Zabbix – SAML SSO Authentication Bypass

In the case of instances where the SAML SSO authentication is enabled (non-default), session data can be modified by a malicious actor, because a user login stored in the session was not verified.

Dork:

shodan-query: http.favicon.hash:892542951
fofa-query: app="ZABBIX-监控系统" && body="saml"

usage

nuclei -l target.txt -tags zabbix
python3 zabbix_session_exp.py  -t https:target.com -u Admin

refrences

Leave a Reply