All the vulnerabilites related to zabbix - zabbix
cve-2024-22123
Vulnerability from cvelistv5
Published
2024-08-09 10:57
Modified
2024-08-09 14:41
Summary
Setting SMS media allows to set GSM modem file. Later this file is used as Linux device. But due everything is a file for Linux, it is possible to set another file, e.g. log file and zabbix_server will try to communicate with it as modem. As a result, log file will be broken with AT commands and small part for log file content will be leaked to UI.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-22123",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-08-09T14:40:56.436287Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-09T14:41:24.330Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "modules": [
            "Server"
          ],
          "product": "Zabbix",
          "repo": "https://git.zabbix.com/",
          "vendor": "Zabbix",
          "versions": [
            {
              "changes": [
                {
                  "at": "5.0.43rc1",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.0.42",
              "status": "affected",
              "version": "5.0.0",
              "versionType": "git"
            },
            {
              "changes": [
                {
                  "at": "6.0.31rc1",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.0.30",
              "status": "affected",
              "version": "6.0.0",
              "versionType": "git"
            },
            {
              "changes": [
                {
                  "at": "6.4.16rc1",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.4.15",
              "status": "affected",
              "version": "6.4.0",
              "versionType": "git"
            },
            {
              "changes": [
                {
                  "at": "7.0.0rc3",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "7.0.0rc2",
              "status": "affected",
              "version": "7.0.0alpha1",
              "versionType": "git"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "value": "Zabbix wants to thank -- who submitted this report in HackerOne bug bounty platform"
        }
      ],
      "datePublic": "2024-06-12T11:19:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Setting SMS media allows to set GSM modem file. Later this file is used as Linux device. But due everything is a file for Linux, it is possible to set another file, e.g. log file and zabbix_server will try to communicate with it as modem. As a result, log file will be broken with AT commands and small part for log file content will be leaked to UI."
            }
          ],
          "value": "Setting SMS media allows to set GSM modem file. Later this file is used as Linux device. But due everything is a file for Linux, it is possible to set another file, e.g. log file and zabbix_server will try to communicate with it as modem. As a result, log file will be broken with AT commands and small part for log file content will be leaked to UI."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-253",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-253 Remote Code Inclusion"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 2.7,
            "baseSeverity": "LOW",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-94",
              "description": "CWE-94 Improper Control of Generation of Code (\u0027Code Injection\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-08-09T13:25:38.067Z",
        "orgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8",
        "shortName": "Zabbix"
      },
      "references": [
        {
          "url": "https://support.zabbix.com/browse/ZBX-25013"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "Zabbix Arbitrary File Read",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8",
    "assignerShortName": "Zabbix",
    "cveId": "CVE-2024-22123",
    "datePublished": "2024-08-09T10:57:08.143Z",
    "dateReserved": "2024-01-05T07:44:01.395Z",
    "dateUpdated": "2024-08-09T14:41:24.330Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2024-22117
Vulnerability from cvelistv5
Published
2024-11-26 14:11
Modified
2024-11-26 15:06
Summary
When a URL is added to the map element, it is recorded in the database with sequential IDs. Upon adding a new URL, the system retrieves the last sysmapelementurlid value and increments it by one. However, an issue arises when a user manually changes the sysmapelementurlid value by adding sysmapelementurlid + 1. This action prevents others from adding URLs to the map element.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-22117",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-26T15:03:28.054720Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-26T15:06:22.759Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "modules": [
            "Frontend",
            "API"
          ],
          "product": "Zabbix",
          "repo": "https://git.zabbix.com/",
          "vendor": "Zabbix",
          "versions": [
            {
              "changes": [
                {
                  "at": "5.0.44rc1",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.0.43",
              "status": "affected",
              "version": "5,0,0",
              "versionType": "git"
            },
            {
              "changes": [
                {
                  "at": "6.0.34rc1",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.0.33",
              "status": "affected",
              "version": "6.0.0",
              "versionType": "git"
            },
            {
              "changes": [
                {
                  "at": "6.4.19rc1",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.4.18",
              "status": "affected",
              "version": "6.4.0",
              "versionType": "git"
            },
            {
              "changes": [
                {
                  "at": "7.0.4rc1",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "7.0.3",
              "status": "affected",
              "version": "7.0.0",
              "versionType": "git"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "value": "Zabbix wants to thank prasetia (prasetia) for submitting this report on the HackerOne bug bounty platform"
        }
      ],
      "datePublic": "2024-07-03T08:33:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "When a URL is added to the map element, it is recorded in the database with sequential IDs. Upon adding a new URL, the system retrieves the last sysmapelementurlid value and increments it by one. However, an issue arises when a user manually changes the sysmapelementurlid value by adding sysmapelementurlid + 1. This action prevents others from adding URLs to the map element."
            }
          ],
          "value": "When a URL is added to the map element, it is recorded in the database with sequential IDs. Upon adding a new URL, the system retrieves the last sysmapelementurlid value and increments it by one. However, an issue arises when a user manually changes the sysmapelementurlid value by adding sysmapelementurlid + 1. This action prevents others from adding URLs to the map element."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-207",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-207 Removing Important Client Functionality"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 2.2,
            "baseSeverity": "LOW",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-20",
              "description": "CWE-20 Improper Input Validation",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-11-26T14:11:57.195Z",
        "orgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8",
        "shortName": "Zabbix"
      },
      "references": [
        {
          "url": "https://support.zabbix.com/browse/ZBX-25610"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "Value of sysmap_element_url can be de-synchronized causing the map element to crash when new URLs is added",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8",
    "assignerShortName": "Zabbix",
    "cveId": "CVE-2024-22117",
    "datePublished": "2024-11-26T14:11:57.195Z",
    "dateReserved": "2024-01-05T07:44:01.394Z",
    "dateUpdated": "2024-11-26T15:06:22.759Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2009-4498
Vulnerability from cvelistv5
Published
2009-12-31 18:00
Modified
2024-08-07 07:08
Severity ?
Summary
The node_process_command function in Zabbix Server before 1.8 allows remote attackers to execute arbitrary commands via a crafted request.
References
http://www.securityfocus.com/archive/1/508436/30/60/threadedmailing-list, x_refsource_BUGTRAQ
https://support.zabbix.com/browse/ZBX-1030x_refsource_CONFIRM
http://www.openwall.com/lists/oss-security/2010/04/02/1mailing-list, x_refsource_MLIST
http://secunia.com/advisories/37740third-party-advisory, x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2009/3514vdb-entry, x_refsource_VUPEN
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T07:08:36.847Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20091213 Zabbix Server : Multiple remote vulnerabilities",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/508436/30/60/threaded"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://support.zabbix.com/browse/ZBX-1030"
          },
          {
            "name": "[oss-security] 20100402 RE: CVE Request -- Zabbix v1.8.2 and v.1.6.9",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2010/04/02/1"
          },
          {
            "name": "37740",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/37740"
          },
          {
            "name": "ADV-2009-3514",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/3514"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-12-13T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The node_process_command function in Zabbix Server before 1.8 allows remote attackers to execute arbitrary commands via a crafted request."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2010-04-30T09:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "20091213 Zabbix Server : Multiple remote vulnerabilities",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/508436/30/60/threaded"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://support.zabbix.com/browse/ZBX-1030"
        },
        {
          "name": "[oss-security] 20100402 RE: CVE Request -- Zabbix v1.8.2 and v.1.6.9",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2010/04/02/1"
        },
        {
          "name": "37740",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/37740"
        },
        {
          "name": "ADV-2009-3514",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/3514"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-4498",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The node_process_command function in Zabbix Server before 1.8 allows remote attackers to execute arbitrary commands via a crafted request."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20091213 Zabbix Server : Multiple remote vulnerabilities",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/508436/30/60/threaded"
            },
            {
              "name": "https://support.zabbix.com/browse/ZBX-1030",
              "refsource": "CONFIRM",
              "url": "https://support.zabbix.com/browse/ZBX-1030"
            },
            {
              "name": "[oss-security] 20100402 RE: CVE Request -- Zabbix v1.8.2 and v.1.6.9",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2010/04/02/1"
            },
            {
              "name": "37740",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/37740"
            },
            {
              "name": "ADV-2009-3514",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2009/3514"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-4498",
    "datePublished": "2009-12-31T18:00:00",
    "dateReserved": "2009-12-30T00:00:00",
    "dateUpdated": "2024-08-07T07:08:36.847Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2016-10134
Vulnerability from cvelistv5
Published
2017-02-16 18:00
Modified
2024-08-06 03:14
Severity ?
Summary
SQL injection vulnerability in Zabbix before 2.2.14 and 3.0 before 3.0.4 allows remote attackers to execute arbitrary SQL commands via the toggle_ids array parameter in latest.php.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T03:14:42.371Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://code610.blogspot.com/2017/10/zbx-11023-quick-autopsy.html"
          },
          {
            "name": "[oss-security] 20170112 CVE Request: Zabbix: SQL injection vulnerabilities in \"Latest data\"",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2017/01/12/4"
          },
          {
            "name": "DSA-3802",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2017/dsa-3802"
          },
          {
            "name": "[oss-security] 20170112 Re: CVE Request: Zabbix: SQL injection vulnerabilities in \"Latest data\"",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2017/01/13/4"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=850936"
          },
          {
            "name": "95423",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/95423"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://support.zabbix.com/browse/ZBX-11023"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2016-07-22T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "SQL injection vulnerability in Zabbix before 2.2.14 and 3.0 before 3.0.4 allows remote attackers to execute arbitrary SQL commands via the toggle_ids array parameter in latest.php."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-11-03T18:57:01",
        "orgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5",
        "shortName": "debian"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://code610.blogspot.com/2017/10/zbx-11023-quick-autopsy.html"
        },
        {
          "name": "[oss-security] 20170112 CVE Request: Zabbix: SQL injection vulnerabilities in \"Latest data\"",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2017/01/12/4"
        },
        {
          "name": "DSA-3802",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2017/dsa-3802"
        },
        {
          "name": "[oss-security] 20170112 Re: CVE Request: Zabbix: SQL injection vulnerabilities in \"Latest data\"",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2017/01/13/4"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=850936"
        },
        {
          "name": "95423",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/95423"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://support.zabbix.com/browse/ZBX-11023"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@debian.org",
          "ID": "CVE-2016-10134",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "SQL injection vulnerability in Zabbix before 2.2.14 and 3.0 before 3.0.4 allows remote attackers to execute arbitrary SQL commands via the toggle_ids array parameter in latest.php."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://code610.blogspot.com/2017/10/zbx-11023-quick-autopsy.html",
              "refsource": "MISC",
              "url": "https://code610.blogspot.com/2017/10/zbx-11023-quick-autopsy.html"
            },
            {
              "name": "[oss-security] 20170112 CVE Request: Zabbix: SQL injection vulnerabilities in \"Latest data\"",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2017/01/12/4"
            },
            {
              "name": "DSA-3802",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2017/dsa-3802"
            },
            {
              "name": "[oss-security] 20170112 Re: CVE Request: Zabbix: SQL injection vulnerabilities in \"Latest data\"",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2017/01/13/4"
            },
            {
              "name": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=850936",
              "refsource": "CONFIRM",
              "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=850936"
            },
            {
              "name": "95423",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/95423"
            },
            {
              "name": "https://support.zabbix.com/browse/ZBX-11023",
              "refsource": "CONFIRM",
              "url": "https://support.zabbix.com/browse/ZBX-11023"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5",
    "assignerShortName": "debian",
    "cveId": "CVE-2016-10134",
    "datePublished": "2017-02-16T18:00:00",
    "dateReserved": "2017-01-12T00:00:00",
    "dateUpdated": "2024-08-06T03:14:42.371Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2019-17382
Vulnerability from cvelistv5
Published
2019-10-09 00:00
Modified
2024-08-05 01:40
Severity ?
Summary
An issue was discovered in zabbix.php?action=dashboard.view&dashboardid=1 in Zabbix through 4.4. An attacker can bypass the login page and access the dashboard page, and then create a Dashboard, Report, Screen, or Map without any Username/Password (i.e., anonymously). All created elements (Dashboard/Report/Screen/Map) are accessible by other users and by an admin.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T01:40:15.402Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.exploit-db.com/exploits/47467"
          },
          {
            "name": "[debian-lts-announce] 20230822 [SECURITY] [DLA 3538-1] zabbix security update",
            "tags": [
              "mailing-list",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00027.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "An issue was discovered in zabbix.php?action=dashboard.view\u0026dashboardid=1 in Zabbix through 4.4. An attacker can bypass the login page and access the dashboard page, and then create a Dashboard, Report, Screen, or Map without any Username/Password (i.e., anonymously). All created elements (Dashboard/Report/Screen/Map) are accessible by other users and by an admin."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-08-22T15:06:30.132003",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "https://www.exploit-db.com/exploits/47467"
        },
        {
          "name": "[debian-lts-announce] 20230822 [SECURITY] [DLA 3538-1] zabbix security update",
          "tags": [
            "mailing-list"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00027.html"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2019-17382",
    "datePublished": "2019-10-09T00:00:00",
    "dateReserved": "2019-10-09T00:00:00",
    "dateUpdated": "2024-08-05T01:40:15.402Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2024-36462
Vulnerability from cvelistv5
Published
2024-08-09 09:40
Modified
2024-08-12 15:44
Summary
Uncontrolled resource consumption refers to a software vulnerability where a attacker or system uses excessive resources, such as CPU, memory, or network bandwidth, without proper limitations or controls. This can cause a denial-of-service (DoS) attack or degrade the performance of the affected system.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unaffected",
            "product": "zabbix",
            "vendor": "zabbix",
            "versions": [
              {
                "lessThanOrEqual": "7.0.0rc2",
                "status": "affected",
                "version": "7.0.0alpha1",
                "versionType": "git"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-36462",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-08-09T12:57:48.410404Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-12T15:44:18.989Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "modules": [
            "Server"
          ],
          "product": "Zabbix",
          "repo": "https://git.zabbix.com/",
          "vendor": "Zabbix",
          "versions": [
            {
              "changes": [
                {
                  "at": "7.0.0rc3",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "7.0.0rc2",
              "status": "affected",
              "version": "7.0.0alpha1",
              "versionType": "git"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "value": "Zabbix extends its gratitude to justonezero for submitting this report on the HackerOne bug bounty platform"
        }
      ],
      "datePublic": "2024-06-13T10:09:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Uncontrolled resource consumption refers to a software vulnerability where a attacker or system uses excessive resources, such as CPU, memory, or network bandwidth, without proper limitations or controls. This can cause a denial-of-service (DoS) attack or degrade the performance of the affected system."
            }
          ],
          "value": "Uncontrolled resource consumption refers to a software vulnerability where a attacker or system uses excessive resources, such as CPU, memory, or network bandwidth, without proper limitations or controls. This can cause a denial-of-service (DoS) attack or degrade the performance of the affected system."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-130",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-130 Excessive Allocation"
            }
          ]
        },
        {
          "capecId": "CAPEC-469",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-469 HTTP DoS"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-770",
              "description": "CWE-770 Allocation of Resources Without Limits or Throttling",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-08-09T13:54:16.730Z",
        "orgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8",
        "shortName": "Zabbix"
      },
      "references": [
        {
          "url": "https://support.zabbix.com/browse/ZBX-25019"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "Allocation of resources without limits or throttling (uncontrolled resource consumption)",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8",
    "assignerShortName": "Zabbix",
    "cveId": "CVE-2024-36462",
    "datePublished": "2024-08-09T09:40:33.302Z",
    "dateReserved": "2024-05-28T11:21:24.946Z",
    "dateUpdated": "2024-08-12T15:44:18.989Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2023-32722
Vulnerability from cvelistv5
Published
2023-10-12 06:06
Modified
2024-09-18 15:37
Severity ?
