{"vulnerability": "CVE-2022-2313", "sightings": [{"uuid": "a414b69c-0f16-4095-b355-ca735433a9f4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-23131", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2023-06-14T21:10:04.000000Z"}, {"uuid": "c8a7b6e7-52d6-494b-ae1e-c44bec1a6b86", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-23134", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2023-06-14T21:10:04.000000Z"}, {"uuid": "65750397-e4c2-41f2-b80c-bf9b576a3627", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-23134", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/2971262", "content": "", "creation_timestamp": "2024-12-24T20:26:41.098091Z"}, {"uuid": "7196f69b-20a0-4733-bc57-4e4bc0361500", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-23131", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/2971263", "content": "", "creation_timestamp": "2024-12-24T20:26:41.918333Z"}, {"uuid": "ce7b7292-31b3-45ee-bef4-d3309520c001", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-23131", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/1826", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2022\n\u63cf\u8ff0\uff1aCVE-2022-23131\u6f0f\u6d1e\u5229\u7528\u5de5\u5177\u5f00\u7bb1\u5373\u7528\u3002\nURL\uff1ahttps://github.com/Kazaf6s/CVE-2022-23131-\n\n\u6807\u7b7e\uff1a#CVE-2022", "creation_timestamp": "2022-04-02T18:20:12.000000Z"}, {"uuid": "5b9a0d07-d0f5-498c-a4a6-8545f751ba33", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-23131", "type": "seen", "source": "https://threatintel.cc/2025/09/23/cisa-warns-of-attacks-exploiting.html", "content": "", "creation_timestamp": "2025-09-23T11:47:00.000000Z"}, {"uuid": "c665e3fb-254a-4682-828e-74589794bc98", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-23134", "type": "seen", "source": "https://threatintel.cc/2025/09/23/cisa-warns-of-attacks-exploiting.html", "content": "", "creation_timestamp": "2025-09-23T11:47:00.000000Z"}, {"uuid": "ec407965-44ac-4c77-b207-bd9defa20c73", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2022-23134", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/86a27fba-cd3f-4832-b08b-df3ac3ac9dfb", "content": "", "creation_timestamp": "2026-02-02T12:28:22.626451Z"}, {"uuid": "b439f557-d0f9-486b-b05b-42ddec5d399c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2022-23131", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/af44b085-9a00-4c2c-ab8c-8387cce1be46", "content": "", "creation_timestamp": "2026-02-02T12:28:22.515995Z"}, {"uuid": "314bf3f2-b1e2-4b8d-8c86-e82dfdd927ac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-23131", "type": "exploited", "source": "https://t.me/cKure/8851", "content": "\u25a0\u25a0\u25a0\u25a0\u25a0 CISA Alerts on Actively Exploited Flaws in Zabbix; an open-source Network Monitoring Platform.\n\n\u25aa\ufe0eCVE-2022-23131: Zabbix Frontend Authentication Bypass Vulnerability.\n\n\u25aa\ufe0eCVE-2022-23134: Zabbix Frontend Improper Access Control Vulnerability.\n\nhttps://www.cisa.gov/uscert/ncas/current-activity/2022/02/22/cisa-adds-two-known-exploited-vulnerabilities-catalog\n\nhttps://thehackernews.com/2022/02/cisa-alerts-on-actively-exploited-flaws.html", "creation_timestamp": "2022-02-24T16:05:51.000000Z"}, {"uuid": "6a15b000-29fe-4bc5-9148-17f8a2f7c7f3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-23131", "type": "published-proof-of-concept", "source": "https://t.me/cKure/8904", "content": "\u25a0\u25a0\u25a0\u25a1\u25a1 \ud83d\udce2 CVE-2022-23131: Zabbix Frontend Authentication Bypass Vulnerability.\n\nhttps://securityonline.info/cve-2022-23131-zabbix-frontend-authentication-bypass-vulnerability/", "creation_timestamp": "2022-03-01T05:19:42.000000Z"}, {"uuid": "d24335e1-cdf5-40d6-a748-627274564da8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-23134", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:10:35.000000Z"}, {"uuid": "c881c321-5aa6-4825-aa65-ddfe6f5a9b99", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-23131", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:10:35.000000Z"}, {"uuid": "20744d6b-2d38-4865-8506-a003d6c4ce1f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-23134", "type": "exploited", "source": "https://t.me/cKure/8851", "content": "\u25a0\u25a0\u25a0\u25a0\u25a0 CISA Alerts on Actively Exploited Flaws in Zabbix; an open-source Network Monitoring Platform.\n\n\u25aa\ufe0eCVE-2022-23131: Zabbix Frontend Authentication Bypass Vulnerability.\n\n\u25aa\ufe0eCVE-2022-23134: Zabbix Frontend Improper Access Control Vulnerability.\n\nhttps://www.cisa.gov/uscert/ncas/current-activity/2022/02/22/cisa-adds-two-known-exploited-vulnerabilities-catalog\n\nhttps://thehackernews.com/2022/02/cisa-alerts-on-actively-exploited-flaws.html", "creation_timestamp": "2022-02-24T16:05:51.000000Z"}, {"uuid": "8ca479e7-3362-4514-b968-8b3dd7e638ae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-23131", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/1828", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1a\u6f0f\u6d1e\u5229\u7528\n\u63cf\u8ff0\uff1aCVE-2022-23131\u6f0f\u6d1e\u5229\u7528\u5de5\u5177\u5f00\u7bb1\u5373\u7528\u3002\nURL\uff1ahttps://github.com/Kazaf6s/CVE-2022-23131\n\n\u6807\u7b7e\uff1a#\u6f0f\u6d1e\u5229\u7528", "creation_timestamp": "2022-04-02T18:43:18.000000Z"}, {"uuid": "86c05671-3d3f-4074-9ae4-aa8d4d46b193", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-23131", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/1827", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1a\u6f0f\u6d1e\u5229\u7528\n\u63cf\u8ff0\uff1aCVE-2022-23131\u6f0f\u6d1e\u5229\u7528\u5de5\u5177\u5f00\u7bb1\u5373\u7528\u3002\nURL\uff1ahttps://github.com/Kazaf6s/CVE-2020-23131\n\n\u6807\u7b7e\uff1a#\u6f0f\u6d1e\u5229\u7528", "creation_timestamp": "2022-04-02T18:32:38.000000Z"}, {"uuid": "80119f93-a448-4f34-9d2b-03e73e7a3dcf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-23131", "type": "published-proof-of-concept", "source": "https://t.me/AGENTZSECURITY/1251", "content": "https://github.com/SirAppSec/nuclei-template-generator-log4j\nhttps://github.com/Str1am/my-nuclei-templates\nhttps://github.com/SumedhDawadi/Custom-Nuclei-Template\nhttps://github.com/SumedhDawadi/Nuclei_Template_Subdomain_Takeover\nhttps://