry of , Then extract its value and
username_attributeThe value of the Zabbix Authenticate users on .
index_sso.php
if (CSessionHelper::has('saml_data')) {
$saml_data = CSessionHelper::get('saml_data');
CWebUser::$data = API::getApiService('user')->loginByUsername($saml_data['username_attribute'],
(CAuthenticationHelper::get(CAuthenticationHelper::SAML_CASE_SENSITIVE) == ZBX_AUTH_CASE_SENSITIVE),
CAuthenticationHelper::get(CAuthenticationHelper::AUTHENTICATION_TYPE)
);
Exploit
Vulnerability exploitation is simple , Especially because Zabbix Web The front end is automatically configured with a file named Admin High authority users of .
fofa:app="ZABBIX- The monitoring system " && body="saml"

Reference video :https://youtu.be/5dci1i6Fq3M?t=22
Once certified as an administrator on the dashboard , An attacker can attach any Zabbix Server Execute arbitrary commands on , If... Is explicitly allowed in the configuration AllowKey=system.run[*]( Non default ) , Can be in Zabbix Agents On the implementation .
1、replace [zbx_signed_session] to [cookie]
2、sign in with Single Sign-On (SAML)
Bypass login and enter the background 
EXP
Focus on official account back office reply “CVE-2022-23131” obtain 
边栏推荐
- RM command – remove file or directory
- Microsoft issued a document to celebrate Net 20th anniversary!
- Understand what MSS is
- Curl command – file transfer tool
- Gb28181 protocol -- timing
- Go uses channel to control concurrency
- How two hosts in different network segments directly connected communicate
- Viewing Chinese science and technology from the Winter Olympics (V): the Internet of things
- Brief introduction and use of JSON
- The "&" character will destroy the data stored in the web The "&" character breaks passwords that are stored in the web config
猜你喜欢

The elephant turns around and starts the whole body. Ali pushes Maoxiang not only to Jingdong

ARM processor operating mode

Personal blog system graduation project opening report

Lesson 9: workspace introduction

With a younger brother OCR, say no to various types of verification codes!
![[road of system analyst] collection of wrong questions in the chapters of Applied Mathematics and economic management](/img/62/dab2ac0526795f2040394acd9efdd3.jpg)
[road of system analyst] collection of wrong questions in the chapters of Applied Mathematics and economic management

Monitoring access: how to grant minimum WMI access to the monitoring service account

CTFSHOW

Exercise: completion

Notes on dashboard & kuboard installation in kubernetes cluster
随机推荐
Forecast report on output demand and supply scale of global and Chinese structural ceramics market for semiconductor equipment (2022 Edition)
Three tier architecture experiment
cacacahe
[network security] sharing of experience and ideas of an emergency battle
Understanding the dynamic mode of mongodb document
JS dynamic table creation
[Suanli network] problems and challenges faced by the development of Suanli network
CTFSHOW
Mongodb basic concept learning - set
3-7sql injection website instance step 3: attack type and attack strategy
2022 AI trend 8 forecast!
delphi-UUID
[open source sharing] deeply study KVM, CEPH, fuse features, including open source projects, code cases, articles, videos, architecture brain maps, etc
Research Report on demand and Competitive Prospect of global and Chinese welding personal protective equipment industry 2022-2027
证券如何在线开户?在线开户是安全么?
Personal blog system graduation project opening report
What happens when redis runs out of memory
Why study discrete mathematics
Global and Chinese kaolin market operation scale and investment development proposal report 2022
An interview question record about where in MySQL