Summary
The zabbix/src/libs/zbxjson module is vulnerable to a buffer overflow when parsing JSON files via zbx_json_open.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T15:25:36.599Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://support.zabbix.com/browse/ZBX-23390"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "zabbix",
            "vendor": "zabbix",
            "versions": [
              {
                "lessThanOrEqual": "6.0.20",
                "status": "affected",
                "version": "6.0.0",
                "versionType": "custom"
              },
              {
                "lessThanOrEqual": "6.4.5",
                "status": "affected",
                "version": "6.4.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:zabbix:zabbix:7.0.0:alpha1:*:*:*:*:*:*",
              "cpe:2.3:a:zabbix:zabbix:7.0.0:alpha2:*:*:*:*:*:*",
              "cpe:2.3:a:zabbix:zabbix:7.0.0:alpha3:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "zabbix",
            "vendor": "zabbix",
            "versions": [
              {
                "status": "affected",
                "version": "7.0.0"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-32722",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-09-18T15:26:49.479889Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-09-18T15:37:01.539Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "modules": [
            "Agent",
            "Proxy",
            "Server"
          ],
          "product": "Zabbix",
          "repo": "https://git.zabbix.com/",
          "vendor": "Zabbix",
          "versions": [
            {
              "changes": [
                {
                  "at": "6.0.21rc1",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.0.20",
              "status": "affected",
              "version": "6.0.0",
              "versionType": "git"
            },
            {
              "changes": [
                {
                  "at": "6.4.6rc1",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.4.5",
              "status": "affected",
              "version": "6.4.0",
              "versionType": "git"
            },
            {
              "changes": [
                {
                  "at": "7.0.0alpha4",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "7.0.0alpha3",
              "status": "affected",
              "version": "7.0.0alpha1",
              "versionType": "git"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "This vulnerability is found by Koffi (kandersonko) from HackerOne community."
        }
      ],
      "datePublic": "2023-09-11T09:55:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "The zabbix/src/libs/zbxjson module is vulnerable to a buffer overflow when parsing JSON files via zbx_json_open."
            }
          ],
          "value": "The zabbix/src/libs/zbxjson module is vulnerable to a buffer overflow when parsing JSON files via zbx_json_open."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-253",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-253 Remote Code Inclusion"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.6,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-120",
              "description": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-10-12T06:06:52.182Z",
        "orgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8",
        "shortName": "Zabbix"
      },
      "references": [
        {
          "url": "https://support.zabbix.com/browse/ZBX-23390"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Stack-buffer Overflow in library module zbxjson",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8",
    "assignerShortName": "Zabbix",
    "cveId": "CVE-2023-32722",
    "datePublished": "2023-10-12T06:06:52.182Z",
    "dateReserved": "2023-05-11T21:25:43.367Z",
    "dateUpdated": "2024-09-18T15:37:01.539Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2022-23133
Vulnerability from cvelistv5
Published
2022-01-13 15:50
Modified
2024-09-16 21:08
Summary
An authenticated user can create a hosts group from the configuration with XSS payload, which will be available for other users. When XSS is stored by an authenticated malicious actor and other users try to search for groups during new host creation, the XSS payload will fire and the actor can steal session cookies and perform session hijacking to impersonate users or take over their accounts.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T03:36:19.878Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://support.zabbix.com/browse/ZBX-20388"
          },
          {
            "name": "FEDORA-2022-dfe346f53f",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6SZYHXINBKCY42ITFSNCYE7KCSF33VRA/"
          },
          {
            "name": "FEDORA-2022-1a667b0f90",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VB6W556GVXOKUYTASTDGL3AI7S3SJHX7/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Frontend",
          "vendor": "Zabbix",
          "versions": [
            {
              "status": "affected",
              "version": "5.0.0 \u2013 5.0.18"
            },
            {
              "status": "affected",
              "version": "5.4.0 \u2013 5.4.8"
            },
            {
              "lessThan": "5.0.19*",
              "status": "unaffected",
              "version": "5.0.19",
              "versionType": "custom"
            },
            {
              "lessThan": "5.4.9*",
              "status": "unaffected",
              "version": "5.4.9",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "Zabbix wants to thank Hazem Osama for reporting this issue to us"
        }
      ],
      "datePublic": "2021-12-08T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "An authenticated user can create a hosts group from the configuration with XSS payload, which will be available for other users. When XSS is stored by an authenticated malicious actor and other users try to search for groups during new host creation, the XSS payload will fire and the actor can steal session cookies and perform session hijacking to impersonate users or take over their accounts."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 6.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-79",
              "description": "CWE-79 Cross-site Scripting (XSS)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-01-23T03:06:27",
        "orgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8",
        "shortName": "Zabbix"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://support.zabbix.com/browse/ZBX-20388"
        },
        {
          "name": "FEDORA-2022-dfe346f53f",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6SZYHXINBKCY42ITFSNCYE7KCSF33VRA/"
        },
        {
          "name": "FEDORA-2022-1a667b0f90",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VB6W556GVXOKUYTASTDGL3AI7S3SJHX7/"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "value": "To remediate this vulnerability, apply the updates."
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "Stored XSS in host groups configuration window in Zabbix Frontend",
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@zabbix.com",
          "DATE_PUBLIC": "2021-12-08T14:30:00.000Z",
          "ID": "CVE-2022-23133",
          "STATE": "PUBLIC",
          "TITLE": "Stored XSS in host groups configuration window in Zabbix Frontend"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Frontend",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_name": "5.0.0 \u2013 5.0.18",
                            "version_value": "5.0.0 \u2013 5.0.18"
                          },
                          {
                            "version_affected": "=",
                            "version_name": "5.4.0 \u2013 5.4.8",
                            "version_value": "5.4.0 \u2013 5.4.8"
                          },
                          {
                            "version_affected": "!\u003e=",
                            "version_name": "5.0.19",
                            "version_value": "5.0.19"
                          },
                          {
                            "version_affected": "!\u003e=",
                            "version_name": "5.4.9",
                            "version_value": "5.4.9"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Zabbix"
              }
            ]
          }
        },
        "credit": [
          {
            "lang": "eng",
            "value": "Zabbix wants to thank Hazem Osama for reporting this issue to us"
          }
        ],
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "An authenticated user can create a hosts group from the configuration with XSS payload, which will be available for other users. When XSS is stored by an authenticated malicious actor and other users try to search for groups during new host creation, the XSS payload will fire and the actor can steal session cookies and perform session hijacking to impersonate users or take over their accounts."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "impact": {
          "cvss": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 6.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-79 Cross-site Scripting (XSS)"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://support.zabbix.com/browse/ZBX-20388",
              "refsource": "MISC",
              "url": "https://support.zabbix.com/browse/ZBX-20388"
            },
            {
              "name": "FEDORA-2022-dfe346f53f",
              "refsource": "FEDORA",
              "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6SZYHXINBKCY42ITFSNCYE7KCSF33VRA/"
            },
            {
              "name": "FEDORA-2022-1a667b0f90",
              "refsource": "FEDORA",
              "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VB6W556GVXOKUYTASTDGL3AI7S3SJHX7/"
            }
          ]
        },
        "solution": [
          {
            "lang": "en",
            "value": "To remediate this vulnerability, apply the updates."
          }
        ],
        "source": {
          "discovery": "EXTERNAL"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8",
    "assignerShortName": "Zabbix",
    "cveId": "CVE-2022-23133",
    "datePublished": "2022-01-13T15:50:41.726421Z",
    "dateReserved": "2022-01-11T00:00:00",
    "dateUpdated": "2024-09-16T21:08:55.904Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2024-42327
Vulnerability from cvelistv5
Published
2024-11-27 12:04
Modified
2024-12-04 04:55
Severity ?
Summary
A non-admin user account on the Zabbix frontend with the default User role, or with any other role that gives API access can exploit this vulnerability. An SQLi exists in the CUser class in the addRelatedObjects function, this function is being called from the CUser.get function which is available for every user who has API access.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "zabbix",
            "vendor": "zabbix",
            "versions": [
              {
                "lessThanOrEqual": "6.0.31",
                "status": "affected",
                "version": "6.0.0",
                "versionType": "git"
              },
              {
                "lessThanOrEqual": "6.4.16",
                "status": "affected",
                "version": "6.4.0",
                "versionType": "git"
              },
              {
                "lessThanOrEqual": "7.0.1",
                "status": "affected",
                "version": "7.0.0",
                "versionType": "git"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-42327",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-12-03T00:00:00+00:00",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-12-04T04:55:21.730Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "modules": [
            "API"
          ],
          "product": "Zabbix",
          "repo": "https://git.zabbix.com/",
          "vendor": "Zabbix",
          "versions": [
            {
              "changes": [
                {
                  "at": "6.0.32rc1",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.0.31",
              "status": "affected",
              "version": "6.0.0",
              "versionType": "git"
            },
            {
              "changes": [
                {
                  "at": "6.4.17rc1",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.4.16",
              "status": "affected",
              "version": "6.4.0",
              "versionType": "git"
            },
            {
              "changes": [
                {
                  "at": "7.0.2rc1",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "7.0.1",
              "status": "affected",
              "version": "7.0.0",
              "versionType": "git"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Zabbix wants to thank M\u00e1rk R\u00e1k\u00f3czi (reeeeeeeeeeee) for submitting this report on the HackerOne bug bounty platform."
        }
      ],
      "datePublic": "2024-10-30T12:06:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "A non-admin user account on the Zabbix frontend with the default User role, or with any other role that gives API access can exploit this vulnerability. An SQLi exists in the CUser class in the addRelatedObjects function, this function is being called from the CUser.get function which is available for every user who has API access."
            }
          ],
          "value": "A non-admin user account on the Zabbix frontend with the default User role, or with any other role that gives API access can exploit this vulnerability. An SQLi exists in the CUser class in the addRelatedObjects function, this function is being called from the CUser.get function which is available for every user who has API access."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-233",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-233: Privilege Escalation"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.9,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-89",
              "description": "CWE-89: SQL Injection",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-11-27T12:04:31.950Z",
        "orgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8",
        "shortName": "Zabbix"
      },
      "references": [
        {
          "url": "https://support.zabbix.com/browse/ZBX-25623"
        }
      ],
      "source": {
        "discovery": "INTERNAL"
      },
      "title": "SQL injection in user.get API",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8",
    "assignerShortName": "Zabbix",
    "cveId": "CVE-2024-42327",
    "datePublished": "2024-11-27T12:04:31.950Z",
    "dateReserved": "2024-07-30T08:27:36.132Z",
    "dateUpdated": "2024-12-04T04:55:21.730Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2024-42331
Vulnerability from cvelistv5
Published
2024-11-27 12:06
Modified
2024-11-27 14:55
Summary
In the src/libs/zbxembed/browser.c file, the es_browser_ctor method retrieves a heap pointer from the Duktape JavaScript engine. This heap pointer is subsequently utilized by the browser_push_error method in the src/libs/zbxembed/browser_error.c file. A use-after-free bug can occur at this stage if the wd->browser heap pointer is freed by garbage collection.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-42331",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-27T14:55:25.904954Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-27T14:55:34.113Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "modules": [
            "Server"
          ],
          "product": "Zabbix",
          "repo": "https://git.zabbix.com/",
          "vendor": "Zabbix",
          "versions": [
            {
              "changes": [
                {
                  "at": "7.0.4rc1",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "7.0.3",
              "status": "affected",
              "version": "7.0.0",
              "versionType": "git"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "value": "Zabbix wants to thank chamal for submitting this report on the HackerOne bug bounty platform."
        }
      ],
      "datePublic": "2024-10-30T09:13:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "In the src/libs/zbxembed/browser.c file, the es_browser_ctor method retrieves a heap pointer from the Duktape JavaScript engine. This heap pointer is subsequently utilized by the browser_push_error method in the src/libs/zbxembed/browser_error.c file. A use-after-free bug can occur at this stage if the wd-\u0026gt;browser heap pointer is freed by garbage collection."
            }
          ],
          "value": "In the src/libs/zbxembed/browser.c file, the es_browser_ctor method retrieves a heap pointer from the Duktape JavaScript engine. This heap pointer is subsequently utilized by the browser_push_error method in the src/libs/zbxembed/browser_error.c file. A use-after-free bug can occur at this stage if the wd-\u003ebrowser heap pointer is freed by garbage collection."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-100",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-100 Overflow Buffers"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "LOW",
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-416",
              "description": "CWE-416 Use After Free",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-11-27T12:06:12.250Z",
        "orgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8",
        "shortName": "Zabbix"
      },
      "references": [
        {
          "url": "https://support.zabbix.com/browse/ZBX-25627"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "Use after free in browser_push_error",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8",
    "assignerShortName": "Zabbix",
    "cveId": "CVE-2024-42331",
    "datePublished": "2024-11-27T12:06:12.250Z",
    "dateReserved": "2024-07-30T08:27:36.132Z",
    "dateUpdated": "2024-11-27T14:55:34.113Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2024-42329
Vulnerability from cvelistv5
Published
2024-11-27 12:05
Modified
2024-11-27 14:55
Summary
The webdriver for the Browser object expects an error object to be initialized when the webdriver_session_query function fails. But this function can fail for various reasons without an error description and then the wd->error will be NULL and trying to read from it will result in a crash.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-42329",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-27T14:55:49.394112Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-27T14:55:58.417Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "modules": [
            "Server"
          ],
          "product": "Zabbix",
          "repo": "https://git.zabbix.com/",
          "vendor": "Zabbix",
          "versions": [
            {
              "changes": [
                {
                  "at": "7.0.4rc1",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "7.0.3rc1",
              "status": "affected",
              "version": "7.0.0",
              "versionType": "git"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "value": "Zabbix wants to thank zhutyra for submitting this report on the HackerOne bug bounty platform."
        }
      ],
      "datePublic": "2024-10-30T11:36:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "The webdriver for the Browser object expects an error object to be initialized when the webdriver_session_query function fails. But this function can fail for various reasons without an error description and then the wd-\u0026gt;error will be NULL and trying to read from it will result in a crash."
            }
          ],
          "value": "The webdriver for the Browser object expects an error object to be initialized when the webdriver_session_query function fails. But this function can fail for various reasons without an error description and then the wd-\u003eerror will be NULL and trying to read from it will result in a crash."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-215",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-215 Fuzzing for application mapping"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "LOW",
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-690",
              "description": "CWE-690 Unchecked Return Value to NULL Pointer Dereference",
              "lang": "en",
              "type": "CWE"
            }
          ]
        },
        {
          "descriptions": [
            {
              "cweId": "CWE-476",
              "description": "CWE-476 NULL Pointer Dereference",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-11-27T12:05:21.915Z",
        "orgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8",
        "shortName": "Zabbix"
      },
      "references": [
        {
          "url": "https://support.zabbix.com/browse/ZBX-25625"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "JS - Crash on unexpected HTTP server response",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8",
    "assignerShortName": "Zabbix",
    "cveId": "CVE-2024-42329",
    "datePublished": "2024-11-27T12:05:21.915Z",
    "dateReserved": "2024-07-30T08:27:36.132Z",
    "dateUpdated": "2024-11-27T14:55:58.417Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2011-4615
Vulnerability from cvelistv5
Published
2011-12-29 22:00
Modified
2024-08-07 00:09
Severity ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in Zabbix before 1.8.10 allow remote attackers to inject arbitrary web script or HTML via the gname parameter (aka host groups name) to (1) hostgroups.php and (2) usergrps.php, the update action to (3) hosts.php and (4) scripts.php, and (5) maintenance.php.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T00:09:19.538Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "77771",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/77771"
          },
          {
            "name": "51093",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/51093"
          },
          {
            "name": "FEDORA-2011-17559",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-January/071660.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://support.zabbix.com/browse/ZBX-4015"
          },
          {
            "name": "FEDORA-2011-17560",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-January/071687.html"
          },
          {
            "name": "zabbix-hostgroups-usergrps-xss(71855)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71855"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.zabbix.com/rn1.8.10.php"
          },
          {
            "name": "47216",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/47216"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-12-08T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple cross-site scripting (XSS) vulnerabilities in Zabbix before 1.8.10 allow remote attackers to inject arbitrary web script or HTML via the gname parameter (aka host groups name) to (1) hostgroups.php and (2) usergrps.php, the update action to (3) hosts.php and (4) scripts.php, and (5) maintenance.php."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-28T12:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "77771",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/77771"
        },
        {
          "name": "51093",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/51093"
        },
        {
          "name": "FEDORA-2011-17559",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-January/071660.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://support.zabbix.com/browse/ZBX-4015"
        },
        {
          "name": "FEDORA-2011-17560",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-January/071687.html"
        },
        {
          "name": "zabbix-hostgroups-usergrps-xss(71855)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71855"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.zabbix.com/rn1.8.10.php"
        },
        {
          "name": "47216",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/47216"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2011-4615",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple cross-site scripting (XSS) vulnerabilities in Zabbix before 1.8.10 allow remote attackers to inject arbitrary web script or HTML via the gname parameter (aka host groups name) to (1) hostgroups.php and (2) usergrps.php, the update action to (3) hosts.php and (4) scripts.php, and (5) maintenance.php."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "77771",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/77771"
            },
            {
              "name": "51093",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/51093"
            },
            {
              "name": "FEDORA-2011-17559",
              "refsource": "FEDORA",
              "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-January/071660.html"
            },
            {
              "name": "https://support.zabbix.com/browse/ZBX-4015",
              "refsource": "CONFIRM",
              "url": "https://support.zabbix.com/browse/ZBX-4015"
            },
            {
              "name": "FEDORA-2011-17560",
              "refsource": "FEDORA",
              "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-January/071687.html"
            },
            {
              "name": "zabbix-hostgroups-usergrps-xss(71855)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71855"
            },
            {
              "name": "http://www.zabbix.com/rn1.8.10.php",
              "refsource": "CONFIRM",
              "url": "http://www.zabbix.com/rn1.8.10.php"
            },
            {
              "name": "47216",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/47216"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2011-4615",
    "datePublished": "2011-12-29T22:00:00",
    "dateReserved": "2011-11-29T00:00:00",
    "dateUpdated": "2024-08-07T00:09:19.538Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2014-1682
Vulnerability from cvelistv5
Published
2014-05-08 14:00
Modified
2024-08-06 09:50
Severity ?