github.com/System00-Security/backflow\nhttps://github.com/T4t4ru/nuclei-templates\nhttps://github.com/Tykerdestroy/Bug-bounty-custom-templates\nhttps://github.com/UnaPibaGeek/honeypots-detection\nhttps://github.com/V0idC0de/dir-listing-iis-test\nhttps://github.com/VulnExpo/nuclei-templates\nhttps://github.com/W01fh4cker/nucleiTemplatesClassifier\nhttps://github.com/YashVardhanTrip/nuclei-templates\nhttps://github.com/adampielak/nuclei-templates\nhttps://github.com/aels/CVE-2022-37042\nhttps://github.com/ahmedalroky/nuclei-templates\nhttps://github.com/akincibor/CVE-2022-27925\nhttps://github.com/al4xs/nuclei-templates\nhttps://github.com/alexrydzak/rydzak-nuclei-templates\nhttps://github.com/am0nt31r0/custom-nuclei-templates\nhttps://github.com/anmolksachan/nuclei-templates\nhttps://github.com/attacker-codeninja/My-Nuclei-Templates-2\nhttps://github.com/ayadim/Nuclei-bug-hunter\nhttps://github.com/b4dboy17/badboy_17-Nuclei-Templates-Collection\nhttps://github.com/badboy-sft/badboy_17-Nuclei-Templates-Collection\nhttps://github.com/badboycxcc/CVE-2023-24100\nhttps://github.com/baharebenesbordi/Nuclei-Templates\nhttps://github.com/bhataasim1/PersonalTemplates\nhttps://github.com/binod235/nuclei-templates-and-reports\nhttps://github.com/bjhulst/nuclei-custom-templates\nhttps://github.com/blazeinfosec/nuclei-templates\nhttps://github.com/boobooHQ/private_templates\nhttps://github.com/brinhosa/brinhosa-nuclei-templates\nhttps://github.com/bufferbandit/gitScanNucleiTemplate\nhttps://github.com/bugbountydude/Nuclei-TamplatesBackup\nhttps://github.com/c-sh0/nuclei_templates\nhttps://github.com/c3l3si4n/malicious_nuclei_templates\nhttps://github.com/chouaibhm/foulenzer-templates\nhttps://github.com/cipher387/juicyinfo-nuclei-templates\nhttps://github.com/clarkvoss/Nuclei-Templates\nhttps://github.com/coldrainh/nuclei-ByMyself\nhttps://github.com/compr00t/nuclei-templates\nhttps://github.com/d3sca/Nuclei_Templates\nhttps://github.com/daffainfo/my-nuclei-templates\nhttps://github.com/damon-sec/Nuclei-templates-Collection\nhttps://github.com/damon-sec/TCSZ-Nuclei\nhttps://github.com/dk4trin/templates-nuclei\nhttps://github.com/drfabiocastro/certwatcher-templates\nhttps://github.com/e1abrador/SpringCorePoC.sh\nhttps://github.com/ed-red/redmc_custom_templates_nuclei\nhttps://github.com/ekinsb/Nuclei-Templates\nhttps://github.com/emadshanab/nucleiDB\nhttps://github.com/erickfernandox/nuclei-templates\nhttps://github.com/esetal/nuclei-bb-templates\nhttps://github.com/ethicalhackingplayground/erebus-templates\nhttps://github.com/fostane/my-nuclei-templates-1\nhttps://github.com/geeknik/nuclei-templates-1\nhttps://github.com/geeknik/the-nuclei-templates\nhttps://github.com/glyptho/templatesallnuclei\nhttps://github.com/h4ndsh/nuclei-templates\nhttps://github.com/ibaiw/nuclei_templates\nhttps://github.com/im403/nuclei-temp\nhttps://github.com/imhunterand/nuclei-custom-templates\nhttps://github.com/javaongsan/nuclei-templates\nhttps://github.com/justmumu/SpringShell\nhttps://github.com/k00kx/nuclei-templates\nhttps://github.com/kaanatmacaa/CVE-2024-23897\nhttps://github.com/kabilan1290/templates\nhttps://github.com/kernel-krunch/nuclei-templates\nhttps://github.com/kh4sh3i/CVE-2022-23131\nhttps://github.com/kh4sh3i/Nextcloud-Pentesting\nhttps://github.com/kh4sh3i/Webmin-CVE\nhttps://github.com/learnerboy88/CVE-2023-29489\nhttps://github.com/lliwi/nuclei-repo-hunter\nhttps://github.com/luck-ying/Library-YAML-POC\nhttps://github.com/manasmbellani/nuclei-templates\nhttps://github.com/marcositu/nuclei-custom-templates\nhttps://github.com/mastersir-lab/nuclei-yaml-poc\nhttps://github.com/mbskter/Masscan2Httpx2Nuclei-Xray", "creation_timestamp": "2025-04-22T02:52:21.000000Z"}, {"uuid": "07a169c6-21e4-4a76-ac50-a46a12696a5b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-23131", "type": "published-proof-of-concept", "source": "https://t.me/AGENTZSECURITY/1248", "content": "https://github.com/meme-lord/Custom-Nuclei-Templates\nhttps://github.com/Akokonunes/Private-Nuclei-Templates\nhttps://github.com/rafaelwdornelas/my-nuclei-templates\nhttps://github.com/rafaelcaria/Nuclei-Templates\nhttps://github.com/panch0r3d/nuclei-templates\nhttps://github.com/0x727/ObserverWard_0x727\nhttps://github.com/ethicalhackingplayground/erebus-templates\nhttps://github.com/test502git/log4j-fuzz-head-poc\nhttps://github.com/Str1am/my-nuclei-templates\nhttps://github.com/d3sca/Nuclei_Templates\nhttps://github.com/c-sh0/nuclei_templates\nhttps://github.com/glyptho/templatesallnuclei\nhttps://github.com/0xAwali/Virtual-Host\nhttps://github.com/praetorian-inc/chariot-launch-nuclei-templates\nhttps://github.com/brinhosa/brinhosa-nuclei-templates\nhttps://github.com/kh4sh3i/CVE-2022-23131\nhttps://github.com/wr00t/templates\nhttps://github.com/alexrydzak/rydzak-nuclei-templates\nhttps://github.com/adampielak/nuclei-templates\nhttps://github.com/ShangRui-hash/my-nuclei-templates\nhttps://github.com/dk4trin/templates-nuclei\nhttps://github.com/Elsfa7-110/mynuclei-templates\nhttps://github.com/ping-0day/template\nhttps://github.com/wasp76b/nuclei-templates\nhttps://github.com/th3r4id/nuclei-templates\nhttps://github.com/justmumu/SpringShell\nhttps://github.com/trickest/log4j\nhttps://github.com/toramanemre/apache-solr-log4j-CVE-2021-44228\nhttps://github.com/toramanemre/log4j-rce-detect-waf-bypass\nhttps://github.com/blazeinfosec/nuclei-templates\nhttps://github.com/ekinsb/Nuclei-Templates\nhttps://github.com/KeepHowling/all_freaking_nuclei_templates\nhttps://github.com/Odayex/Random-Nuclei-Templates\nhttps://github.com/aels/CVE-2022-37042\nhttps://github.com/tamimhasan404/Open-Source-Nuclei-Templates-Downloader\nhttps://github.com/pentest-dev/Profesional-Nuclei-Templates\nhttps://github.com/badboy-sft/badboy_17-Nuclei-Templates-Collection\nhttps://github.com/NightRang3r/misc_nuclei_templates\nhttps://github.com/ExpLangcn/NucleiTP\nhttps://github.com/0xmaximus/final_freaking_nuclei_templates\nhttps://github.com/Jagomeiister/nuclei-templates\nhttps://github.com/ricardomaia/nuclei-template-generator-for-wordpress-plugins\nhttps://github.com/Lopseg/nuclei-c-templates\nhttps://github.com/sl4x0/NC-Templates\nhttps://github.com/thecyberneh/nuclei-templatess\nhttps