diff --git a/Zabbix/CVE-2022-23134/README.md b/Zabbix/CVE-2022-23134/README.md new file mode 100644 index 0000000..60d725a --- /dev/null +++ b/Zabbix/CVE-2022-23134/README.md @@ -0,0 +1,9 @@ +# Zabbix Setup Configuration Unauthenticated Access (CVE-2022-23134) + +Zabbix is an open source monitoring system. The system supports network monitoring, server monitoring, cloud monitoring and application monitoring, etc. After the initial setup process, some steps of setup.php file are reachable not only by super-administrators, but by unauthenticated users as well. Malicious actor can pass step checks and potentially change the configuration of Zabbix Frontend. + +FOFA **query rule**: [banner="zbx_session=" || header="zbx_session="](https://fofapro.com/result?qbase64=YmFubmVyPSJ6Ynhfc2Vzc2lvbj0iIHx8IGhlYWRlcj0iemJ4X3Nlc3Npb249Ig%3D%3D) + +# Demo + +![Zabbix_Setup_Configuration_Unauthenticated_Access_CVE_2022_23134](Zabbix_Setup_Configuration_Unauthenticated_Access_CVE_2022_23134.gif) diff --git a/Zabbix/CVE-2022-23134/Zabbix_Setup_Configuration_Unauthenticated_Access_CVE_2022_23134.gif b/Zabbix/CVE-2022-23134/Zabbix_Setup_Configuration_Unauthenticated_Access_CVE_2022_23134.gif new file mode 100644 index 0000000..5478c8a Binary files /dev/null and b/Zabbix/CVE-2022-23134/Zabbix_Setup_Configuration_Unauthenticated_Access_CVE_2022_23134.gif differ