Summary
The API in Zabbix before 1.8.20rc1, 2.0.x before 2.0.11rc1, and 2.2.x before 2.2.2rc1 allows remote authenticated users to spoof arbitrary users via the user name in a user.login request.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T09:50:09.977Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "FEDORA-2014-5540",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-May/132377.html"
          },
          {
            "name": "65402",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/65402"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://support.zabbix.com/browse/ZBX-7703"
          },
          {
            "name": "FEDORA-2014-5551",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-May/132376.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-01-25T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The API in Zabbix before 1.8.20rc1, 2.0.x before 2.0.11rc1, and 2.2.x before 2.2.2rc1 allows remote authenticated users to spoof arbitrary users via the user name in a user.login request."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2014-05-08T12:57:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "FEDORA-2014-5540",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-May/132377.html"
        },
        {
          "name": "65402",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/65402"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://support.zabbix.com/browse/ZBX-7703"
        },
        {
          "name": "FEDORA-2014-5551",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-May/132376.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2014-1682",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The API in Zabbix before 1.8.20rc1, 2.0.x before 2.0.11rc1, and 2.2.x before 2.2.2rc1 allows remote authenticated users to spoof arbitrary users via the user name in a user.login request."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "FEDORA-2014-5540",
              "refsource": "FEDORA",
              "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-May/132377.html"
            },
            {
              "name": "65402",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/65402"
            },
            {
              "name": "https://support.zabbix.com/browse/ZBX-7703",
              "refsource": "CONFIRM",
              "url": "https://support.zabbix.com/browse/ZBX-7703"
            },
            {
              "name": "FEDORA-2014-5551",
              "refsource": "FEDORA",
              "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-May/132376.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2014-1682",
    "datePublished": "2014-05-08T14:00:00",
    "dateReserved": "2014-01-28T00:00:00",
    "dateUpdated": "2024-08-06T09:50:09.977Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2024-42333
Vulnerability from cvelistv5
Published
2024-11-27 12:07
Modified
2024-11-27 14:54
Summary
The researcher is showing that it is possible to leak a small amount of Zabbix Server memory using an out of bounds read in src/libs/zbxmedia/email.c
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-42333",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-27T14:54:27.245135Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-27T14:54:36.459Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "modules": [
            "Server"
          ],
          "product": "Zabbix",
          "repo": "https://git.zabbix.com/",
          "vendor": "Zabbix",
          "versions": [
            {
              "changes": [
                {
                  "at": "6.0.34rc1",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.0.33",
              "status": "affected",
              "version": "6.0.0",
              "versionType": "git"
            },
            {
              "changes": [
                {
                  "at": "6.4.19rc1",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.4.18",
              "status": "affected",
              "version": "6.4.0",
              "versionType": "git"
            },
            {
              "changes": [
                {
                  "at": "7.0.4rc1",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "7.0.3",
              "status": "affected",
              "version": "7.0.0",
              "versionType": "git"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "value": "Zabbix wants to thank chamal for submitting this report on the HackerOne bug bounty platform."
        }
      ],
      "datePublic": "2024-10-07T06:37:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "The researcher is showing that it is possible to leak a small amount of Zabbix Server memory using an out of bounds read in src/libs/zbxmedia/email.c"
            }
          ],
          "value": "The researcher is showing that it is possible to leak a small amount of Zabbix Server memory using an out of bounds read in src/libs/zbxmedia/email.c"
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-679",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-679 Exploitation of Improperly Configured or Implemented Memory Protections"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 2.7,
            "baseSeverity": "LOW",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-126",
              "description": "CWE-126 Buffer Over-read",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-11-27T12:07:11.159Z",
        "orgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8",
        "shortName": "Zabbix"
      },
      "references": [
        {
          "url": "https://support.zabbix.com/browse/ZBX-25629"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "Heap buffer over-read",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8",
    "assignerShortName": "Zabbix",
    "cveId": "CVE-2024-42333",
    "datePublished": "2024-11-27T12:07:11.159Z",
    "dateReserved": "2024-07-30T08:27:36.132Z",
    "dateUpdated": "2024-11-27T14:54:36.459Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2024-36460
Vulnerability from cvelistv5
Published
2024-08-09 09:28
Modified
2024-08-09 15:42
Summary
The front-end audit log allows viewing of unprotected plaintext passwords, where the passwords are displayed in plain text.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "zabbix",
            "vendor": "zabbix",
            "versions": [
              {
                "lessThanOrEqual": "5.0.42",
                "status": "affected",
                "version": "5.0.0",
                "versionType": "git"
              },
              {
                "lessThanOrEqual": "6.0.30",
                "status": "affected",
                "version": "6.0.0",
                "versionType": "git"
              },
              {
                "lessThanOrEqual": "6.4.15",
                "status": "affected",
                "version": "6.4.0",
                "versionType": "git"
              },
              {
                "lessThanOrEqual": "7.0.0rc2",
                "status": "affected",
                "version": "7.0.0alpha1",
                "versionType": "git"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-36460",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-08-09T15:04:09.786651Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-09T15:42:11.632Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "modules": [
            "Frontend"
          ],
          "product": "Zabbix",
          "repo": "https://git.zabbix.com/",
          "vendor": "Zabbix",
          "versions": [
            {
              "changes": [
                {
                  "at": "5.0.43rc1",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.0.42",
              "status": "affected",
              "version": "5,0,0",
              "versionType": "git"
            },
            {
              "changes": [
                {
                  "at": "6.0.31rc1",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.0.30",
              "status": "affected",
              "version": "6.0.0",
              "versionType": "git"
            },
            {
              "changes": [
                {
                  "at": "6.4.16rc1",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.4.15",
              "status": "affected",
              "version": "6.4.0",
              "versionType": "git"
            },
            {
              "changes": [
                {
                  "at": "7.2.0alpha1",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "7.0.0rc2",
              "status": "affected",
              "version": "7.0.0alpha1",
              "versionType": "git"
            }
          ]
        }
      ],
      "datePublic": "2024-06-13T06:57:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "The front-end audit log allows viewing of unprotected plaintext passwords, where the passwords are displayed in plain text."
            }
          ],
          "value": "The front-end audit log allows viewing of unprotected plaintext passwords, where the passwords are displayed in plain text."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-37",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-37 Retrieve Embedded Sensitive Data"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-256",
              "description": "CWE-256 Plaintext Storage of a Password",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-08-09T13:44:15.784Z",
        "orgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8",
        "shortName": "Zabbix"
      },
      "references": [
        {
          "url": "https://support.zabbix.com/browse/ZBX-25017"
        }
      ],
      "source": {
        "discovery": "INTERNAL"
      },
      "title": "Front-end audit log shows passwords in plaintext",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8",
    "assignerShortName": "Zabbix",
    "cveId": "CVE-2024-36460",
    "datePublished": "2024-08-09T09:28:12.887Z",
    "dateReserved": "2024-05-28T11:21:24.946Z",
    "dateUpdated": "2024-08-09T15:42:11.632Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2012-3435
Vulnerability from cvelistv5
Published
2012-08-15 20:00
Modified
2024-08-06 20:05
Severity ?
Summary
SQL injection vulnerability in frontends/php/popup_bitem.php in Zabbix 1.8.15rc1 and earlier, and 2.x before 2.0.2rc1, allows remote attackers to execute arbitrary SQL commands via the itemid parameter.
References
http://www.exploit-db.com/exploits/20087exploit, x_refsource_EXPLOIT-DB
http://secunia.com/advisories/50475third-party-advisory, x_refsource_SECUNIA
http://git.zabbixzone.com/zabbix2.0/.git/commitdiff/333a3a5542ba8a2c901c24b7bf5440f41f1f4f54x_refsource_CONFIRM
http://www.debian.org/security/2012/dsa-2539vendor-advisory, x_refsource_DEBIAN
https://support.zabbix.com/browse/ZBX-5348x_refsource_CONFIRM
http://secunia.com/advisories/49809third-party-advisory, x_refsource_SECUNIA
http://www.openwall.com/lists/oss-security/2012/07/27/6mailing-list, x_refsource_MLIST
http://www.securityfocus.com/bid/54661vdb-entry, x_refsource_BID
http://osvdb.org/84127vdb-entry, x_refsource_OSVDB
http://www.openwall.com/lists/oss-security/2012/07/28/3mailing-list, x_refsource_MLIST
https://exchange.xforce.ibmcloud.com/vulnerabilities/77195vdb-entry, x_refsource_XF
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T20:05:12.556Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20087",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "http://www.exploit-db.com/exploits/20087"
          },
          {
            "name": "50475",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/50475"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.zabbixzone.com/zabbix2.0/.git/commitdiff/333a3a5542ba8a2c901c24b7bf5440f41f1f4f54"
          },
          {
            "name": "DSA-2539",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2012/dsa-2539"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://support.zabbix.com/browse/ZBX-5348"
          },
          {
            "name": "49809",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/49809"
          },
          {
            "name": "[oss-security] 20120727 Zabbix SQL injection flaw (CVE request)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2012/07/27/6"
          },
          {
            "name": "54661",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/54661"
          },
          {
            "name": "84127",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/84127"
          },
          {
            "name": "[oss-security] 20120728 Re: Zabbix SQL injection flaw (CVE request)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2012/07/28/3"
          },
          {
            "name": "zabbix-popupbitem-sql-injection(77195)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77195"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-07-18T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "SQL injection vulnerability in frontends/php/popup_bitem.php in Zabbix 1.8.15rc1 and earlier, and 2.x before 2.0.2rc1, allows remote attackers to execute arbitrary SQL commands via the itemid parameter."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-28T12:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "20087",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "http://www.exploit-db.com/exploits/20087"
        },
        {
          "name": "50475",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/50475"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.zabbixzone.com/zabbix2.0/.git/commitdiff/333a3a5542ba8a2c901c24b7bf5440f41f1f4f54"
        },
        {
          "name": "DSA-2539",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2012/dsa-2539"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://support.zabbix.com/browse/ZBX-5348"
        },
        {
          "name": "49809",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/49809"
        },
        {
          "name": "[oss-security] 20120727 Zabbix SQL injection flaw (CVE request)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2012/07/27/6"
        },
        {
          "name": "54661",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/54661"
        },
        {
          "name": "84127",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/84127"
        },
        {
          "name": "[oss-security] 20120728 Re: Zabbix SQL injection flaw (CVE request)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2012/07/28/3"
        },
        {
          "name": "zabbix-popupbitem-sql-injection(77195)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77195"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2012-3435",
    "datePublished": "2012-08-15T20:00:00",
    "dateReserved": "2012-06-14T00:00:00",
    "dateUpdated": "2024-08-06T20:05:12.556Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2024-22121
Vulnerability from cvelistv5
Published
2024-08-09 08:34
Modified
2024-08-09 15:17
Summary
A non-admin user can change or remove important features within the Zabbix Agent application, thus impacting the integrity and availability of the application.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-22121",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-08-09T15:17:38.497917Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-09T15:17:48.357Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "modules": [
            "Agent"
          ],
          "product": "Zabbix",
          "repo": "https://git.zabbix.com/",
          "vendor": "Zabbix",
          "versions": [
            {
              "changes": [
                {
                  "at": "5.0.43rc1",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.0.42",
              "status": "affected",
              "version": "5.0.0",
              "versionType": "git"
            },
            {
              "changes": [
                {
                  "at": "6.0.31rc1",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.0.30",
              "status": "affected",
              "version": "6.0.0",
              "versionType": "git"
            },
            {
              "changes": [
                {
                  "at": "6.4.16rc1",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.4.15",
              "status": "affected",
              "version": "6.4.0",
              "versionType": "git"
            },
            {
              "changes": [
                {
                  "at": "7.0.0rc3",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "7.0.0rc2",
              "status": "affected",
              "version": "7.0.0alpha1",
              "versionType": "git"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "value": "Zabbix wants to thank gee-netics who submitted this report in HackerOne bug bounty platform"
        }
      ],
      "datePublic": "2024-06-12T10:37:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "A non-admin user can change or remove important features within the Zabbix Agent application, thus impacting the integrity and availability of the application."
            }
          ],
          "value": "A non-admin user can change or remove important features within the Zabbix Agent application, thus impacting the integrity and availability of the application."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-180",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-180 Exploiting Incorrectly Configured Access Control Security Levels"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "LOW",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-281",
              "description": "CWE-281 Improper Preservation of Permissions",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-08-09T13:08:21.185Z",
        "orgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8",
        "shortName": "Zabbix"
      },
      "references": [
        {
          "url": "https://support.zabbix.com/browse/ZBX-25011"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "Zabbix Agent MSI Installer Allows Non-Admin User to Access Change Option via msiexec.exe",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8",
    "assignerShortName": "Zabbix",
    "cveId": "CVE-2024-22121",
    "datePublished": "2024-08-09T08:34:47.392Z",
    "dateReserved": "2024-01-05T07:44:01.395Z",
    "dateUpdated": "2024-08-09T15:17:48.357Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2023-29450
Vulnerability from cvelistv5
Published
2023-07-13 08:25
Modified
2024-11-06 14:21
Summary
JavaScript pre-processing can be used by the attacker to gain access to the file system (read-only access on behalf of user "zabbix") on the Zabbix Server or Zabbix Proxy, potentially leading to unauthorized access to sensitive data.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T14:07:46.421Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://support.zabbix.com/browse/ZBX-22588"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00027.html"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-29450",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-06T14:20:54.709979Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-06T14:21:04.075Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "modules": [
            "Server",
            "Proxy"
          ],
          "product": "Zabbix",
          "repo": "https://git.zabbix.com/",
          "vendor": "Zabbix",
          "versions": [
            {
              "changes": [
                {
                  "at": "5.0.32rc1",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.0.31",
              "status": "affected",
              "version": "5.0",
              "versionType": "git"
            },
            {
              "changes": [
                {
                  "at": "6.0.14rc1 (6.0.16 is recommended)",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.0.13",
              "status": "affected",
              "version": "6.0",
              "versionType": "git"
            },
            {
              "changes": [
                {
                  "at": "6.2.8rc1",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.2.7",
              "status": "affected",
              "version": "6.2",
              "versionType": "git"
            },
            {
              "changes": [
                {
                  "at": "6.4.0rc2",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.4.0rc1",
              "status": "affected",
              "version": "6.4",
              "versionType": "git"
            }
          ]
        }
      ],
      "datePublic": "2023-02-23T08:03:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "JavaScript pre-processing can be used by the attacker to gain access to the file system (read-only access on behalf of user \"zabbix\") on the Zabbix Server or Zabbix Proxy, potentially leading to unauthorized access to sensitive data."