://github.com/yarovit-developer/nuclei-templates\nhttps://github.com/cipher387/juicyinfo-nuclei-templates\nhttps://github.com/Kaue-Navarro/Templates-kaue-nuclei\nhttps://github.com/JoshMorrison99/url-based-nuclei-templates\nhttps://github.com/ayadim/Nuclei-bug-hunter\nhttps://github.com/soumya123raj/Nuclei\nhttps://github.com/soapffz/myown-nuclei-poc\nhttps://github.com/zer0yu/Open-PoC\nhttps://github.com/SumedhDawadi/Custom-Nuclei-Template\nhttps://github.com/coldrainh/nuclei-ByMyself\nhttps://github.com/binod235/nuclei-templates-and-reports\nhttps://github.com/mbskter/Masscan2Httpx2Nuclei-Xray\nhttps://github.com/luck-ying/Library-YAML-POC\nhttps://github.com/PedroFerreira97/nuclei_templates\nhttps://github.com/Hunt2behunter/nuclei-templates\nhttps://github.com/mastersir-lab/nuclei-yaml-poc\nhttps://github.com/SirAppSec/nuclei-template-generator-log4j\nhttps://github.com/0xPugazh/my-nuclei-templates\nhttps://github.com/topscoder/nuclei-wordfence-cve\nhttps://github.com/erickfernandox/nuclei-templates\nhttps://github.com/damon-sec/Nuclei-templates-Collection\nhttps://github.com/DoubleTakes/nuclei-templates\nhttps://github.com/ptyspawnbinbash/template-enhancer\nhttps://github.com/Arvinthksrct/alltemplate\nhttps://github.com/srkgupta/cent-nuclei-templates\nhttps://github.com/UltimateSec/ultimaste-nuclei-templates\nhttps://github.com/xinZa1/template\nhttps://github.com/SirBugs/Priv8-Nuclei-Templates\nhttps://github.com/davidfortytwo/GetNucleiTemplates\nhttps://github.com/v3l4r10/Nuclei-Templates\nhttps://github.com/wearetyomsmnv/llm_integrated_nuclei_templates", "creation_timestamp": "2025-04-22T02:52:21.000000Z"}, {"uuid": "4166cb9a-7aad-4c01-a28b-b0979d6b33da", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-23131", "type": "exploited", "source": "https://t.me/AGENTZSECURITY/1243", "content": "https://github.com/pikpikcu/nuclei-templates\nhttps://github.com/esetal/nuclei-bb-templates\nhttps://github.com/ARPSyndicate/kenzer-templates\nhttps://github.com/medbsq/ncl\nhttps://github.com/notnotnotveg/nuclei-custom-templates\nhttps://github.com/foulenzer/foulenzer-templates\nhttps://github.com/clarkvoss/Nuclei-Templates\nhttps://github.com/z3bd/nuclei-templates\nhttps://github.com/joanbono/nuclei-templates\nhttps://github.com/peanuth8r/Nuclei_Templates\nhttps://github.com/thebrnwal/Content-Injection-Nuclei-Script\nhttps://github.com/ree4pwn/my-nuclei-templates\nhttps://github.com/im403/nuclei-temp\nhttps://github.com/System00-Security/backflow\nhttps://github.com/geeknik/nuclei-templates-1\nhttps://github.com/geeknik/the-nuclei-templates\nhttps://github.com/optiv/mobile-nuclei-templates\nhttps://github.com/obreinx/nuceli-templates\nhttps://github.com/randomstr1ng/nuclei-sap-templates\nhttps://github.com/CharanRayudu/Custom-Nuclei-Templates\nhttps://github.com/zinminphyo0/KozinTemplates\nhttps://github.com/n1f2c3/mytemplates\nhttps://github.com/kabilan1290/templates\nhttps://github.com/smaranchand/nuclei-templates\nhttps://github.com/Saimonkabir/Nuclei-Templates\nhttps://github.com/yavolo/nuclei-templates\nhttps://github.com/sadnansakin/my-nuclei-templates\nhttps://github.com/5cr1pt/templates\nhttps://github.com/rahulkadavil/nuclei-templates\nhttps://github.com/Nithissh0708/Custom-Nuclei-Templates\nhttps://github.com/shifa123/detections\nhttps://github.com/daffainfo/my-nuclei-templates\nhttps://github.com/javaongsan/nuclei-templates\nhttps://github.com/AshiqurEmon/nuclei_templates.git\nhttps://github.com/ChiaraNRTT96/BountySkill\nhttps://gist.github.com/ResistanceIsUseless/e46848f67706a8aa1205c9d2866bff31\nhttps://gist.github.com/0x240x23elu\nhttps://github.com/NitinYadav00/My-Nuclei-Templates\nhttps://github.com/sharathkramadas/k8s-nuclei-templates\nhttps://github.com/securitytest3r/nuclei_templates_work\nhttps://github.com/MR-pentestGuy/nuclei-templates\nhttps://github.com/thelabda/nuclei-templates\nhttps://github.com/1in9e/my-nuclei-templates\nhttps://github.com/redteambrasil/nuclei-templates\nhttps://github.com/Saptak9983/Nuclei-Template\nhttps://github.com/Harish4948/Nuclei-Templates\nhttps://github.com/R-s0n/Custom_Vuln_Scan_Templates\nhttps://github.com/meme-lord/Custom-Nuclei-Templates\nhttps://github.com/rafaelcaria/Nuclei-Templates\nhttps://github.com/panch0r3d/nuclei-templates\nhttps://github.com/0x727/ObserverWard_0x727\nhttps://github.com/ethicalhackingplayground/erebus-templates\nhttps://github.com/test502git/log4j-fuzz-head-poc\nhttps://github.com/Str1am/my-nuclei-templates\nhttps://github.com/d3sca/Nuclei_Templates\nhttps://github.com/c-sh0/nuclei_templates\nhttps://github.com/glyptho/templatesallnuclei\nhttps://github.com/0xAwali/Virtual-Host\nhttps://github.com/praetorian-inc/chariot-launch-nuclei-templates\nhttps://github.com/brinhosa/brinhosa-nuclei-templates\nhttps://github.com/kh4sh3i/CVE-2022-23131\nhttps://github.com/wr00t/templates\nhttps://github.com/alexrydzak/rydzak-nuclei-templates\nhttps://github.com/adampielak/nuclei-templates\nhttps://github.com/ShangRui-hash/my-nuclei-templates\nhttps://github.com/dk4trin/templates-nuclei\nhttps://github.com/Elsfa7-110/mynuclei-templates\nhttps://github.com/ping-0day/templates\nhttps://github.com/wasp76b/nuclei-templates\nhttps://github.com/th3r4id/nuclei-templates\nhttps://github.com/themastersunil/Nuclei-TamplatesBackup.git\nhttps://github.com/justmumu/SpringShell\nhttps://github.com/trickest/log4j\nhttps://github.com/toramanemre/apache-solr-log4j-CVE-2021-44228\nhttps://github.com/toramanemre/log4j-rce-detect-waf-bypass\nhttps://github.com/blazeinfosec/nuclei-templates\nhttps://github.com/ekinsb/Nuclei-Templates\nhttps://github.com/Charseki/nuclei_templates\nhttps://github.com/testtt3424/nuclei-templates\nhttps://github.com/V0idC0de/dir-listing-iis-test", "creation_timestamp": "2025-04-22T02:52:20.000000Z"}, {"uuid": "6fba212d-b723-4f18-8843-c0bf82b9ec63", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-23131", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/3078", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2022\n\u63cf\u8ff0\uff1aZabbix-SAML-Bypass: