当前位置:网站首页>Cve-2022-23131 - bypass SAML SSO authentication
Cve-2022-23131 - bypass SAML SSO authentication
2022-06-25 06:26:00 【Network security alliance station】
Vulnerability description
Security Assertion Markup Language (SAML) Is the most common single sign on (SSO) One of the standards . around XML Realization , It allows identity providers (IdP, An entity that can authenticate users ) Tell the service provider (SP, Here is Zabbix) who are you . You can use Zabbix Web The front end is configured to allow SAML User authentication , But it is not enabled by default , Because it needs to know the details of the identity provider . This is the most common setup for enterprise deployment .
In the activation of SAML SSO On an instance of authentication , It allows you to bypass authentication and gain administrator privileges . An attacker can use this access right on the linked Zabbix Server and Zabbix Agent Execute arbitrary commands on the instance .

scope
Zabbix Web Front end versions include
- 5.4.8
- 5.0.18
- 4.0.36
Vulnerability analysis
And SAML The code related to the authentication mechanism can be found in index_sso.php Find . In short , Its goal is to :
- Redirect users to IdP;
- After the user is authenticated , Verify incoming SAML Format and signature of the payload . Create a file called
saml_dataTo remember the user's attributes ; - If there is a session named saml_data The entry of , Then extract its value and
username_attributeThe value of the Zabbix Authenticate users on .
index_sso.php
if (CSessionHelper::has('saml_data')) {
$saml_data = CSessionHelper::get('saml_data');
CWebUser::$data = API::getApiService('user')->loginByUsername($saml_data['username_attribute'],
(CAuthenticationHelper::get(CAuthenticationHelper::SAML_CASE_SENSITIVE) == ZBX_AUTH_CASE_SENSITIVE),
CAuthenticationHelper::get(CAuthenticationHelper::AUTHENTICATION_TYPE)
);
Exploit
Vulnerability exploitation is simple , Especially because Zabbix Web The front end is automatically configured with a file named Admin High authority users of .
fofa:app="ZABBIX- The monitoring system " && body="saml"

Reference video :https://youtu.be/5dci1i6Fq3M?t=22
Once certified as an administrator on the dashboard , An attacker can attach any Zabbix Server Execute arbitrary commands on , If... Is explicitly allowed in the configuration AllowKey=system.run[*]( Non default ) , Can be in Zabbix Agents On the implementation .
1、replace [zbx_signed_session] to [cookie]
2、sign in with Single Sign-On (SAML)
Bypass login and enter the background 
EXP
Focus on official account back office reply “CVE-2022-23131” obtain 
边栏推荐
- What is the IP address
- Getting started with mongodb
- Global and Chinese benzoic acid market competition strategy and demand scale forecast report 2022
- Day21 JMeter usage basis
- Day21 performance test process
- [short time energy] short time energy of speech signal based on MATLAB [including Matlab source code 1719]
- JS implementation mouse can achieve the effect of left and right scrolling
- [open source sharing] deeply study KVM, CEPH, fuse features, including open source projects, code cases, articles, videos, architecture brain maps, etc
- Microsoft issued a document to celebrate Net 20th anniversary!
- Go uses channel to control concurrency
猜你喜欢

What happens when redis runs out of memory

Es11 new methods: dynamic import(), bigint, globalthis, optional chain, and null value merging operator

Uni app wechat applet customer service chat function

Mongodb delete data

Wechat applet authorization login + mobile phone sending verification code +jwt verification interface (laravel8+php)

2022 AI trend 8 forecast!

Distributed solar photovoltaic inverter monitoring

Getting started with Silverlight development 1

Rhcsa--- day 6 operation

Laravel8+ wechat applet generates QR code
随机推荐
Go uses channel to control concurrency
Digitalization, transformation?
VMware virtual machine prompt: the virtual device ide1:0 cannot be connected because there is no corresponding device on the host.
证券如何在线开户?在线开户是安全么?
With a younger brother OCR, say no to various types of verification codes!
Tablespace free space
Sleep quality today 67 points
Is it safe to open a stock account on the Internet in Beijing?
3-7sql injection website instance step 3: attack type and attack strategy
The "&" character will destroy the data stored in the web The "&" character breaks passwords that are stored in the web config
Exercise: completion
DNS domain name system
Fdisk command – disk partition
2022-02-19: fence installation. In a two-dimensional garden, there are some trees represented by (x, y) coordinates. As the installation cost is very expensive, your task is to enclose all the trees w
How often should you refactor- How often should you refactor?
A + B Again
[Suanli network] problems and challenges faced by the development of Suanli network
Day21 performance test process
Asemi fast recovery diode us1m parameters, us1m recovery time, us1m voltage drop
What elements are indispensable for the development of the character? What are the stages