            }
          ],
          "value": "JavaScript pre-processing can be used by the attacker to gain access to the file system (read-only access on behalf of user \"zabbix\") on the Zabbix Server or Zabbix Proxy, potentially leading to unauthorized access to sensitive data."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-410",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-410 Information Elicitation"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-200",
              "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor",
              "lang": "en",
              "type": "CWE"
            }
          ]
        },
        {
          "descriptions": [
            {
              "cweId": "CWE-552",
              "description": "CWE-552 Files or Directories Accessible to External Parties",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-07-13T08:25:27.911Z",
        "orgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8",
        "shortName": "Zabbix"
      },
      "references": [
        {
          "url": "https://support.zabbix.com/browse/ZBX-22588"
        },
        {
          "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00027.html"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Unauthorized limited filesystem access from preprocessing",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8",
    "assignerShortName": "Zabbix",
    "cveId": "CVE-2023-29450",
    "datePublished": "2023-07-13T08:25:27.911Z",
    "dateReserved": "2023-04-06T18:04:44.891Z",
    "dateUpdated": "2024-11-06T14:21:04.075Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2013-5572
Vulnerability from cvelistv5
Published
2013-10-01 01:00
Modified
2024-08-06 17:15
Severity ?
Summary
Zabbix 2.0.5 allows remote authenticated users to discover the LDAP bind password by leveraging management-console access and reading the ldap_bind_password value in the HTML source code.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T17:15:21.374Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20130925 CVE-2013-5572",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://archives.neohapsis.com/archives/fulldisclosure/2013-09/0149.html"
          },
          {
            "name": "FEDORA-2014-5540",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-May/132377.html"
          },
          {
            "name": "FEDORA-2014-5551",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-May/132376.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2013-09-25T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Zabbix 2.0.5 allows remote authenticated users to discover the LDAP bind password by leveraging management-console access and reading the ldap_bind_password value in the HTML source code."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2014-05-08T12:57:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "20130925 CVE-2013-5572",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://archives.neohapsis.com/archives/fulldisclosure/2013-09/0149.html"
        },
        {
          "name": "FEDORA-2014-5540",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-May/132377.html"
        },
        {
          "name": "FEDORA-2014-5551",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-May/132376.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2013-5572",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Zabbix 2.0.5 allows remote authenticated users to discover the LDAP bind password by leveraging management-console access and reading the ldap_bind_password value in the HTML source code."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20130925 CVE-2013-5572",
              "refsource": "FULLDISC",
              "url": "http://archives.neohapsis.com/archives/fulldisclosure/2013-09/0149.html"
            },
            {
              "name": "FEDORA-2014-5540",
              "refsource": "FEDORA",
              "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-May/132377.html"
            },
            {
              "name": "FEDORA-2014-5551",
              "refsource": "FEDORA",
              "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-May/132376.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2013-5572",
    "datePublished": "2013-10-01T01:00:00",
    "dateReserved": "2013-08-23T00:00:00",
    "dateUpdated": "2024-08-06T17:15:21.374Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2014-1685
Vulnerability from cvelistv5
Published
2014-05-08 14:00
Modified
2024-08-06 09:50
Severity ?
Summary
The Frontend in Zabbix before 1.8.20rc2, 2.0.x before 2.0.11rc2, and 2.2.x before 2.2.2rc1 allows remote "Zabbix Admin" users to modify the media of arbitrary users via unspecified vectors.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T09:50:10.755Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "FEDORA-2014-5540",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-May/132377.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://support.zabbix.com/browse/ZBX-7693"
          },
          {
            "name": "FEDORA-2014-5551",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-May/132376.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-01-23T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The Frontend in Zabbix before 1.8.20rc2, 2.0.x before 2.0.11rc2, and 2.2.x before 2.2.2rc1 allows remote \"Zabbix Admin\" users to modify the media of arbitrary users via unspecified vectors."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2014-05-08T12:57:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "FEDORA-2014-5540",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-May/132377.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://support.zabbix.com/browse/ZBX-7693"
        },
        {
          "name": "FEDORA-2014-5551",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-May/132376.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2014-1685",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The Frontend in Zabbix before 1.8.20rc2, 2.0.x before 2.0.11rc2, and 2.2.x before 2.2.2rc1 allows remote \"Zabbix Admin\" users to modify the media of arbitrary users via unspecified vectors."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "FEDORA-2014-5540",
              "refsource": "FEDORA",
              "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-May/132377.html"
            },
            {
              "name": "https://support.zabbix.com/browse/ZBX-7693",
              "refsource": "CONFIRM",
              "url": "https://support.zabbix.com/browse/ZBX-7693"
            },
            {
              "name": "FEDORA-2014-5551",
              "refsource": "FEDORA",
              "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-May/132376.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2014-1685",
    "datePublished": "2014-05-08T14:00:00",
    "dateReserved": "2014-01-28T00:00:00",
    "dateUpdated": "2024-08-06T09:50:10.755Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2023-29453
Vulnerability from cvelistv5
Published
2023-10-12 05:50
Modified
2024-09-18 15:21
Severity ?
Summary
Templates do not properly consider backticks (`) as Javascript string delimiters, and do not escape them as expected. Backticks are used, since ES6, for JS template literals. If a template contains a Go template action within a Javascript template literal, the contents of the action can be used to terminate the literal, injecting arbitrary Javascript code into the Go template. As ES6 template literals are rather complex, and themselves can do string interpolation, the decision was made to simply disallow Go template actions from being used inside of them (e.g., "var a = {{.}}"), since there is no obviously safe way to allow this behavior. This takes the same approach as github.com/google/safehtml. With fix, Template. Parse returns an Error when it encounters templates like this, with an ErrorCode of value 12. This ErrorCode is currently unexported but will be exported in the release of Go 1.21. Users who rely on the previous behavior can re-enable it using the GODEBUG flag jstmpllitinterp=1, with the caveat that backticks will now be escaped. This should be used with caution.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T14:07:46.142Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://support.zabbix.com/browse/ZBX-23388"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:zabbix:zabbix-agent2:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "zabbix-agent2",
            "vendor": "zabbix",
            "versions": [
              {
                "lessThanOrEqual": "5.0.34",
                "status": "affected",
                "version": "5.0.0",
                "versionType": "custom"
              },
              {
                "lessThanOrEqual": "6.0.17",
                "status": "affected",
                "version": "6.0.0",
                "versionType": "custom"
              },
              {
                "lessThanOrEqual": "6.4.2",
                "status": "affected",
                "version": "6.4.0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-29453",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-09-18T15:17:42.886782Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-09-18T15:21:57.439Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "modules": [
            "Agent2"
          ],
          "product": "Zabbix",
          "repo": "https://git.zabbix.com/",
          "vendor": "Zabbix",
          "versions": [
            {
              "changes": [
                {
                  "at": "5.0.35",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.0.34",
              "status": "affected",
              "version": "5.0.0",
              "versionType": "git"
            },
            {
              "changes": [
                {
                  "at": "6.0.18",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.0.17",
              "status": "affected",
              "version": "6.0.0",
              "versionType": "git"
            },
            {
              "changes": [
                {
                  "at": "6.4.3",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.4.2",
              "status": "affected",
              "version": "6.4.0",
              "versionType": "git"
            }
          ]
        }
      ],
      "datePublic": "2023-09-11T09:43:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Templates do not properly consider backticks (`) as Javascript string delimiters, and do not escape them as expected. Backticks are used, since ES6, for JS template literals. If a template contains a Go template action within a Javascript template literal, the contents of the action can be used to terminate the literal, injecting arbitrary Javascript code into the Go template. As ES6 template literals are rather complex, and themselves can do string interpolation, the decision was made to simply disallow Go template actions from being used inside of them (e.g., \"var a = {{.}}\"), since there is no obviously safe way to allow this behavior. This takes the same approach as github.com/google/safehtml. With fix, Template. Parse returns an Error when it encounters templates like this, with an ErrorCode of value 12. This ErrorCode is currently unexported but will be exported in the release of Go 1.21. Users who rely on the previous behavior can re-enable it using the GODEBUG flag jstmpllitinterp=1, with the caveat that backticks will now be escaped. This should be used with caution."
            }
          ],
          "value": "Templates do not properly consider backticks (`) as Javascript string delimiters, and do not escape them as expected. Backticks are used, since ES6, for JS template literals. If a template contains a Go template action within a Javascript template literal, the contents of the action can be used to terminate the literal, injecting arbitrary Javascript code into the Go template. As ES6 template literals are rather complex, and themselves can do string interpolation, the decision was made to simply disallow Go template actions from being used inside of them (e.g., \"var a = {{.}}\"), since there is no obviously safe way to allow this behavior. This takes the same approach as github.com/google/safehtml. With fix, Template. Parse returns an Error when it encounters templates like this, with an ErrorCode of value 12. This ErrorCode is currently unexported but will be exported in the release of Go 1.21. Users who rely on the previous behavior can re-enable it using the GODEBUG flag jstmpllitinterp=1, with the caveat that backticks will now be escaped. This should be used with caution."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-175",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-175 Code Inclusion"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-94",
              "description": "CWE-94 Improper Control of Generation of Code (\u0027Code Injection\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-10-12T05:50:19.866Z",
        "orgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8",
        "shortName": "Zabbix"
      },
      "references": [
        {
          "url": "https://support.zabbix.com/browse/ZBX-23388"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Agent 2 package are built with Go version affected by CVE-2023-24538",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8",
    "assignerShortName": "Zabbix",
    "cveId": "CVE-2023-29453",
    "datePublished": "2023-10-12T05:50:19.866Z",
    "dateReserved": "2023-04-06T18:04:44.892Z",
    "dateUpdated": "2024-09-18T15:21:57.439Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2010-1277
Vulnerability from cvelistv5
Published
2010-04-06 16:00
Modified
2024-08-07 01:21
Severity ?
Summary
SQL injection vulnerability in the user.authenticate method in the API in Zabbix 1.8 before 1.8.2 allows remote attackers to execute arbitrary SQL commands via the user parameter in JSON data to api_jsonrpc.php.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T01:21:17.601Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "ADV-2010-0799",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2010/0799"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://legalhackers.com/advisories/zabbix181api-sql.txt"
          },
          {
            "name": "63456",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/63456"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.zabbix.com/rn1.8.2.php"
          },
          {
            "name": "20100401 Zabbix \u003c= 1.8.1 SQL Injection",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/510480/100/0/threaded"
          },
          {
            "name": "39148",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/39148"
          },
          {
            "name": "20100401 Zabbix \u003c= 1.8.1 SQL Injection",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-04/0001.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://legalhackers.com/poc/zabbix181api.pl-poc"
          },
          {
            "name": "39119",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/39119"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2010-04-01T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "SQL injection vulnerability in the user.authenticate method in the API in Zabbix 1.8 before 1.8.2 allows remote attackers to execute arbitrary SQL commands via the user parameter in JSON data to api_jsonrpc.php."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-10T18:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "ADV-2010-0799",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2010/0799"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://legalhackers.com/advisories/zabbix181api-sql.txt"
        },
        {
          "name": "63456",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/63456"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.zabbix.com/rn1.8.2.php"
        },
        {
          "name": "20100401 Zabbix \u003c= 1.8.1 SQL Injection",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/510480/100/0/threaded"
        },
        {
          "name": "39148",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/39148"
        },
        {
          "name": "20100401 Zabbix \u003c= 1.8.1 SQL Injection",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-04/0001.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://legalhackers.com/poc/zabbix181api.pl-poc"
        },
        {
          "name": "39119",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/39119"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2010-1277",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "SQL injection vulnerability in the user.authenticate method in the API in Zabbix 1.8 before 1.8.2 allows remote attackers to execute arbitrary SQL commands via the user parameter in JSON data to api_jsonrpc.php."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "ADV-2010-0799",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2010/0799"
            },
            {
              "name": "http://legalhackers.com/advisories/zabbix181api-sql.txt",
              "refsource": "MISC",
              "url": "http://legalhackers.com/advisories/zabbix181api-sql.txt"
            },
            {
              "name": "63456",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/63456"
            },
            {
              "name": "http://www.zabbix.com/rn1.8.2.php",
              "refsource": "MISC",
              "url": "http://www.zabbix.com/rn1.8.2.php"
            },
            {
              "name": "20100401 Zabbix \u003c= 1.8.1 SQL Injection",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/510480/100/0/threaded"
            },
            {
              "name": "39148",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/39148"
            },
            {
              "name": "20100401 Zabbix \u003c= 1.8.1 SQL Injection",
              "refsource": "FULLDISC",
              "url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-04/0001.html"
            },
            {
              "name": "http://legalhackers.com/poc/zabbix181api.pl-poc",
              "refsource": "MISC",
              "url": "http://legalhackers.com/poc/zabbix181api.pl-poc"
            },
            {
              "name": "39119",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/39119"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2010-1277",
    "datePublished": "2010-04-06T16:00:00",
    "dateReserved": "2010-04-06T00:00:00",
    "dateUpdated": "2024-08-07T01:21:17.601Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2024-36461
Vulnerability from cvelistv5
Published
2024-08-09 09:33
Modified
2024-08-09 15:22
Severity ?
Summary
Within Zabbix, users have the ability to directly modify memory pointers in the JavaScript engine.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-36461",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-08-09T15:21:52.170288Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-09T15:22:00.513Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "modules": [
            "Server"
          ],
          "product": "Zabbix",
          "repo": "https://git.zabbix.com/",
          "vendor": "Zabbix",
          "versions": [
            {
              "changes": [
                {
                  "at": "6.0.31rc1",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.0.30",
              "status": "affected",
              "version": "6.0.0",
              "versionType": "git"
            },
            {
              "changes": [
                {
                  "at": "6.4.16rc1",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.4.15",
              "status": "affected",
              "version": "6.4.0",
              "versionType": "git"
            },
            {
              "changes": [
                {
                  "at": "7.0.1rc1",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "7.0.0",
              "status": "affected",
              "version": "7.0.0alpha1",
              "versionType": "git"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "value": "Zabbix extends its gratitude to Pavel Voit (pavelvoit) for submitting this report on the HackerOne bug bounty platform"
        }
      ],
      "datePublic": "2024-06-13T08:50:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Within Zabbix, users have the ability to directly modify memory pointers in the JavaScript engine."
            }
          ],
          "value": "Within Zabbix, users have the ability to directly modify memory pointers in the JavaScript engine."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-253",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-253 Remote Code Inclusion"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.1,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-822",
              "description": "CWE-822 Untrusted Pointer Dereference",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-08-09T13:48:04.941Z",
        "orgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8",
        "shortName": "Zabbix"
      },
      "references": [
        {
          "url": "https://support.zabbix.com/browse/ZBX-25018"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "Direct access to memory pointers within the JS engine for modification",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8",
    "assignerShortName": "Zabbix",
    "cveId": "CVE-2024-36461",
    "datePublished": "2024-08-09T09:33:39.885Z",
    "dateReserved": "2024-05-28T11:21:24.946Z",
    "dateUpdated": "2024-08-09T15:22:00.513Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2024-22119
Vulnerability from cvelistv5
Published
2024-02-09 08:26
Modified
2024-08-01 22:35
Summary
The cause of vulnerability is improper validation of form input field “Name” on Graph page in Items section.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T22:35:34.822Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://support.zabbix.com/browse/ZBX-24070"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00020.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "modules": [
            "Frontend"
          ],
          "product": "Zabbix",
          "repo": "https://git.zabbix.com/",
          "vendor": "Zabbix",
          "versions": [
            {
              "changes": [
                {
                  "at": "5.0.40rc1",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.0.39 ",
              "status": "affected",
              "version": "5.0.0",
              "versionType": "git"
            },
            {
              "changes": [
                {
                  "at": "6.0.24rc1",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.0.23",
              "status": "affected",
              "version": "6.0.0 ",
              "versionType": "git"
            },
            {
              "changes": [
                {
                  "at": "6.4.9rc1",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.4.8",
              "status": "affected",
              "version": "6.4.0",
              "versionType": "git"
            },
            {
              "changes": [
                {
                  "at": "7.0.0alpha8",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "7.0.0alpha7",
              "status": "affected",
              "version": "7.0.0alpha1",
              "versionType": "git"
            }
          ]
        }
      ],
      "datePublic": "2024-01-05T08:23:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "The cause of vulnerability is improper validation of form input field \u201cName\u201d on Graph page in Items section."