CVE-2022-23131\nURL\uff1ahttps://github.com/Vulnmachines/Zabbix-CVE-2022-23131\n\n\u6807\u7b7e\uff1a#CVE-2022", "creation_timestamp": "2022-10-01T14:29:03.000000Z"}, {"uuid": "e93b3ff4-aadd-472b-81b8-362e42afe41d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-23131", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/2755", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2022\n\u63cf\u8ff0\uff1aCVE-2022-23131\u6f0f\u6d1e\u6279\u91cf\u68c0\u6d4b\u4e0e\u5229\u7528\u811a\u672c\nURL\uff1ahttps://github.com/1324132494/CVE-2022-23131poc-exp-zabbix-\n\n\u6807\u7b7e\uff1a#CVE-2022", "creation_timestamp": "2022-07-22T05:53:29.000000Z"}, {"uuid": "10f35d6e-1266-4c68-8e94-7078692cd810", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-23134", "type": "seen", "source": "https://t.me/arpsyndicate/1028", "content": "#ExploitObserverAlert\n\nCVE-2022-23134\n\nDESCRIPTION: Exploit Observer has 11 entries related to CVE-2022-23134. After the initial setup process, some steps of setup.php file are reachable not only by super-administrators, but by unauthenticated users as well. Malicious actor can pass step checks and potentially change the configuration of Zabbix Frontend.\n\nFIRST-EPSS: 0.202480000\nNVD-IS: 1.4\nNVD-ES: 3.9", "creation_timestamp": "2023-12-03T21:02:10.000000Z"}, {"uuid": "c969e311-367a-4b74-8196-190facceedc5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-23131", "type": "seen", "source": "https://t.me/arpsyndicate/1002", "content": "#ExploitObserverAlert\n\nCVE-2022-23131\n\nDESCRIPTION: Exploit Observer has 58 entries related to CVE-2022-23131. In the case of instances where the SAML SSO authentication is enabled (non-default), session data can be modified by a malicious actor, because a user login stored in the session was not verified. Malicious unauthenticated actor may exploit this issue to escalate privileges and gain admin access to Zabbix Frontend. To perform the attack, SAML authentication is required to be enabled and the actor has to know the username of Zabbix user (or use the guest account, which is disabled by default).\n\nFIRST-EPSS: 0.969280000\nNVD-IS: 5.9\nNVD-ES: 3.9", "creation_timestamp": "2023-12-03T18:45:04.000000Z"}, {"uuid": "369e4313-140e-4b2a-92f3-5bab2d36e85a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-23134", "type": "exploited", "source": "https://t.me/true_secator/2673", "content": "\u200b\u200b\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432\u044b\u0441\u043e\u043a\u043e\u0439 \u0441\u0442\u0435\u043f\u0435\u043d\u0438 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u043e\u0441\u0442\u0438 CVE-2022-23131 \u0438 CVE-2022-23134 \u0430\u043a\u0442\u0438\u0432\u043d\u043e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u044e\u0442\u0441\u044f \u0432 \u0434\u0438\u043a\u043e\u0439 \u043f\u0440\u0438\u0440\u043e\u0434\u0435. \u0420\u0435\u0447\u044c \u0438\u0434\u0435\u0442 \u043e Zabbix - \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u0435 \u0441 \u043e\u0442\u043a\u0440\u044b\u0442\u044b\u043c \u0438\u0441\u0445\u043e\u0434\u043d\u044b\u043c \u043a\u043e\u0434\u043e\u043c \u0434\u043b\u044f \u043c\u043e\u043d\u0438\u0442\u043e\u0440\u0438\u043d\u0433\u0430 \u0441\u0435\u0442\u0435\u0439, \u0441\u0435\u0440\u0432\u0435\u0440\u043e\u0432, \u0432\u0438\u0440\u0442\u0443\u0430\u043b\u044c\u043d\u044b\u0445 \u043c\u0430\u0448\u0438\u043d \u0438 \u043e\u0431\u043b\u0430\u0447\u043d\u044b\u0445 \u0441\u0435\u0440\u0432\u0438\u0441\u043e\u0432. \u041f\u0440\u0438 \u044d\u0442\u043e\u043c \u0441\u043e\u0433\u043b\u0430\u0441\u043d\u043e \u0434\u0430\u043d\u043d\u044b\u043c CISA, \u043e\u0434\u043d\u0430 \u0438\u0437 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0438\u043c\u0435\u0435\u0442 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u043e\u0435 \u0437\u043d\u0430\u0447\u0435\u043d\u0438\u0435 9,1 \u0438\u0437 10.\n\n\u0414\u0432\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0431\u044b\u043b\u0438 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u044b \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c\u0438 \u0438\u0437 SonarSource \u0438 \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043b\u0435\u043d\u044b \u0432\u00a0\u0442\u0435\u0445\u043d\u0438\u0447\u0435\u0441\u043a\u043e\u043c \u043e\u0442\u0447\u0435\u0442\u0435 \u043f\u043e\u0447\u0442\u0438 \u043c\u0435\u0441\u044f\u0446 \u043d\u0430\u0437\u0430\u0434.\n\nCVE-2022-23131 \u043d\u0435\u043f\u043e\u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0435\u043d\u043d\u043e \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u0430 \u0441 Zabbix Frontend. \u0411\u043b\u0430\u0433\u043e\u0434\u0430\u0440\u044f \u0435\u0439 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a \u043c\u043e\u0436\u0435\u0442 \u043e\u0431\u043e\u0439\u0442\u0438 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u044e \u043d\u0430 \u0441\u0435\u0440\u0432\u0435\u0440\u0430\u0445 \u0441 \u043d\u0430\u0441\u0442\u0440\u043e\u0435\u043d\u043d\u044b\u043c \u044f\u0437\u044b\u043a\u043e\u043c \u0440\u0430\u0437\u043c\u0435\u0442\u043a\u0438 \u043f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0438\u044f \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 SAML (\u043e\u0442\u043a\u0440\u044b\u0442\u044b\u0439 \u0441\u0442\u0430\u043d\u0434\u0430\u0440\u0442, \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0438\u0432\u0430\u044e\u0449\u0438\u0439 \u0435\u0434\u0438\u043d\u0443\u044e \u0442\u043e\u0447\u043a\u0443 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438 (\u0435\u0434\u0438\u043d\u044b\u0439 \u0432\u0445\u043e\u0434), \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0438\u0432\u0430\u0435\u0442 \u043e\u0431\u043c\u0435\u043d \u0434\u0430\u043d\u043d\u044b\u043c\u0438 \u043c\u0435\u0436\u0434\u0443 \u043f\u043e\u0441\u0442\u0430\u0432\u0449\u0438\u043a\u043e\u043c \u0443\u0434\u043e\u0441\u0442\u043e\u0432\u0435\u0440\u0435\u043d\u0438\u0439 \u0438 \u043f\u043e\u0441\u0442\u0430\u0432\u0449\u0438\u043a\u043e\u043c \u0443\u0441\u043b\u0443\u0433). \n\n\u0415\u0441\u043b\u0438 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u044f SAML SSO \u0432\u043a\u043b\u044e\u0447\u0435\u043d\u0430 (\u043d\u0435 \u043f\u043e \u0443\u043c\u043e\u043b\u0447\u0430\u043d\u0438\u044e), \u0434\u0430\u043d\u043d\u044b\u0435 \u0441\u0435\u0430\u043d\u0441\u0430 \u043c\u043e\u0433\u0443\u0442 \u0431\u044b\u0442\u044c \u0438\u0437\u043c\u0435\u043d\u0435\u043d\u044b \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u043e\u043c, \u043f\u043e\u0441\u043a\u043e\u043b\u044c\u043a\u0443 \u043b\u043e\u0433\u0438\u043d \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f, \u0441\u043e\u0445\u0440\u0430\u043d\u0435\u043d\u043d\u044b\u0439 \u0432 \u0441\u0435\u0430\u043d\u0441\u0435, \u043d\u0435 \u043f\u0440\u043e\u0432\u0435\u0440\u044f\u0435\u0442\u0441\u044f.