            }
          ],
          "value": "The cause of vulnerability is improper validation of form input field \u201cName\u201d on Graph page in Items section."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-592",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-592 Stored XSS"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-20",
              "description": "CWE-20 Improper Input Validation",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-02-09T08:26:20.006Z",
        "orgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8",
        "shortName": "Zabbix"
      },
      "references": [
        {
          "url": "https://support.zabbix.com/browse/ZBX-24070"
        },
        {
          "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00020.html"
        }
      ],
      "source": {
        "discovery": "INTERNAL"
      },
      "title": "Stored XSS in graph items select form",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8",
    "assignerShortName": "Zabbix",
    "cveId": "CVE-2024-22119",
    "datePublished": "2024-02-09T08:26:20.006Z",
    "dateReserved": "2024-01-05T07:44:01.395Z",
    "dateUpdated": "2024-08-01T22:35:34.822Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2023-32721
Vulnerability from cvelistv5
Published
2023-10-12 06:04
Modified
2024-08-02 15:25
Summary
A stored XSS has been found in the Zabbix web application in the Maps element if a URL field is set with spaces before URL.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T15:25:36.887Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://support.zabbix.com/browse/ZBX-23389"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00012.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "modules": [
            "API",
            "Frontend"
          ],
          "product": "Zabbix",
          "repo": "https://git.zabbix.com/",
          "vendor": "Zabbix",
          "versions": [
            {
              "changes": [
                {
                  "at": "4.0.48rc1",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "4.0.47",
              "status": "affected",
              "version": "4.0.0",
              "versionType": "git"
            },
            {
              "changes": [
                {
                  "at": "5.0.37rc1",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.0.36",
              "status": "affected",
              "version": "5.0.0",
              "versionType": "git"
            },
            {
              "changes": [
                {
                  "at": "6.0.21rc1",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.0.20",
              "status": "affected",
              "version": "6.0.0",
              "versionType": "git"
            },
            {
              "changes": [
                {
                  "at": "6.4.6rc1",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.4.5",
              "status": "affected",
              "version": "6.4.0",
              "versionType": "git"
            },
            {
              "changes": [
                {
                  "at": "7.0.0alpha4",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "7.0.0alpha3",
              "status": "affected",
              "version": "7.0.0alpha1",
              "versionType": "git"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "This vulnerability is found by  Prasetia from HackerOne community."
        }
      ],
      "datePublic": "2023-09-11T09:50:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "A stored XSS has been found in the Zabbix web application in the Maps element if a URL field is set with spaces before URL."
            }
          ],
          "value": "A stored XSS has been found in the Zabbix web application in the Maps element if a URL field is set with spaces before URL."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-592",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-592 Stored XSS"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 7.6,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "LOW",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:H/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-20",
              "description": "CWE-20 Improper Input Validation",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-10-12T06:04:10.100Z",
        "orgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8",
        "shortName": "Zabbix"
      },
      "references": [
        {
          "url": "https://support.zabbix.com/browse/ZBX-23389"
        },
        {
          "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00012.html"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "Stored XSS in Maps element",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8",
    "assignerShortName": "Zabbix",
    "cveId": "CVE-2023-32721",
    "datePublished": "2023-10-12T06:04:10.100Z",
    "dateReserved": "2023-05-11T21:25:43.367Z",
    "dateUpdated": "2024-08-02T15:25:36.887Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2017-2825
Vulnerability from cvelistv5
Published
2018-04-20 21:00
Modified
2024-09-16 23:05
Severity ?
Summary
In the trapper functionality of Zabbix Server 2.4.x, specifically crafted trapper packets can pass database logic checks, resulting in database writes. An attacker can set up a Man-in-the-Middle server to alter trapper requests made between an active Zabbix proxy and Server to trigger this vulnerability.
References
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T14:09:16.754Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2017-0326"
          },
          {
            "name": "98094",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/98094"
          },
          {
            "name": "DSA-3937",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "https://www.debian.org/security/2017/dsa-3937"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Zabbix",
          "vendor": "Talos",
          "versions": [
            {
              "status": "affected",
              "version": "Zabbix Server 2.4.8.r1"
            }
          ]
        }
      ],
      "datePublic": "2018-04-20T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "In the trapper functionality of Zabbix Server 2.4.x, specifically crafted trapper packets can pass database logic checks, resulting in database writes. An attacker can set up a Man-in-the-Middle server to alter trapper requests made between an active Zabbix proxy and Server to trigger this vulnerability."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "remote code execution",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-04-21T09:57:01",
        "orgId": "b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b",
        "shortName": "talos"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2017-0326"
        },
        {
          "name": "98094",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/98094"
        },
        {
          "name": "DSA-3937",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "https://www.debian.org/security/2017/dsa-3937"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "talos-cna@cisco.com",
          "DATE_PUBLIC": "2018-04-20T00:00:00",
          "ID": "CVE-2017-2825",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Zabbix",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Zabbix Server 2.4.8.r1"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Talos"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In the trapper functionality of Zabbix Server 2.4.x, specifically crafted trapper packets can pass database logic checks, resulting in database writes. An attacker can set up a Man-in-the-Middle server to alter trapper requests made between an active Zabbix proxy and Server to trigger this vulnerability."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "remote code execution"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://talosintelligence.com/vulnerability_reports/TALOS-2017-0326",
              "refsource": "MISC",
              "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2017-0326"
            },
            {
              "name": "98094",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/98094"
            },
            {
              "name": "DSA-3937",
              "refsource": "DEBIAN",
              "url": "https://www.debian.org/security/2017/dsa-3937"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b",
    "assignerShortName": "talos",
    "cveId": "CVE-2017-2825",
    "datePublished": "2018-04-20T21:00:00Z",
    "dateReserved": "2016-12-01T00:00:00",
    "dateUpdated": "2024-09-16T23:05:42.353Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2022-23134
Vulnerability from cvelistv5
Published
2022-01-13 15:50
Modified
2024-09-16 22:41
Summary
After the initial setup process, some steps of setup.php file are reachable not only by super-administrators, but by unauthenticated users as well. Malicious actor can pass step checks and potentially change the configuration of Zabbix Frontend.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T03:36:20.017Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://support.zabbix.com/browse/ZBX-20384"
          },
          {
            "name": "FEDORA-2022-dfe346f53f",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6SZYHXINBKCY42ITFSNCYE7KCSF33VRA/"
          },
          {
            "name": "FEDORA-2022-1a667b0f90",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VB6W556GVXOKUYTASTDGL3AI7S3SJHX7/"
          },
          {
            "name": "[debian-lts-announce] 20220207 [SECURITY] [DLA 2914-1] zabbix security update",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2022/02/msg00008.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Frontend",
          "vendor": "Zabbix",
          "versions": [
            {
              "status": "affected",
              "version": "5.4.0 - 5.4.8"
            },
            {
              "lessThan": "5.4.9*",
              "status": "unaffected",
              "version": "5.4.9",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "Zabbix wants to thank Thomas Chauchefoin from SonarSource for reporting this issue to us"
        }
      ],
      "datePublic": "2021-12-20T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "After the initial setup process, some steps of setup.php file are reachable not only by super-administrators, but by unauthenticated users as well. Malicious actor can pass step checks and potentially change the configuration of Zabbix Frontend."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 3.7,
            "baseSeverity": "LOW",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-284",
              "description": "CWE-284 Improper Access Control",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-02-07T23:06:09",
        "orgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8",
        "shortName": "Zabbix"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://support.zabbix.com/browse/ZBX-20384"
        },
        {
          "name": "FEDORA-2022-dfe346f53f",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6SZYHXINBKCY42ITFSNCYE7KCSF33VRA/"
        },
        {
          "name": "FEDORA-2022-1a667b0f90",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VB6W556GVXOKUYTASTDGL3AI7S3SJHX7/"
        },
        {
          "name": "[debian-lts-announce] 20220207 [SECURITY] [DLA 2914-1] zabbix security update",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2022/02/msg00008.html"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "value": "To remediate this vulnerability, apply the updates or if an immediate update is not possible, follow the presented workarounds."
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Possible view of the setup pages by unauthenticated users if config file already exists",
      "workarounds": [
        {
          "lang": "en",
          "value": "If an immediate update is not possible, please remove the setup.php file"
        }
      ],
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@zabbix.com",
          "DATE_PUBLIC": "2021-12-20T09:53:00.000Z",
          "ID": "CVE-2022-23134",
          "STATE": "PUBLIC",
          "TITLE": "Possible view of the setup pages by unauthenticated users if config file already exists"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Frontend",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_name": "5.4.0 - 5.4.8",
                            "version_value": "5.4.0 - 5.4.8"
                          },
                          {
                            "version_affected": "!\u003e=",
                            "version_name": "5.4.9",
                            "version_value": "5.4.9"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Zabbix"
              }
            ]
          }
        },
        "credit": [
          {
            "lang": "eng",
            "value": "Zabbix wants to thank Thomas Chauchefoin from SonarSource for reporting this issue to us"
          }
        ],
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "After the initial setup process, some steps of setup.php file are reachable not only by super-administrators, but by unauthenticated users as well. Malicious actor can pass step checks and potentially change the configuration of Zabbix Frontend."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "impact": {
          "cvss": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 3.7,
            "baseSeverity": "LOW",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
            "version": "3.1"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-284 Improper Access Control"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://support.zabbix.com/browse/ZBX-20384",
              "refsource": "MISC",
              "url": "https://support.zabbix.com/browse/ZBX-20384"
            },
            {
              "name": "FEDORA-2022-dfe346f53f",
              "refsource": "FEDORA",
              "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6SZYHXINBKCY42ITFSNCYE7KCSF33VRA/"
            },
            {
              "name": "FEDORA-2022-1a667b0f90",
              "refsource": "FEDORA",
              "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VB6W556GVXOKUYTASTDGL3AI7S3SJHX7/"
            },
            {
              "name": "[debian-lts-announce] 20220207 [SECURITY] [DLA 2914-1] zabbix security update",
              "refsource": "MLIST",
              "url": "https://lists.debian.org/debian-lts-announce/2022/02/msg00008.html"
            }
          ]
        },
        "solution": [
          {
            "lang": "en",
            "value": "To remediate this vulnerability, apply the updates or if an immediate update is not possible, follow the presented workarounds."
          }
        ],
        "source": {
          "discovery": "UNKNOWN"
        },
        "work_around": [
          {
            "lang": "en",
            "value": "If an immediate update is not possible, please remove the setup.php file"
          }
        ]
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8",
    "assignerShortName": "Zabbix",
    "cveId": "CVE-2022-23134",
    "datePublished": "2022-01-13T15:50:42.946084Z",
    "dateReserved": "2022-01-11T00:00:00",
    "dateUpdated": "2024-09-16T22:41:21.683Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2024-22114
Vulnerability from cvelistv5
Published
2024-08-09 10:15
Modified
2024-08-09 13:31
Summary
User with no permission to any of the Hosts can access and view host count & other statistics through System Information Widget in Global View Dashboard.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-22114",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-08-09T12:39:48.925754Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-09T12:39:57.026Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "modules": [
            "Server",
            "Frontend"
          ],
          "product": "Zabbix",
          "repo": "https://git.zabbix.com/",
          "vendor": "Zabbix",
          "versions": [
            {
              "changes": [
                {
                  "at": "5.0.43rc1",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.0.42",
              "status": "affected",
              "version": "5,0,0",
              "versionType": "git"
            },
            {
              "changes": [
                {
                  "at": "6.0.31rc1",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.0.30",
              "status": "affected",
              "version": "6.0",
              "versionType": "git"
            },
            {
              "changes": [
                {
                  "at": "6.4.16rc1",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.4.15",
              "status": "affected",
              "version": "6.4.0",
              "versionType": "git"
            },
            {
              "changes": [
                {
                  "at": "7.0.0rc3",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "7.0.0rc2",
              "status": "affected",
              "version": "7.0.0alpha1",
              "versionType": "git"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "value": "Zabbix wants to thank Jayateertha G (jayateerthag) who submitted this report in HackerOne bug bounty platform"
        }
      ],
      "datePublic": "2024-06-12T11:53:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "User with no permission to any of the Hosts can access and view host count \u0026amp; other statistics through System Information Widget in Global View Dashboard.\u003cbr\u003e"
            }
          ],
          "value": "User with no permission to any of the Hosts can access and view host count \u0026 other statistics through System Information Widget in Global View Dashboard."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-410",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-410 Information Elicitation"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-281",
              "description": "CWE-281 Improper Preservation of Permissions",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-08-09T13:31:39.639Z",
        "orgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8",
        "shortName": "Zabbix"
      },
      "references": [
        {
          "url": "https://support.zabbix.com/browse/ZBX-25015"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "System Information Widget in Global View Dashboard exposes information about Hosts to Users without Permission",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8",
    "assignerShortName": "Zabbix",
    "cveId": "CVE-2024-22114",
    "datePublished": "2024-08-09T10:15:26.509Z",
    "dateReserved": "2024-01-05T07:44:01.394Z",
    "dateUpdated": "2024-08-09T13:31:39.639Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2023-29457
Vulnerability from cvelistv5
Published
2023-07-13 09:35
Modified
2024-10-21 21:09
Summary
Reflected XSS attacks, occur when a malicious script is reflected off a web application to the victim's browser. The script can be activated through Action form fields, which can be sent as request to a website with a vulnerability that enables execution of malicious scripts.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T14:07:46.432Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://support.zabbix.com/browse/ZBX-22988"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00027.html"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-29457",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-21T21:06:43.942933Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-21T21:09:50.729Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "affected",
          "modules": [
            "Frontend"
          ],
          "product": "Zabbix",
          "repo": "https://git.zabbix.com/",
          "vendor": "Zabbix",
          "versions": [
            {
              "changes": [
                {
                  "at": "4.0.46rc1",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "4.0.45",
              "status": "affected",
              "version": "4.0.0",
              "versionType": "git"
            },
            {
              "changes": [
                {
                  "at": "5.0.35rc1",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.0.34",
              "status": "affected",
              "version": "5.0.0",
              "versionType": "git"
            },
            {
              "changes": [
                {
                  "at": "6.0.18rc1",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.0.17",
              "status": "affected",
              "version": "6.0.0",
              "versionType": "git"
            }
          ]
        }
      ],
      "datePublic": "2023-06-16T11:11:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Reflected XSS attacks, occur when a malicious script is reflected off a web application to the victim\u0027s browser. The script can be activated through Action form fields, which can be sent as request to a website with a vulnerability that enables execution of malicious scripts."
            }
          ],
          "value": "Reflected XSS attacks, occur when a malicious script is reflected off a web application to the victim\u0027s browser. The script can be activated through Action form fields, which can be sent as request to a website with a vulnerability that enables execution of malicious scripts."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-591",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-591 Reflected XSS"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 6.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-20",
              "description": "CWE-20 Improper Input Validation",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-07-13T09:35:24.594Z",
        "orgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8",
        "shortName": "Zabbix"
      },
      "references": [
        {
          "url": "https://support.zabbix.com/browse/ZBX-22988"
        },
        {
          "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00027.html"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Insufficient validation of Action form input fields",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8",
    "assignerShortName": "Zabbix",
    "cveId": "CVE-2023-29457",
    "datePublished": "2023-07-13T09:35:24.594Z",
    "dateReserved": "2023-04-06T18:04:44.892Z",
    "dateUpdated": "2024-10-21T21:09:50.729Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2017-2824
Vulnerability from cvelistv5
Published
2017-05-24 14:00
Modified
2024-08-05 14:09
Severity ?
Summary
An exploitable code execution vulnerability exists in the trapper command functionality of Zabbix Server 2.4.X. A specially crafted set of packets can cause a command injection resulting in remote code execution. An attacker can make requests from an active Zabbix Proxy to trigger this vulnerability.
References
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T14:09:16.849Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2017-0325"
          },
          {
            "name": "98083",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/98083"
          },
          {
            "name": "DSA-3937",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2017/dsa-3937"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Zabbix Server",
          "vendor": "Zabbix",
          "versions": [
            {
              "status": "affected",
              "version": "2.4.8.r1"
            }
          ]
        }
      ],
      "datePublic": "2017-04-27T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "An exploitable code execution vulnerability exists in the trapper command functionality of Zabbix Server 2.4.X. A specially crafted set of packets can cause a command injection resulting in remote code execution. An attacker can make requests from an active Zabbix Proxy to trigger this vulnerability."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "remote code execution",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-11-05T10:57:01",
        "orgId": "b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b",
        "shortName": "talos"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2017-0325"
        },
        {
          "name": "98083",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/98083"
        },
        {
          "name": "DSA-3937",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2017/dsa-3937"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "talos-cna@cisco.com",
          "ID": "CVE-2017-2824",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Zabbix Server",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "2.4.8.r1"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Zabbix"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "An exploitable code execution vulnerability exists in the trapper command functionality of Zabbix Server 2.4.X. A specially crafted set of packets can cause a command injection resulting in remote code execution. An attacker can make requests from an active Zabbix Proxy to trigger this vulnerability."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "remote code execution"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://talosintelligence.com/vulnerability_reports/TALOS-2017-0325",
              "refsource": "MISC",
              "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2017-0325"
            },
            {
              "name": "98083",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/98083"
            },
            {
              "name": "DSA-3937",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2017/dsa-3937"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b",
    "assignerShortName": "talos",
    "cveId": "CVE-2017-2824",
    "datePublished": "2017-05-24T14:00:00",
    "dateReserved": "2016-12-01T00:00:00",
    "dateUpdated": "2024-08-05T14:09:16.849Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2007-0640
Vulnerability from cvelistv5
Published
2007-01-31 21:00
Modified
2024-08-07 12:26
Severity ?
Summary
Buffer overflow in ZABBIX before 1.1.5 has unknown impact and attack vectors related to "SNMP IP addresses."
References
http://www.zabbix.com/rn1.1.5.phpx_refsource_CONFIRM
http://www.vupen.com/english/advisories/2007/0416vdb-entry, x_refsource_VUPEN
http://www.securityfocus.com/bid/22321vdb-entry, x_refsource_BID
https://exchange.xforce.ibmcloud.com/vulnerabilities/32038vdb-entry, x_refsource_XF
http://osvdb.org/33081vdb-entry, x_refsource_OSVDB
http://secunia.com/advisories/24020third-party-advisory, x_refsource_SECUNIA
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T12:26:53.935Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.zabbix.com/rn1.1.5.php"
          },
          {
            "name": "ADV-2007-0416",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2007/0416"
          },
          {
            "name": "22321",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/22321"
          },
          {
            "name": "zabbix-snmp-bo(32038)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32038"
          },
          {
            "name": "33081",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/33081"
          },
          {
            "name": "24020",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/24020"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-01-30T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflow in ZABBIX before 1.1.5 has unknown impact and attack vectors related to \"SNMP IP addresses.\""
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-28T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.zabbix.com/rn1.1.5.php"
        },
        {
          "name": "ADV-2007-0416",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2007/0416"
        },
        {
          "name": "22321",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/22321"
        },
        {
          "name": "zabbix-snmp-bo(32038)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32038"
        },
        {
          "name": "33081",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/33081"
        },
        {
          "name": "24020",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/24020"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-0640",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Buffer overflow in ZABBIX before 1.1.5 has unknown impact and attack vectors related to \"SNMP IP addresses.\""
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.zabbix.com/rn1.1.5.php",
              "refsource": "CONFIRM",
              "url": "http://www.zabbix.com/rn1.1.5.php"
            },
            {
              "name": "ADV-2007-0416",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2007/0416"
            },
            {
              "name": "22321",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/22321"
            },
            {
              "name": "zabbix-snmp-bo(32038)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32038"
            },
            {
              "name": "33081",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/33081"
            },
            {
              "name": "24020",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/24020"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-0640",
    "datePublished": "2007-01-31T21:00:00",
    "dateReserved": "2007-01-31T00:00:00",
    "dateUpdated": "2024-08-07T12:26:53.935Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2024-36466
Vulnerability from cvelistv5
Published
2024-11-28 07:19
Modified
2024-12-04 14:38
Summary
A bug in the code allows an attacker to sign a forged zbx_session cookie, which then allows them to sign in with admin permissions.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "zabbix",
            "vendor": "zabbix",
            "versions": [
              {
                "lessThanOrEqual": "6.0.31",
                "status": "affected",
                "version": "6.0.0",
                "versionType": "git"
              },
              {
                "lessThanOrEqual": "6.4.16",
                "status": "affected",
                "version": "6.4.0",
                "versionType": "git"
              },
              {
                "lessThan": "7.0.1rc1",
                "status": "affected",
                "version": "7.0.0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-36466",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-12-04T04:55:27.332810Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-12-04T14:38:41.930Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "modules": [
            "Frontend"
          ],
          "product": "Zabbix",
          "repo": "https://git.zabbix.com/",
          "vendor": "Zabbix",
          "versions": [
            {
              "changes": [
                {
                  "at": "6.0.32rc1",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.0.31",
              "status": "affected",
              "version": "6.0.0",
              "versionType": "git"
            },
            {
              "changes": [
                {
                  "at": "6.4.17rc1",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.4.16",
              "status": "affected",
              "version": "6.4.0",
              "versionType": "git"
            },
            {
              "status": "affected",
              "version": "7.0.0",
              "versionType": "git"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Zabbix wants to thank M\u00e1rk R\u00e1k\u00f3czi (reeeeeeeeeeee) for submitting this report on the HackerOne bug bounty platform."
        }
      ],
      "datePublic": "2024-07-02T13:25:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "A bug in the code allows an attacker to sign a forged zbx_session cookie, which then allows them to sign in with admin permissions.\u003cbr\u003e"
            }
          ],
          "value": "A bug in the code allows an attacker to sign a forged zbx_session cookie, which then allows them to sign in with admin permissions."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-196",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-196 Session Credential Falsification through Forging"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-290",
              "description": "CWE-290 Authentication Bypass by Spoofing",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-11-28T07:19:48.806Z",
        "orgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8",
        "shortName": "Zabbix"
      },
      "references": [
        {
          "url": "https://support.zabbix.com/browse/ZBX-25635"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "Unauthenticated Zabbix frontend takeover when SSO is being used",
      "workarounds": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Disabling SSO authentication method"
            }
          ],
          "value": "Disabling SSO authentication method"
        }
      ],
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8",
    "assignerShortName": "Zabbix",
    "cveId": "CVE-2024-36466",
    "datePublished": "2024-11-28T07:19:48.806Z",
    "dateReserved": "2024-05-28T11:21:24.947Z",
    "dateUpdated": "2024-12-04T14:38:41.930Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2013-1364
Vulnerability from cvelistv5
Published
2013-12-14 17:00
Modified
2024-08-06 14:57
Severity ?
Summary
The user.login function in Zabbix before 1.8.16 and 2.x before 2.0.5rc1 allows remote attackers to override LDAP configuration via the cnf parameter.
References
https://support.zabbix.com/browse/ZBX-6097x_refsource_CONFIRM
http://www.securityfocus.com/bid/57471vdb-entry, x_refsource_BID
http://www.zabbix.com/rn1.8.16.phpx_refsource_CONFIRM
http://security.gentoo.org/glsa/glsa-201311-15.xmlvendor-advisory, x_refsource_GENTOO
http://www.zabbix.com/rn2.0.5rc1.phpx_refsource_CONFIRM
http://secunia.com/advisories/55824third-party-advisory, x_refsource_SECUNIA
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T14:57:05.111Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://support.zabbix.com/browse/ZBX-6097"
          },
          {
            "name": "57471",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/57471"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.zabbix.com/rn1.8.16.php"
          },
          {
            "name": "GLSA-201311-15",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-201311-15.xml"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.zabbix.com/rn2.0.5rc1.php"
          },
          {
            "name": "55824",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/55824"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-12-20T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The user.login function in Zabbix before 1.8.16 and 2.x before 2.0.5rc1 allows remote attackers to override LDAP configuration via the cnf parameter."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-12-14T16:57:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://support.zabbix.com/browse/ZBX-6097"
        },
        {
          "name": "57471",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/57471"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.zabbix.com/rn1.8.16.php"
        },
        {
          "name": "GLSA-201311-15",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-201311-15.xml"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.zabbix.com/rn2.0.5rc1.php"
        },
        {
          "name": "55824",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/55824"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2013-1364",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The user.login function in Zabbix before 1.8.16 and 2.x before 2.0.5rc1 allows remote attackers to override LDAP configuration via the cnf parameter."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://support.zabbix.com/browse/ZBX-6097",
              "refsource": "CONFIRM",
              "url": "https://support.zabbix.com/browse/ZBX-6097"
            },
            {
              "name": "57471",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/57471"
            },
            {
              "name": "http://www.zabbix.com/rn1.8.16.php",
              "refsource": "CONFIRM",
              "url": "http://www.zabbix.com/rn1.8.16.php"
            },
            {
              "name": "GLSA-201311-15",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-201311-15.xml"
            },
            {
              "name": "http://www.zabbix.com/rn2.0.5rc1.php",
              "refsource": "CONFIRM",
              "url": "http://www.zabbix.com/rn2.0.5rc1.php"
            },
            {
              "name": "55824",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/55824"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2013-1364",
    "datePublished": "2013-12-14T17:00:00",
    "dateReserved": "2013-01-14T00:00:00",
    "dateUpdated": "2024-08-06T14:57:05.111Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2023-29449
Vulnerability from cvelistv5
Published
2023-07-13 08:24
Modified
2024-10-22 16:26
Summary
JavaScript preprocessing, webhooks and global scripts can cause uncontrolled CPU, memory, and disk I/O utilization. Preprocessing/webhook/global script configuration and testing are only available to Administrative roles (Admin and Superadmin). Administrative privileges should be typically granted to users who need to perform tasks that require more control over the system. The security risk is limited because not all users have this level of access.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T14:07:46.424Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://support.zabbix.com/browse/ZBX-22589"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-29449",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-22T16:25:49.074563Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-22T16:26:32.206Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "modules": [
            "Server",
            "Proxy"
          ],
          "product": "Zabbix",
          "repo": "https://git.zabbix.com/",
          "vendor": "Zabbix",
          "versions": [
            {
              "lessThanOrEqual": "4.4.*",
              "status": "affected",
              "version": "4.4.4",
              "versionType": "git"
            },
            {
              "changes": [
                {
                  "at": "5.0.32rc1",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.0.31",
              "status": "affected",
              "version": "5.0.0alpha1",
              "versionType": "git"
            },
            {
              "lessThanOrEqual": "5.2.*",
              "status": "affected",
              "version": "5.2.0alpha1",
              "versionType": "git"
            },
            {
              "lessThanOrEqual": "5.4.*",
              "status": "affected",
              "version": "5.4.0alpha1",
              "versionType": "git"
            },
            {
              "changes": [
                {
                  "at": "6.0.14rc1 (6.0.16 is recommended)",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.0.13",
              "status": "affected",
              "version": "6.0.0alpha1",
              "versionType": "git"
            },
            {
              "changes": [
                {
                  "at": "6.2.8rc1",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.2.7",
              "status": "affected",
              "version": "6.2.0alpha1",
              "versionType": "git"
            },
            {
              "changes": [
                {
                  "at": "6.4.0rc2",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.4.0beta6",
              "status": "affected",
              "version": "6.4.0alpha1 ",
              "versionType": "git"
            }
          ]
        }
      ],
      "datePublic": "2023-01-06T07:17:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "JavaScript preprocessing, webhooks and global scripts can cause uncontrolled CPU, memory, and disk I/O utilization. Preprocessing/webhook/global script configuration and testing are only available to Administrative roles (Admin and Superadmin). Administrative privileges should be typically granted to users who need to perform tasks that require more control over the system. The security risk is limited because not all users have this level of access. "
            }
          ],
          "value": "JavaScript preprocessing, webhooks and global scripts can cause uncontrolled CPU, memory, and disk I/O utilization. Preprocessing/webhook/global script configuration and testing are only available to Administrative roles (Admin and Superadmin). Administrative privileges should be typically granted to users who need to perform tasks that require more control over the system. The security risk is limited because not all users have this level of access. "
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-130",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-130 Excessive Allocation"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-400",
              "description": "CWE-400 Uncontrolled Resource Consumption",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-07-13T08:24:27.450Z",
        "orgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8",
        "shortName": "Zabbix"
      },
      "references": [
        {
          "url": "https://support.zabbix.com/browse/ZBX-22589"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Limited control of resource utilization in JS preprocessing",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8",
    "assignerShortName": "Zabbix",
    "cveId": "CVE-2023-29449",
    "datePublished": "2023-07-13T08:24:00.766Z",
    "dateReserved": "2023-04-06T18:04:44.891Z",
    "dateUpdated": "2024-10-22T16:26:32.206Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2022-35230
Vulnerability from cvelistv5
Published
2022-07-06 11:05
Modified
2024-09-16 22:10
Summary
An authenticated user can create a link with reflected Javascript code inside it for the graphs page and send it to other users. The payload can be executed only with a known CSRF token value of the victim, which is changed periodically and is difficult to predict.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T09:29:17.473Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://support.zabbix.com/browse/ZBX-21305"
          },
          {
            "name": "[debian-lts-announce] 20230412 [SECURITY] [DLA 3390-1] zabbix security update",
            "tags": [
              "mailing-list",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00013.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Frontend",
          "vendor": "Zabbix",
          "versions": [
            {
              "status": "affected",
              "version": "4.0.0-4.0.42"
            },
            {
              "status": "affected",
              "version": "5.0.0-5.0.24"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "internal research"
        }
      ],
      "datePublic": "2022-04-27T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "An authenticated user can create a link with reflected Javascript code inside it for the graphs page and send it to other users. The payload can be executed only with a known CSRF token value of the victim, which is changed periodically and is difficult to predict."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 3.7,
            "baseSeverity": "LOW",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-79",
              "description": "CWE-79 Cross-site Scripting (XSS)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-04-12T00:00:00",
        "orgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8",
        "shortName": "Zabbix"
      },
      "references": [
        {
          "url": "https://support.zabbix.com/browse/ZBX-21305"
        },
        {
          "name": "[debian-lts-announce] 20230412 [SECURITY] [DLA 3390-1] zabbix security update",
          "tags": [
            "mailing-list"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00013.html"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "value": "To remediate this vulnerability, apply the updates"
        }
      ],
      "source": {
        "discovery": "INTERNAL"
      },
      "title": "Reflected XSS in graphs page of Zabbix Frontend",
      "workarounds": [
        {
          "lang": "en",
          "value": "The vulnerability can be exploited only by authenticated users. If an immediate update is not possible, review user access rights to your Zabbix Frontend, be attentive to browser warnings and always check any links you can receive via email or other means of communication, which lead to the graphs.php page of Zabbix Frontend and contain suspicious parameters with special symbols. If you have clicked on the suspicious link, do not fill out the opened form"
        }
      ],
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8",
    "assignerShortName": "Zabbix",
    "cveId": "CVE-2022-35230",
    "datePublished": "2022-07-06T11:05:14.025474Z",
    "dateReserved": "2022-07-05T00:00:00",
    "dateUpdated": "2024-09-16T22:10:24.111Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2022-40626
Vulnerability from cvelistv5
Published
2022-09-14 06:55
Modified
2024-09-16 19:19
Summary
An unauthenticated user can create a link with reflected Javascript code inside the backurl parameter and send it to other authenticated users in order to create a fake account with predefined login, password and role in Zabbix Frontend.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T12:21:46.555Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://support.zabbix.com/browse/ZBX-21350"
          },
          {
            "name": "FEDORA-2022-0d56cb7ee4",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SPU4RCRYVNVM3SS523UQXE63ATCTEX5G/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Frontend",
          "vendor": "Zabbix",
          "versions": [
            {
              "status": "affected",
              "version": "6.0.0-6.0.6"
            },
            {
              "status": "affected",
              "version": "6.2.0"
            },
            {
              "lessThan": "unspecified",
              "status": "unaffected",
              "version": "6.0.7rc1",
              "versionType": "custom"
            },
            {
              "lessThan": "unspecified",
              "status": "unaffected",
              "version": "6.2.1rc1",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "internal research"
        }
      ],
      "datePublic": "2022-07-08T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "An unauthenticated user can create a link with reflected Javascript code inside the backurl parameter and send it to other authenticated users in order to create a fake account with predefined login, password and role in Zabbix Frontend."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 4.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:L/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-79",
              "description": "CWE-79 Cross-site Scripting (XSS)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-09-19T01:06:09",
        "orgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8",
        "shortName": "Zabbix"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://support.zabbix.com/browse/ZBX-21350"
        },
        {
          "name": "FEDORA-2022-0d56cb7ee4",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SPU4RCRYVNVM3SS523UQXE63ATCTEX5G/"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "value": "To remediate this vulnerability, apply the updates"
        }
      ],
      "source": {
        "discovery": "INTERNAL"
      },
      "title": "Reflected XSS in the backurl parameter of Zabbix Frontend",
      "workarounds": [
        {
          "lang": "en",
          "value": "The vulnerability can be exploited only by authenticated users. If an immediate update is not possible, review user access rights to your Zabbix Frontend, be attentive to browser warnings and always check any links you can receive via email or other means of communication, which lead to Zabbix Frontend and contain suspicious parameters with special symbols."