\u00a0\u042d\u0442\u043e \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u043d\u0435\u043f\u0440\u043e\u0432\u0435\u0440\u0435\u043d\u043d\u043e\u043c\u0443 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c \u044d\u0442\u0443 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c, \u0447\u0442\u043e\u0431\u044b \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0438 \u0438 \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u0434\u043e\u0441\u0442\u0443\u043f \u0430\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u043e\u0440\u0430 \u043a \u0438\u043d\u0442\u0435\u0440\u0444\u0435\u0439\u0441\u0443 Zabbix.\n\n21 \u0444\u0435\u0432\u0440\u0430\u043b\u044f \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 \u0442\u0430\u043a\u0436\u0435 \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u0438\u043b\u0438 \u0441\u043e\u043e\u0442\u0432\u0435\u0442\u0441\u0432\u0443\u044e\u0449\u0438\u0439 PoC. \u041a\u0440\u043e\u043c\u0435 \u0442\u043e\u0433\u043e, \u041d\u0430\u0446\u0438\u043e\u043d\u0430\u043b\u044c\u043d\u044b\u0439 \u0446\u0435\u043d\u0442\u0440 \u043a\u0438\u0431\u0435\u0440\u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0432 \u041d\u0438\u0434\u0435\u0440\u043b\u0430\u043d\u0434\u0430\u0445\u00a0\u0442\u0430\u043a\u0436\u0435 \u043f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0430\u0435\u0442, \u0447\u0442\u043e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0430\u043a\u0442\u0438\u0432\u043d\u043e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u0442\u0441\u044f \u0438 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u043a\u043e\u0434 \u0441 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u044f\u043c\u0438 root.\n\n\u0412\u0442\u043e\u0440\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c CVE-2022-23134 \u0441\u0440\u0435\u0434\u043d\u0435\u0439 \u0441\u0442\u0435\u043f\u0435\u043d\u0438 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u043e\u0441\u0442\u0438 \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 \u0441\u043e\u0431\u043e\u0439 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0443 \u043d\u0435\u043d\u0430\u0434\u043b\u0435\u0436\u0430\u0449\u0435\u0433\u043e \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044f \u0434\u043e\u0441\u0442\u0443\u043f\u0430, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u0438\u0437\u043c\u0435\u043d\u0438\u0442\u044c \u0444\u0430\u0439\u043b \u043a\u043e\u043d\u0444\u0438\u0433\u0443\u0440\u0430\u0446\u0438\u0438 (\u0441\u043a\u0440\u0438\u043f\u0442 setup.php) \u0438 \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u043f\u0430\u043d\u0435\u043b\u0438 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0441 \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u043d\u044b\u043c\u0438 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u044f\u043c\u0438.\n\n\u0420\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u0447\u0438\u043a\u0438\u00a0Zabbix\u00a0\u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0438 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f (\u0432\u0435\u0440\u0441\u0438\u0438 5.4.9, 5.0.9 \u0438 4.0.37), \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0440\u0435\u0448\u0430\u044e\u0442 \u043e\u0431\u0435 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u044b, \u0432 \u0441\u0432\u044f\u0437\u0438 \u0441 \u0447\u0435\u043c, \u043d\u0430\u0441\u0442\u043e\u044f\u0442\u0435\u043b\u044c\u043d\u043e \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u043c \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u0438\u0442\u044c \u0438\u0445, \u043e\u0441\u043e\u0431\u0435\u043d\u043d\u043e \u0432 \u043a\u043e\u043d\u0442\u0435\u043a\u0441\u0442\u0435 \u0430\u043a\u0442\u0438\u0432\u043d\u043e\u0439 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438. \u0421\u0430\u043c\u0438 \u043e\u0446\u0435\u043d\u0438\u0442\u0435 \u043d\u0430\u0441\u043a\u043e\u043b\u044c\u043a\u043e \u043f\u0440\u043e\u0441\u0442\u043e\u0439 \u043e\u043d\u0430 \u043c\u043e\u0436\u0435\u0442 \u0431\u044b\u0442\u044c", "creation_timestamp": "2022-02-25T18:16:00.000000Z"}, {"uuid": "c677e42c-23dd-40e9-b29c-f21f2d10311b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-23131", "type": "published-proof-of-concept", "source": "Telegram/hCfCsWkJLNX-4ZZS6AKhD47aw1Wu0GxnlvM04EnHwON9-Gg", "content": "", "creation_timestamp": "2025-03-05T22:00:05.000000Z"}, {"uuid": "84c8661c-64d6-4915-bc8f-836ffa9ffa2b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-23131", "type": "published-proof-of-concept", "source": "Telegram/aGRchAdBZrssb-k1rTgBgmxMjwWLNORPeM8cAxqMrNH0iF8", "content": "", "creation_timestamp": "2025-02-27T16:00:09.000000Z"}, {"uuid": "83e1f02d-ee8b-4a9d-95a7-d248c04429fc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-23131", "type": "published-proof-of-concept", "source": "https://t.me/WARLOCK_DARK_ARMY_OFFICIALS/3476", "content": "https://github.com/r10lab/CVE-2022-23131", "creation_timestamp": "2023-10-26T06:10:31.000000Z"}, {"uuid": "26e21b75-268f-4cf2-ae97-df2ee16a8cb4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-23134", "type": "published-proof-of-concept", "source": "Telegram/S7-40of6B8lzJ7CVZzuUb0J5KbLtJ2xTFGhEBSuaewMtr4I", "content": "", "creation_timestamp": "2025-03-23T10:00:05.000000Z"}, {"uuid": "c48b65dc-c813-43da-b6ec-44255a1a2be3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-23131", "type": "exploited", "source": "https://t.me/true_secator/2673", "content": "\u200b\u200b\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432\u044b\u0441\u043e\u043a\u043e\u0439 \u0441\u0442\u0435\u043f\u0435\u043d\u0438 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u043e\u0441\u0442\u0438 CVE-2022-23131 \u0438 CVE-2022-23134 \u0430\u043a\u0442\u0438\u0432\u043d\u043e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u044e\u0442\u0441\u044f \u0432 \u0434\u0438\u043a\u043e\u0439 \u043f\u0440\u0438\u0440\u043e\u0434\u0435. \u0420\u0435\u0447\u044c \u0438\u0434\u0435\u0442 \u043e Zabbix - \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u0435 \u0441 \u043e\u0442\u043a\u0440\u044b\u0442\u044b\u043c \u0438\u0441\u0445\u043e\u0434\u043d\u044b\u043c \u043a\u043e\u0434\u043e\u043c \u0434\u043b\u044f \u043c\u043e\u043d\u0438\u0442\u043e\u0440\u0438\u043d\u0433\u0430 \u0441\u0435\u0442\u0435\u0439, \u0441\u0435\u0440\u0432\u0435\u0440\u043e\u0432, \u0432\u0438\u0440\u0442\u0443\u0430\u043b\u044c\u043d\u044b\u0445 \u043c\u0430\u0448\u0438\u043d \u0438 \u043e\u0431\u043b\u0430\u0447\u043d\u044b\u0445 \u0441\u0435\u0440\u0432\u0438\u0441\u043e\u0432. \u041f\u0440\u0438 \u044d\u0442\u043e\u043c \u0441\u043e\u0433\u043b\u0430\u0441\u043d\u043e \u0434\u0430\u043d\u043d\u044b\u043c CISA, \u043e\u0434\u043d\u0430 \u0438\u0437 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0438\u043c\u0435\u0435\u0442 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u043e\u0435 \u0437\u043d\u0430\u0447\u0435\u043d\u0438\u0435 9,1 \u0438\u0437 10.\n\n\u0414\u0432\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0431\u044b\u043b\u0438 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u044b \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c\u0438 \u0438\u0437 SonarSource \u0438 \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043b\u0435\u043d\u044b \u0432\u00a0\u0442\u0435\u0445\u043d\u0438\u0447\u0435\u0441\u043a\u043e\u043c \u043e\u0442\u0447\u0435\u0442\u0435 \u043f\u043e\u0447\u0442\u0438 \u043c\u0435\u0441\u044f\u0446 \u043d\u0430\u0437\u0430\u0434.\n\nCVE-2022-23131 \u043d\u0435\u043f\u043e\u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0435\u043d\u043d\u043e \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u0430 \u0441 Zabbix Frontend. \u0411\u043b\u0430\u0433\u043e\u0434\u0430\u0440\u044f \u0435\u0439 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a \u043c\u043e\u0436\u0435\u0442 \u043e\u0431\u043e\u0439\u0442\u0438 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u044e \u043d\u0430 \u0441\u0435\u0440\u0432\u0435\u0440\u0430\u0445 \u0441 \u043d\u0430\u0441\u0442\u0440\u043e\u0435\u043d\u043d\u044b\u043c \u044f\u0437\u044b\u043a\u043e\u043c \u0440\u0430\u0437\u043c\u0435\u0442\u043a\u0438 \u043f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0438\u044f \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 SAML (\u043e\u0442\u043a\u0440\u044b\u0442\u044b\u0439 \u0441\u0442\u0430\u043d\u0434\u0430\u0440\u0442, \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0438\u0432\u0430\u044e\u0449\u0438\u0439 \u0435\u0434\u0438\u043d\u0443\u044e \u0442\u043e\u0447\u043a\u0443 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438 (\u0435\u0434\u0438\u043d\u044b\u0439 \u0432\u0445\u043e\u0434), \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0438\u0432\u0430\u0435\u0442 \u043e\u0431\u043c\u0435\u043d \u0434\u0430\u043d\u043d\u044b\u043c\u0438 \u043c\u0435\u0436\u0434\u0443 \u043f\u043e\u0441\u0442\u0430\u0432\u0449\u0438\u043a\u043e\u043c \u0443\u0434\u043e\u0441\u0442\u043e\u0432\u0435\u0440\u0435\u043d\u0438\u0439 \u0438 \u043f\u043e\u0441\u0442\u0430\u0432\u0449\u0438\u043a\u043e\u043c \u0443\u0441\u043b\u0443\u0433). \n\n\u0415\u0441\u043b\u0438 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u044f SAML SSO \u0432\u043a\u043b\u044e\u0447\u0435\u043d\u0430 (\u043d\u0435 \u043f\u043e \u0443\u043c\u043e\u043b\u0447\u0430\u043d\u0438\u044e), \u0434\u0430\u043d\u043d\u044b\u0435 \u0441\u0435\u0430\u043d\u0441\u0430 \u043c\u043e\u0433\u0443\u0442 \u0431\u044b\u0442\u044c \u0438\u0437\u043c\u0435\u043d\u0435\u043d\u044b \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u043e\u043c, \u043f\u043e\u0441\u043a\u043e\u043b\u044c\u043a\u0443 \u043b\u043e\u0433\u0438\u043d \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f, \u0441\u043e\u0445\u0440\u0430\u043d\u0435\u043d\u043d\u044b\u0439 \u0432 \u0441\u0435\u0430\u043d\u0441\u0435, \u043d\u0435 \u043f\u0440\u043e\u0432\u0435\u0440\u044f\u0435\u0442\u0441\u044f.\u00a0\u042d\u0442\u043e \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u043d\u0435\u043f\u0440\u043e\u0432\u0435\u0440\u0435\u043d\u043d\u043e\u043c\u0443 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c \u044d\u0442\u0443 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c, \u0447\u0442\u043e\u0431\u044b \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0438 \u0438 \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u0434\u043e\u0441\u0442\u0443\u043f \u0430\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u043e\u0440\u0430 \u043a \u0438\u043d\u0442\u0435\u0440\u0444\u0435\u0439\u0441\u0443 Zabbix.\n\n21 \u0444\u0435\u0432\u0440\u0430\u043b\u044f \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 \u0442\u0430\u043a\u0436\u0435 \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u0438\u043b\u0438 \u0441\u043e\u043e\u0442\u0432\u0435\u0442\u0441\u0432\u0443\u044e\u0449\u0438\u0439 PoC. \u041a\u0440\u043e\u043c\u0435 \u0442\u043e\u0433\u043e, \u041d\u0430\u0446\u0438\u043e\u043d\u0430\u043b\u044c\u043d\u044b\u0439 \u0446\u0435\u043d\u0442\u0440 \u043a\u0438\u0431\u0435\u0440\u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0432 \u041d\u0438\u0434\u0435\u0440\u043b\u0430\u043d\u0434\u0430\u0445\u00a0\u0442\u0430\u043a\u0436\u0435 \u043f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0430\u0435\u0442, \u0447\u0442\u043e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0430\u043a\u0442\u0438\u0432\u043d\u043e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u0442\u0441\u044f \u0438 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u043a\u043e\u0434 \u0441 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u044f\u043c\u0438 root.