        }
      ],
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "AKA": "ZBV-2022-07-1",
          "ASSIGNER": "security@zabbix.com",
          "DATE_PUBLIC": "2022-07-08T10:37:00.000Z",
          "ID": "CVE-2022-40626",
          "STATE": "PUBLIC",
          "TITLE": "Reflected XSS in the backurl parameter of Zabbix Frontend"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Frontend",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "6.0.0-6.0.6"
                          },
                          {
                            "version_affected": "=",
                            "version_value": "6.2.0"
                          },
                          {
                            "version_affected": "!\u003e=",
                            "version_value": "6.0.7rc1"
                          },
                          {
                            "version_affected": "!\u003e=",
                            "version_value": "6.2.1rc1"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Zabbix"
              }
            ]
          }
        },
        "credit": [
          {
            "lang": "eng",
            "value": "internal research"
          }
        ],
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "An unauthenticated user can create a link with reflected Javascript code inside the backurl parameter and send it to other authenticated users in order to create a fake account with predefined login, password and role in Zabbix Frontend."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "impact": {
          "cvss": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 4.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:L/A:N",
            "version": "3.1"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-79 Cross-site Scripting (XSS)"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://support.zabbix.com/browse/ZBX-21350",
              "refsource": "MISC",
              "url": "https://support.zabbix.com/browse/ZBX-21350"
            },
            {
              "name": "FEDORA-2022-0d56cb7ee4",
              "refsource": "FEDORA",
              "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SPU4RCRYVNVM3SS523UQXE63ATCTEX5G/"
            }
          ]
        },
        "solution": [
          {
            "lang": "en",
            "value": "To remediate this vulnerability, apply the updates"
          }
        ],
        "source": {
          "discovery": "INTERNAL"
        },
        "work_around": [
          {
            "lang": "en",
            "value": "The vulnerability can be exploited only by authenticated users. If an immediate update is not possible, review user access rights to your Zabbix Frontend, be attentive to browser warnings and always check any links you can receive via email or other means of communication, which lead to Zabbix Frontend and contain suspicious parameters with special symbols."
          }
        ]
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8",
    "assignerShortName": "Zabbix",
    "cveId": "CVE-2022-40626",
    "datePublished": "2022-09-14T06:55:08.852950Z",
    "dateReserved": "2022-09-13T00:00:00",
    "dateUpdated": "2024-09-16T19:19:37.577Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2023-32723
Vulnerability from cvelistv5
Published
2023-10-12 06:11
Modified
2024-09-17 13:53
Summary
Request to LDAP is sent before user permissions are checked.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T15:25:36.727Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://support.zabbix.com/browse/ZBX-23230"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00012.html"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-32723",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-09-17T13:43:34.035247Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-09-17T13:53:50.255Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "modules": [
            "Frontend"
          ],
          "product": "Zabbix",
          "repo": "https://git.zabbix.com/",
          "vendor": "Zabbix",
          "versions": [
            {
              "changes": [
                {
                  "at": "4.0.20rc1",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "4.0.19rc1",
              "status": "affected",
              "version": "4.0.0",
              "versionType": "git"
            },
            {
              "changes": [
                {
                  "at": "4.4.8rc1",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "4.4.7rc1 ",
              "status": "affected",
              "version": "4.4.0",
              "versionType": "git"
            },
            {
              "changes": [
                {
                  "at": "5.0.0alpha4",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.0.0alpha4",
              "status": "affected",
              "version": "5.0.0alpha1",
              "versionType": "git"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "Zabbix wants to thank Xiaojunjie"
        }
      ],
      "datePublic": "2023-08-09T11:41:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Request to LDAP is sent before user permissions are checked."
            }
          ],
          "value": "Request to LDAP is sent before user permissions are checked."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-101",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-101 Server Side Include (SSI) Injection"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 8.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "LOW",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-732",
              "description": "CWE-732 Incorrect Permission Assignment for Critical Resource",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-10-12T06:11:26.612Z",
        "orgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8",
        "shortName": "Zabbix"
      },
      "references": [
        {
          "url": "https://support.zabbix.com/browse/ZBX-23230"
        },
        {
          "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00012.html"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Inefficient permission check in class CControllerAuthenticationUpdate",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8",
    "assignerShortName": "Zabbix",
    "cveId": "CVE-2023-32723",
    "datePublished": "2023-10-12T06:11:26.612Z",
    "dateReserved": "2023-05-11T21:25:43.368Z",
    "dateUpdated": "2024-09-17T13:53:50.255Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2024-36468
Vulnerability from cvelistv5
Published
2024-11-27 12:03
Modified
2024-11-27 14:57
Summary
The reported vulnerability is a stack buffer overflow in the zbx_snmp_cache_handle_engineid function within the Zabbix server/proxy code. This issue occurs when copying data from session->securityEngineID to local_record.engineid without proper bounds checking.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-36468",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-27T14:57:25.702787Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-27T14:57:32.411Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "modules": [
            "Proxy",
            "Server"
          ],
          "product": "Zabbix",
          "repo": "https://git.zabbix.com/",
          "vendor": "Zabbix",
          "versions": [
            {
              "changes": [
                {
                  "at": "7.0.3rc1",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "7.0.2rc1",
              "status": "affected",
              "version": "7.0.0",
              "versionType": "git"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Zabbix wants to thank chamal for submitting this report on the HackerOne bug bounty platform"
        }
      ],
      "datePublic": "2024-09-12T12:30:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "The reported vulnerability is a stack buffer overflow in the zbx_snmp_cache_handle_engineid function within the Zabbix server/proxy code. This issue occurs when copying data from session-\u0026gt;securityEngineID to local_record.engineid without proper bounds checking."
            }
          ],
          "value": "The reported vulnerability is a stack buffer overflow in the zbx_snmp_cache_handle_engineid function within the Zabbix server/proxy code. This issue occurs when copying data from session-\u003esecurityEngineID to local_record.engineid without proper bounds checking."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-100",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-100 Overflow Buffers"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 3,
            "baseSeverity": "LOW",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-121",
              "description": "CWE-121 Stack-based Buffer Overflow",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-11-27T12:03:07.626Z",
        "orgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8",
        "shortName": "Zabbix"
      },
      "references": [
        {
          "url": "https://support.zabbix.com/browse/ZBX-25621"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "Stack buffer overflow in zbx_snmp_cache_handle_engineid",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8",
    "assignerShortName": "Zabbix",
    "cveId": "CVE-2024-36468",
    "datePublished": "2024-11-27T12:03:07.626Z",
    "dateReserved": "2024-05-28T11:21:24.947Z",
    "dateUpdated": "2024-11-27T14:57:32.411Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2009-4499
Vulnerability from cvelistv5
Published
2009-12-31 18:00
Modified
2024-09-16 19:46
Severity ?
Summary
SQL injection vulnerability in the get_history_lastid function in the nodewatcher component in Zabbix Server before 1.6.8 allows remote attackers to execute arbitrary SQL commands via a crafted request, possibly related to the send_history_last_id function in zabbix_server/trapper/nodehistory.c.
References
http://www.securityfocus.com/archive/1/508436/30/60/threadedmailing-list, x_refsource_BUGTRAQ
https://support.zabbix.com/browse/ZBX-1031x_refsource_CONFIRM
http://secunia.com/advisories/37740third-party-advisory, x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2009/3514vdb-entry, x_refsource_VUPEN
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T07:08:36.884Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20091213 Zabbix Server : Multiple remote vulnerabilities",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/508436/30/60/threaded"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://support.zabbix.com/browse/ZBX-1031"
          },
          {
            "name": "37740",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/37740"
          },
          {
            "name": "ADV-2009-3514",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/3514"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "SQL injection vulnerability in the get_history_lastid function in the nodewatcher component in Zabbix Server before 1.6.8 allows remote attackers to execute arbitrary SQL commands via a crafted request, possibly related to the send_history_last_id function in zabbix_server/trapper/nodehistory.c."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2009-12-31T18:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "20091213 Zabbix Server : Multiple remote vulnerabilities",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/508436/30/60/threaded"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://support.zabbix.com/browse/ZBX-1031"
        },
        {
          "name": "37740",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/37740"
        },
        {
          "name": "ADV-2009-3514",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/3514"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-4499",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "SQL injection vulnerability in the get_history_lastid function in the nodewatcher component in Zabbix Server before 1.6.8 allows remote attackers to execute arbitrary SQL commands via a crafted request, possibly related to the send_history_last_id function in zabbix_server/trapper/nodehistory.c."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20091213 Zabbix Server : Multiple remote vulnerabilities",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/508436/30/60/threaded"
            },
            {
              "name": "https://support.zabbix.com/browse/ZBX-1031",
              "refsource": "CONFIRM",
              "url": "https://support.zabbix.com/browse/ZBX-1031"
            },
            {
              "name": "37740",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/37740"
            },
            {
              "name": "ADV-2009-3514",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2009/3514"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-4499",
    "datePublished": "2009-12-31T18:00:00Z",
    "dateReserved": "2009-12-30T00:00:00Z",
    "dateUpdated": "2024-09-16T19:46:23.353Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2023-32726
Vulnerability from cvelistv5
Published
2023-12-18 09:17
Modified
2024-08-02 15:25
Summary
The vulnerability is caused by improper check for check if RDLENGTH does not overflow the buffer in response from DNS server.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T15:25:36.567Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://support.zabbix.com/browse/ZBX-23855"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UMFKNV5E4LG2DIZNPRWQ2ENH75H6UEQT/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BYSYLA7VTHR25CBLYO5ZLEJFGU7HTHQB/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00012.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "modules": [
            "Agent"
          ],
          "product": "Zabbix",
          "repo": "https://git.zabbix.com/",
          "vendor": "Zabbix",
          "versions": [
            {
              "changes": [
                {
                  "at": "5.0.40",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.0.39",
              "status": "affected",
              "version": "5.0.0",
              "versionType": "git"
            },
            {
              "changes": [
                {
                  "at": "6.0.24",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.0.23",
              "status": "affected",
              "version": "6.0.0",
              "versionType": "git"
            },
            {
              "changes": [
                {
                  "at": "6.4.9",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.4.8",
              "status": "affected",
              "version": "6.4.0",
              "versionType": "git"
            },
            {
              "changes": [
                {
                  "at": "7.0.0alpha8",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "7.0.0alpha7",
              "status": "affected",
              "version": "7.0.0alpha1",
              "versionType": "git"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "This vulnerability is found by Philippe Antoine (catenacyber) from HackerOne community."
        }
      ],
      "datePublic": "2023-11-06T11:17:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "The vulnerability is caused by improper check for check if RDLENGTH does not overflow the buffer in response from DNS server."
            }
          ],
          "value": "The vulnerability is caused by improper check for check if RDLENGTH does not overflow the buffer in response from DNS server."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-540",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-540 Overread Buffers"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 3.9,
            "baseSeverity": "LOW",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-754",
              "description": "CWE-754: Improper Check for Unusual or Exceptional Conditions",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-12-18T09:17:47.628Z",
        "orgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8",
        "shortName": "Zabbix"
      },
      "references": [
        {
          "url": "https://support.zabbix.com/browse/ZBX-23855"
        },
        {
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UMFKNV5E4LG2DIZNPRWQ2ENH75H6UEQT/"
        },
        {
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BYSYLA7VTHR25CBLYO5ZLEJFGU7HTHQB/"
        },
        {
          "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00012.html"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "Possible buffer overread from reading DNS responses",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8",
    "assignerShortName": "Zabbix",
    "cveId": "CVE-2023-32726",
    "datePublished": "2023-12-18T09:17:47.628Z",
    "dateReserved": "2023-05-11T21:25:43.368Z",
    "dateUpdated": "2024-08-02T15:25:36.567Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2024-42328
Vulnerability from cvelistv5
Published
2024-11-27 12:04
Modified
2024-11-27 14:56
Summary
When the webdriver for the Browser object downloads data from a HTTP server, the data pointer is set to NULL and is allocated only in curl_write_cb when receiving data. If the server's response is an empty document, then wd->data in the code below will remain NULL and an attempt to read from it will result in a crash.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-42328",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-27T14:56:07.120650Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-27T14:56:15.833Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "modules": [
            "Server"
          ],
          "product": "Zabbix",
          "repo": "https://git.zabbix.com/",
          "vendor": "Zabbix",
          "versions": [
            {
              "changes": [
                {
                  "at": "7.0.3rc1",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "7.0.2",
              "status": "affected",
              "version": "7.0.0",
              "versionType": "git"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "value": "Zabbix wants to thank zhutyra for submitting this report on the HackerOne bug bounty platform"
        }
      ],
      "datePublic": "2024-10-30T11:49:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "When the webdriver for the Browser object downloads data from a HTTP server, the data pointer is set to NULL and is allocated only in curl_write_cb when receiving data. If the server\u0027s response is an empty document, then wd-\u0026gt;data in the code below will remain NULL and an attempt to read from it will result in a crash."
            }
          ],
          "value": "When the webdriver for the Browser object downloads data from a HTTP server, the data pointer is set to NULL and is allocated only in curl_write_cb when receiving data. If the server\u0027s response is an empty document, then wd-\u003edata in the code below will remain NULL and an attempt to read from it will result in a crash."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-215",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-215 Fuzzing for application mapping"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "LOW",
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-690",
              "description": "CWE-690 Unchecked Return Value to NULL Pointer Dereference",
              "lang": "en",
              "type": "CWE"
            }
          ]
        },
        {
          "descriptions": [
            {
              "cweId": "CWE-476",
              "description": "CWE-476 NULL Pointer Dereference",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-11-27T12:04:53.864Z",
        "orgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8",
        "shortName": "Zabbix"
      },
      "references": [
        {
          "url": "https://support.zabbix.com/browse/ZBX-25624"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "JS - Crash on empty HTTP server response",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8",
    "assignerShortName": "Zabbix",
    "cveId": "CVE-2024-42328",
    "datePublished": "2024-11-27T12:04:53.864Z",
    "dateReserved": "2024-07-30T08:27:36.132Z",
    "dateUpdated": "2024-11-27T14:56:15.833Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2024-22116
Vulnerability from cvelistv5
Published
2024-08-09 10:16
Modified
2024-12-04 14:37
Severity ?
Summary
An administrator with restricted permissions can exploit the script execution functionality within the Monitoring Hosts section. The lack of default escaping for script parameters enabled this user ability to execute arbitrary code via the Ping script, thereby compromising infrastructure.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "zabbix",
            "vendor": "zabbix",
            "versions": [
              {
                "lessThanOrEqual": "6.4.15",
                "status": "affected",
                "version": "6.4.9",
                "versionType": "custom"
              },
              {
                "lessThanOrEqual": "7.0.0rc2",
                "status": "affected",
                "version": "7.0.0alpha1",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-22116",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-12-04T04:55:28.879375Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-12-04T14:37:43.459Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "modules": [
            "Server"
          ],
          "product": "Zabbix",
          "repo": "https://git.zabbix.com/",
          "vendor": "Zabbix",
          "versions": [
            {
              "changes": [
                {
                  "at": "6.4.16rc1",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.4.15",
              "status": "affected",
              "version": "6.4.9",
              "versionType": "git"
            },
            {
              "changes": [
                {
                  "at": "7.0.0rc3",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "7.0.0rc2",
              "status": "affected",
              "version": "7.0.0alpha1",
              "versionType": "git"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "value": "Zabbix wants to thank justonezero and Qusai Alhaddad (qusaialhaddad) who submitted this report in HackerOne bug bounty platform"
        }
      ],
      "datePublic": "2024-06-12T12:52:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "An administrator with restricted permissions can exploit the script execution functionality within the Monitoring Hosts section. The lack of default escaping for script parameters enabled this user ability to execute arbitrary code via the Ping script, thereby compromising infrastructure."