\n\n\u0412\u0442\u043e\u0440\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c CVE-2022-23134 \u0441\u0440\u0435\u0434\u043d\u0435\u0439 \u0441\u0442\u0435\u043f\u0435\u043d\u0438 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u043e\u0441\u0442\u0438 \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 \u0441\u043e\u0431\u043e\u0439 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0443 \u043d\u0435\u043d\u0430\u0434\u043b\u0435\u0436\u0430\u0449\u0435\u0433\u043e \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044f \u0434\u043e\u0441\u0442\u0443\u043f\u0430, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u0438\u0437\u043c\u0435\u043d\u0438\u0442\u044c \u0444\u0430\u0439\u043b \u043a\u043e\u043d\u0444\u0438\u0433\u0443\u0440\u0430\u0446\u0438\u0438 (\u0441\u043a\u0440\u0438\u043f\u0442 setup.php) \u0438 \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u043f\u0430\u043d\u0435\u043b\u0438 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0441 \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u043d\u044b\u043c\u0438 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u044f\u043c\u0438.\n\n\u0420\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u0447\u0438\u043a\u0438\u00a0Zabbix\u00a0\u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0438 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f (\u0432\u0435\u0440\u0441\u0438\u0438 5.4.9, 5.0.9 \u0438 4.0.37), \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0440\u0435\u0448\u0430\u044e\u0442 \u043e\u0431\u0435 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u044b, \u0432 \u0441\u0432\u044f\u0437\u0438 \u0441 \u0447\u0435\u043c, \u043d\u0430\u0441\u0442\u043e\u044f\u0442\u0435\u043b\u044c\u043d\u043e \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u043c \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u0438\u0442\u044c \u0438\u0445, \u043e\u0441\u043e\u0431\u0435\u043d\u043d\u043e \u0432 \u043a\u043e\u043d\u0442\u0435\u043a\u0441\u0442\u0435 \u0430\u043a\u0442\u0438\u0432\u043d\u043e\u0439 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438. \u0421\u0430\u043c\u0438 \u043e\u0446\u0435\u043d\u0438\u0442\u0435 \u043d\u0430\u0441\u043a\u043e\u043b\u044c\u043a\u043e \u043f\u0440\u043e\u0441\u0442\u043e\u0439 \u043e\u043d\u0430 \u043c\u043e\u0436\u0435\u0442 \u0431\u044b\u0442\u044c", "creation_timestamp": "2022-02-25T18:16:00.000000Z"}, {"uuid": "60f468de-97cb-4329-a48b-a163f452ffc0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-23138", "type": "seen", "source": "https://t.me/cibsecurity/44101", "content": "\u203c CVE-2022-23138 \u203c\n\nZTE's MF297D product has cryptographic issues vulnerability. Due to the use of weak random values, the security of the device is reduced, and it may face the risk of attack.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-06-09T18:33:25.000000Z"}, {"uuid": "6636c96b-be53-4920-8e86-9fe0dc94b09b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-23133", "type": "seen", "source": "https://t.me/cibsecurity/35416", "content": "\u203c CVE-2022-23133 \u203c\n\nAn authenticated user can create a hosts group from the configuration with XSS payload, which will be available for other users. When XSS is stored by an authenticated malicious actor and other users try to search for groups during new host creation, the XSS payload will fire and the actor can steal session cookies and perform session hijacking to impersonate users or take over their accounts.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-01-13T18:18:32.000000Z"}, {"uuid": "03e034e0-58ab-4923-9b7f-f38dcc517486", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-23139", "type": "seen", "source": "https://t.me/cibsecurity/42560", "content": "\u203c CVE-2022-23139 \u203c\n\nZTE's ZXMP M721 product has a permission and access control vulnerability. Since the folder permission viewed by sftp is 666, which is inconsistent with the actual permission. It\u00e2\u20ac\u2122s easy for?users to?ignore the modification?of?the file permission configuration, so that low-authority accounts could actually obtain higher operating permissions on key files.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-05-13T00:42:23.000000Z"}, {"uuid": "70f0403a-fe01-40da-8a84-d39a9ab8f347", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-23136", "type": "seen", "source": "https://t.me/cibsecurity/39853", "content": "\u203c CVE-2022-23136 \u203c\n\nThere is a stored XSS vulnerability in ZTE home gateway product. An attacker could modify the gateway name by inserting special characters and trigger an XSS attack when the user views the current topology of the device through the management page.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-03-30T20:18:36.000000Z"}, {"uuid": "195c9cd1-766c-490c-bd13-24a900d2b29a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-23134", "type": "seen", "source": "https://t.me/cibsecurity/35418", "content": "\u203c CVE-2022-23134 \u203c\n\nAfter the initial setup process, some steps of setup.php file are reachable not only by super-administrators, but by unauthenticated users as well. Malicious actor can pass step checks and potentially change the configuration of Zabbix Frontend.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-01-13T18:18:35.000000Z"}, {"uuid": "6a7fbf7f-71fa-490f-b04b-2cdaf7b8f9d4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-23132", "type": "seen", "source": "https://t.me/cibsecurity/35415", "content": "\u203c CVE-2022-23132 \u203c\n\nDuring Zabbix installation from RPM, DAC_OVERRIDE SELinux capability is in use to access PID files in [/var/run/zabbix] folder. In this case, Zabbix Proxy or Server processes can bypass file read, write and execute permissions check on the file system level\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-01-13T18:18:31.000000Z"}, {"uuid": "e2d3d29c-0672-4338-9f96-651c110f2454", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-23131", "type": "seen", "source": "https://t.me/cibsecurity/35414", "content": "\u203c CVE-2022-23131 \u203c\n\nIn the case of instances where the SAML SSO authentication is enabled (non-default), session data can be modified by a malicious actor, because a user login stored in the session was not verified. Malicious unauthenticated actor may exploit this issue to escalate privileges and gain admin access to Zabbix Frontend. To perform the attack, SAML authentication is required to be enabled and the actor has to know the username of Zabbix user (or use the guest account, which is disabled by default).\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-01-13T18:18:30.000000Z"}, {"uuid": "3b2ac942-596c-4ee2-a7f9-e48760d6bc57", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-23130", "type": "seen", "source": "https://t.me/cibsecurity/36056", "content": "\u203c CVE-2022-23130 \u203c\n\nBuffer Over-read vulnerability in Mitsubishi Electric MC Works64 versions 4.00A (10.95.201.23) to 4.04E (10.95.210.01), ICONICS GENESIS64 versions 10.97 and prior and ICONICS Hyper Historian versions 10.97 and prior allows an attacker to cause a DoS condition in the database server by getting a legitimate user to import a configuration file containing specially crafted stored procedures into GENESIS64 or MC Works64 and execute commands against the database from GENESIS64 or MC Works64.\n\n\ud83d\udcd6 Read\n\nvia \"National Vulnerability Database\".", "creation_timestamp": "2022-01-21T22:14:03.000000Z"}, {"uuid": "d6b921bb-b3cb-42e7-8a72-395c7b7aba09", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-23134", "type": "exploited", "source": "https://t.me/thehackernews/1917", "content": "U.S. cybersecurity agency CISA is warning companies about two actively exploited vulnerabilities affecting the widely used open-source Zabbix enterprise monitoring platform.\n\n\u2705 CVE-2022-23131\n\u2705 CVE-2022-23134\n\nDetails: https://thehackernews.com/2022/02/cisa-alerts-on-actively-exploited-flaws.html", "creation_timestamp": "2022-02-24T13:18:32.000000Z"}, {"uuid": "0352fc68-42a7-4e7f-b145-b6b9bdb518d1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-23131", "type": "exploited", "source": "https://t.me/thehackernews/1917", "content": "U.S. cybersecurity agency CISA is warning companies about two actively exploited vulnerabilities affecting the widely used open-source Zabbix enterprise monitoring platform.\n\n\u2705 CVE-2022-23131\n\u2705 CVE-2022-23134\n\nDetails: https://thehackernews.com/2022/02/cisa-alerts-on-actively-exploited-flaws.html", "creation_timestamp": "2022-02-24T13:18:32.000000Z"}, {"uuid": "a0e0db64-8083-4586-bc9f-8475005d6d6e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-23131", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/1361", "content": "https://github.com/r10lab/CVE-2022-23131\n#github", "creation_timestamp": "2023-10-26T05:23:35.000000Z"}, {"uuid": "1b9a4413-d9e7-45a6-adc9-4936233eb791", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-23131", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/9265", "content": "#exploit\n1. CVE-2023-4069:\nGetting RCE in Chrome with incomplete object initialization in the Maglev compiler\nhttps://github.blog/2023-10-17-getting-rce-in-chrome-with-incomplete-object-initialization-in-the-maglev-compiler\n\n2. CVE-2022-23131:\nZabbix SAML Bypass\nhttps://github.com/Mr-xn/cve-2022-23131\n]-&gt; https://github.com/r10lab/CVE-2022-23131", "creation_timestamp": "2023-10-26T10:59:01.000000Z"}, {"uuid": "e9d3423f-304a-4cb4-8ad8-bca7cf9a159b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-23131", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/5445", "content": "#Threat_Research\n1. Exploiting Jenkins build authorization\nhttps://medium.com/cider-sec/exploiting-jenkins-build-authorization-22bf72926072\n2. CVE-2022-23131 - Zabbix SAML Authentication Bypass\nhttps://blog.sonarsource.com/zabbix-case-study-of-unsafe-session-storage", "creation_timestamp": "2022-02-19T13:30:24.000000Z"}, {"uuid": "e8ef6ba8-8f81-4666-974d-1a85d7631a10", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-23131", "type": "published-proof-of-concept", "source": "https://t.me/win_def/100", "content": "\u041e\u0431\u0445\u043e\u0434 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438 SAML SSO \u0432 Zabbix (CVE-2022-23131)\n\n\u0415\u0441\u043b\u0438 \u0432 \u043f\u0430\u043d\u0435\u043b\u0438 Zabbix \u0432\u043a\u043b\u044e\u0447\u0435\u043d\u0430 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438 SAML SSO (\u043f\u043e \u0443\u043c\u043e\u043b\u0447\u0430\u043d\u0438\u044e \u043e\u0442\u043a\u043b\u044e\u0447\u0435\u043d\u0430) \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u0434\u0430\u043d\u043d\u044b\u0435 \u0441\u0435\u0430\u043d\u0441\u0430 \u0438 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c \u044d\u0442\u0443 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0443 \u0434\u043b\u044f \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u0438\u044f \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439 \u0438 \u043f\u043e\u043b\u0443\u0447\u0435\u043d\u0438\u044f \u0430\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u0438\u0432\u043d\u043e\u0433\u043e \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u043a Zabbix Frontend.\n\n\u0414\u043b\u044f \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u044f \u0430\u0442\u0430\u043a\u0438 \u043d\u0443\u0436\u043d\u043e \u0437\u043d\u0430\u0442\u044c (\u0438\u043b\u0438 \u043f\u043e\u0434\u043e\u0431\u0440\u0430\u0442\u044c) \u0438\u043c\u044f \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f Zabbix \u0438\u043b\u0438 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c \u0433\u043e\u0441\u0442\u0435\u0432\u0443\u044e \u0443\u0447\u0435\u0442\u043d\u0443\u044e \u0437\u0430\u043f\u0438\u0441\u044c, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043e\u0442\u043a\u043b\u044e\u0447\u0435\u043d\u0430 \u043f\u043e \u0443\u043c\u043e\u043b\u0447\u0430\u043d\u0438\u044e.\n\n\u0412\u0438\u0434\u0435\u043e\n\n\u0421\u0441\u044b\u043b\u043a\u0430 \u043d\u0430  POC\n\n\u0414\u043e\u0440\u043a \u0434\u043b\u044f Shodan:\nhttp.html:zabbix http.html:saml", "creation_timestamp": "2022-02-20T10:36:27.000000Z"}, {"uuid": "42167581-746a-4af3-a029-1e328ee03b64", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2022-23131", "type": "published-proof-of-concept", "source": "https://t.me/Rootsec_2/1546", "content": "#exploit\n1. CVE-2023-4069:\nGetting RCE in Chrome with incomplete object initialization in the Maglev compiler\nhttps://github.blog/2023-10-17-getting-rce-in-chrome-with-incomplete-object-initialization-in-the-maglev-compiler\n\n2. CVE-2022-23131:\nZabbix SAML Bypass\nhttps://github.com/Mr-xn/cve-2022-23131\n]-&gt; https://github.com/r10lab/CVE-2022-23131", "creation_timestamp": "2024-08-16T08:40:07.000000Z"}]}