            }
          ],
          "value": "An administrator with restricted permissions can exploit the script execution functionality within the Monitoring Hosts section. The lack of default escaping for script parameters enabled this user ability to execute arbitrary code via the Ping script, thereby compromising infrastructure."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-253",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-253 Remote Code Inclusion"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.9,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-94",
              "description": "CWE-94 Improper Control of Generation of Code (\u0027Code Injection\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-08-27T09:10:20.447Z",
        "orgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8",
        "shortName": "Zabbix"
      },
      "references": [
        {
          "url": "https://support.zabbix.com/browse/ZBX-25016"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "Remote code execution within ping script",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8",
    "assignerShortName": "Zabbix",
    "cveId": "CVE-2024-22116",
    "datePublished": "2024-08-09T10:16:34.982Z",
    "dateReserved": "2024-01-05T07:44:01.394Z",
    "dateUpdated": "2024-12-04T14:37:43.459Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2017-2826
Vulnerability from cvelistv5
Published
2018-04-09 20:00
Modified
2024-09-17 00:15
Severity ?
Summary
An information disclosure vulnerability exists in the iConfig proxy request of Zabbix server 2.4.X. A specially crafted iConfig proxy request can cause the Zabbix server to send the configuration information of any Zabbix proxy, resulting in information disclosure. An attacker can make requests from an active Zabbix proxy to trigger this vulnerability.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T14:09:16.674Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2017-0327"
          },
          {
            "name": "[debian-lts-announce] 20190311 [SECURITY] [DLA 1708-1] zabbix security update",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00010.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Zabbix",
          "vendor": "Talos",
          "versions": [
            {
              "status": "affected",
              "version": "Zabbix Server 2.4.8.r1"
            }
          ]
        }
      ],
      "datePublic": "2018-04-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "An information disclosure vulnerability exists in the iConfig proxy request of Zabbix server 2.4.X. A specially crafted iConfig proxy request can cause the Zabbix server to send the configuration information of any Zabbix proxy, resulting in information disclosure. An attacker can make requests from an active Zabbix proxy to trigger this vulnerability."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "server config proxy vulnerability",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-03-12T09:57:01",
        "orgId": "b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b",
        "shortName": "talos"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2017-0327"
        },
        {
          "name": "[debian-lts-announce] 20190311 [SECURITY] [DLA 1708-1] zabbix security update",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00010.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "talos-cna@cisco.com",
          "DATE_PUBLIC": "2018-04-09T00:00:00",
          "ID": "CVE-2017-2826",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Zabbix",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Zabbix Server 2.4.8.r1"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Talos"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "An information disclosure vulnerability exists in the iConfig proxy request of Zabbix server 2.4.X. A specially crafted iConfig proxy request can cause the Zabbix server to send the configuration information of any Zabbix proxy, resulting in information disclosure. An attacker can make requests from an active Zabbix proxy to trigger this vulnerability."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "server config proxy vulnerability"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://talosintelligence.com/vulnerability_reports/TALOS-2017-0327",
              "refsource": "MISC",
              "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2017-0327"
            },
            {
              "name": "[debian-lts-announce] 20190311 [SECURITY] [DLA 1708-1] zabbix security update",
              "refsource": "MLIST",
              "url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00010.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b86d76f8-0f8a-4a96-a78d-d8abfc7fc29b",
    "assignerShortName": "talos",
    "cveId": "CVE-2017-2826",
    "datePublished": "2018-04-09T20:00:00Z",
    "dateReserved": "2016-12-01T00:00:00",
    "dateUpdated": "2024-09-17T00:15:28.741Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2008-1353
Vulnerability from cvelistv5
Published
2008-03-17 17:00
Modified
2024-08-07 08:17
Severity ?
Summary
zabbix_agentd in ZABBIX 1.4.4 allows remote attackers to cause a denial of service (CPU and connection consumption) via multiple vfs.file.cksum commands with a special device node such as /dev/urandom or /dev/zero.
References
http://www.vupen.com/english/advisories/2008/0878vdb-entry, x_refsource_VUPEN
http://securityreason.com/securityalert/3747third-party-advisory, x_refsource_SREASON
http://www.securityfocus.com/bid/28244vdb-entry, x_refsource_BID
https://exchange.xforce.ibmcloud.com/vulnerabilities/41196vdb-entry, x_refsource_XF
http://secunia.com/advisories/29383third-party-advisory, x_refsource_SECUNIA
http://www.securityfocus.com/archive/1/489506/100/0/threadedmailing-list, x_refsource_BUGTRAQ
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T08:17:34.666Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "ADV-2008-0878",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/0878"
          },
          {
            "name": "3747",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/3747"
          },
          {
            "name": "28244",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/28244"
          },
          {
            "name": "zabbix-zabbixagentd-dos(41196)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41196"
          },
          {
            "name": "29383",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/29383"
          },
          {
            "name": "20080313 Zabbix (zabbix_agentd) denial of service",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/489506/100/0/threaded"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-03-13T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "zabbix_agentd in ZABBIX 1.4.4 allows remote attackers to cause a denial of service (CPU and connection consumption) via multiple vfs.file.cksum commands with a special device node such as /dev/urandom or /dev/zero."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-11T19:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "ADV-2008-0878",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/0878"
        },
        {
          "name": "3747",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/3747"
        },
        {
          "name": "28244",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/28244"
        },
        {
          "name": "zabbix-zabbixagentd-dos(41196)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41196"
        },
        {
          "name": "29383",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/29383"
        },
        {
          "name": "20080313 Zabbix (zabbix_agentd) denial of service",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/489506/100/0/threaded"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-1353",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "zabbix_agentd in ZABBIX 1.4.4 allows remote attackers to cause a denial of service (CPU and connection consumption) via multiple vfs.file.cksum commands with a special device node such as /dev/urandom or /dev/zero."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "ADV-2008-0878",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/0878"
            },
            {
              "name": "3747",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/3747"
            },
            {
              "name": "28244",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/28244"
            },
            {
              "name": "zabbix-zabbixagentd-dos(41196)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41196"
            },
            {
              "name": "29383",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/29383"
            },
            {
              "name": "20080313 Zabbix (zabbix_agentd) denial of service",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/489506/100/0/threaded"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-1353",
    "datePublished": "2008-03-17T17:00:00",
    "dateReserved": "2008-03-17T00:00:00",
    "dateUpdated": "2024-08-07T08:17:34.666Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2010-2790
Vulnerability from cvelistv5
Published
2010-08-04 19:00
Modified
2024-08-07 02:46
Severity ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in the formatQuery function in frontends/php/include/classes/class.curl.php in Zabbix before 1.8.3rc1 allow remote attackers to inject arbitrary web script or HTML via the (1) filter_set, (2) show_details, (3) filter_rst, or (4) txt_select parameters to the triggers page (tr_status.php). NOTE: some of these details are obtained from third party information.
References
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T02:46:48.224Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.zabbix.com/forum/showthread.php?p=68770"
          },
          {
            "name": "zabbix-classcurl-xss(60772)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/60772"
          },
          {
            "name": "ADV-2010-1908",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2010/1908"
          },
          {
            "name": "40679",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/40679"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://support.zabbix.com/browse/ZBX-2326"
          },
          {
            "name": "42017",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/42017"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2010-07-26T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple cross-site scripting (XSS) vulnerabilities in the formatQuery function in frontends/php/include/classes/class.curl.php in Zabbix before 1.8.3rc1 allow remote attackers to inject arbitrary web script or HTML via the (1) filter_set, (2) show_details, (3) filter_rst, or (4) txt_select parameters to the triggers page (tr_status.php).  NOTE: some of these details are obtained from third party information."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-16T14:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.zabbix.com/forum/showthread.php?p=68770"
        },
        {
          "name": "zabbix-classcurl-xss(60772)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/60772"
        },
        {
          "name": "ADV-2010-1908",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2010/1908"
        },
        {
          "name": "40679",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/40679"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://support.zabbix.com/browse/ZBX-2326"
        },
        {
          "name": "42017",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/42017"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2010-2790",
    "datePublished": "2010-08-04T19:00:00",
    "dateReserved": "2010-07-22T00:00:00",
    "dateUpdated": "2024-08-07T02:46:48.224Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2011-5027
Vulnerability from cvelistv5
Published
2011-12-29 22:00
Modified
2024-08-07 00:23
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in ZABBIX before 1.8.10 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors related to the profiler.
References
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T00:23:39.389Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "51093",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/51093"
          },
          {
            "name": "FEDORA-2011-17559",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-January/071660.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://support.zabbix.com/browse/ZBX-4015"
          },
          {
            "name": "FEDORA-2011-17560",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-January/071687.html"
          },
          {
            "name": "77772",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/77772"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.zabbix.com/rn1.8.10.php"
          },
          {
            "name": "47216",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/47216"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-12-08T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting (XSS) vulnerability in ZABBIX before 1.8.10 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors related to the profiler."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2012-02-01T10:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "51093",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/51093"
        },
        {
          "name": "FEDORA-2011-17559",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-January/071660.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://support.zabbix.com/browse/ZBX-4015"
        },
        {
          "name": "FEDORA-2011-17560",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-January/071687.html"
        },
        {
          "name": "77772",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/77772"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.zabbix.com/rn1.8.10.php"
        },
        {
          "name": "47216",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/47216"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2011-5027",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting (XSS) vulnerability in ZABBIX before 1.8.10 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors related to the profiler."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "51093",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/51093"
            },
            {
              "name": "FEDORA-2011-17559",
              "refsource": "FEDORA",
              "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-January/071660.html"
            },
            {
              "name": "https://support.zabbix.com/browse/ZBX-4015",
              "refsource": "CONFIRM",
              "url": "https://support.zabbix.com/browse/ZBX-4015"
            },
            {
              "name": "FEDORA-2011-17560",
              "refsource": "FEDORA",
              "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-January/071687.html"
            },
            {
              "name": "77772",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/77772"
            },
            {
              "name": "http://www.zabbix.com/rn1.8.10.php",
              "refsource": "CONFIRM",
              "url": "http://www.zabbix.com/rn1.8.10.php"
            },
            {
              "name": "47216",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/47216"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2011-5027",
    "datePublished": "2011-12-29T22:00:00",
    "dateReserved": "2011-12-29T00:00:00",
    "dateUpdated": "2024-08-07T00:23:39.389Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2023-29456
Vulnerability from cvelistv5
Published
2023-07-13 09:33
Modified
2024-10-22 16:21
Summary
URL validation scheme receives input from a user and then parses it to identify its various components. The validation scheme can ensure that all URL components comply with internet standards.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T14:07:46.321Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://support.zabbix.com/browse/ZBX-22987"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00027.html"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-29456",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-22T16:19:48.186851Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-22T16:21:29.187Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "affected",
          "modules": [
            "Frontend"
          ],
          "product": "Zabbix",
          "repo": "https://git.zabbix.com/",
          "vendor": "Zabbix",
          "versions": [
            {
              "changes": [
                {
                  "at": "4.0.47rc1",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "4.0.46",
              "status": "affected",
              "version": "4.0.0",
              "versionType": "git"
            },
            {
              "changes": [
                {
                  "at": "5.0.36rc1",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.0.35",
              "status": "affected",
              "version": "5.0.0",
              "versionType": "git"
            },
            {
              "changes": [
                {
                  "at": "6.0.19rc1",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.0.18",
              "status": "affected",
              "version": "6.0.0",
              "versionType": "git"
            },
            {
              "changes": [
                {
                  "at": "6.4.4rc1",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.4.3",
              "status": "affected",
              "version": "6.4.0",
              "versionType": "git"
            },
            {
              "changes": [
                {
                  "at": "7.0.0alpha2",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "7.0.0alpha1 ",
              "status": "affected",
              "version": "7.0.0alpha1",
              "versionType": "git"
            }
          ]
        }
      ],
      "datePublic": "2023-06-16T11:04:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "URL validation scheme receives input from a user and then parses it to identify its various components. The validation scheme can ensure that all URL components comply with internet standards.\u003cbr\u003e"
            }
          ],
          "value": "URL validation scheme receives input from a user and then parses it to identify its various components. The validation scheme can ensure that all URL components comply with internet standards.\n"
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-63",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-63 Cross-Site Scripting (XSS)"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 5.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:L/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-20",
              "description": "CWE-20 Improper Input Validation",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-07-27T13:35:49.537Z",
        "orgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8",
        "shortName": "Zabbix"
      },
      "references": [
        {
          "url": "https://support.zabbix.com/browse/ZBX-22987"
        },
        {
          "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00027.html"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Inefficient URL schema validation",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8",
    "assignerShortName": "Zabbix",
    "cveId": "CVE-2023-29456",
    "datePublished": "2023-07-13T09:33:32.720Z",
    "dateReserved": "2023-04-06T18:04:44.892Z",
    "dateUpdated": "2024-10-22T16:21:29.187Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2013-6824
Vulnerability from cvelistv5
Published
2013-12-19 02:00
Modified
2024-08-06 17:46
Severity ?
Summary
Zabbix before 1.8.19rc1, 2.0 before 2.0.10rc1, and 2.2 before 2.2.1rc1 allows remote Zabbix servers and proxies to execute arbitrary commands via a newline in a flexible user parameter.
References
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T17:46:23.955Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://support.zabbix.com/browse/ZBX-7479"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.zabbix.com/rn1.8.19rc1.php"
          },
          {
            "name": "GLSA-201401-26",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-201401-26.xml"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.zabbix.com/rn2.0.10rc1.php"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.zabbix.com/rn2.2.1rc1.php"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2013-12-03T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Zabbix before 1.8.19rc1, 2.0 before 2.0.10rc1, and 2.2 before 2.2.1rc1 allows remote Zabbix servers and proxies to execute arbitrary commands via a newline in a flexible user parameter."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2014-02-20T16:57:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://support.zabbix.com/browse/ZBX-7479"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.zabbix.com/rn1.8.19rc1.php"
        },
        {
          "name": "GLSA-201401-26",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-201401-26.xml"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.zabbix.com/rn2.0.10rc1.php"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.zabbix.com/rn2.2.1rc1.php"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2013-6824",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Zabbix before 1.8.19rc1, 2.0 before 2.0.10rc1, and 2.2 before 2.2.1rc1 allows remote Zabbix servers and proxies to execute arbitrary commands via a newline in a flexible user parameter."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://support.zabbix.com/browse/ZBX-7479",
              "refsource": "CONFIRM",
              "url": "https://support.zabbix.com/browse/ZBX-7479"
            },
            {
              "name": "http://www.zabbix.com/rn1.8.19rc1.php",
              "refsource": "CONFIRM",
              "url": "http://www.zabbix.com/rn1.8.19rc1.php"
            },
            {
              "name": "GLSA-201401-26",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-201401-26.xml"
            },
            {
              "name": "http://www.zabbix.com/rn2.0.10rc1.php",
              "refsource": "CONFIRM",
              "url": "http://www.zabbix.com/rn2.0.10rc1.php"
            },
            {
              "name": "http://www.zabbix.com/rn2.2.1rc1.php",
              "refsource": "CONFIRM",
              "url": "http://www.zabbix.com/rn2.2.1rc1.php"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2013-6824",
    "datePublished": "2013-12-19T02:00:00",
    "dateReserved": "2013-11-19T00:00:00",
    "dateUpdated": "2024-08-06T17:46:23.955Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2022-43516
Vulnerability from cvelistv5
Published
2022-12-12 01:49
Modified
2024-09-16 20:22
Summary
A Firewall Rule which allows all incoming TCP connections to all programs from any source and to all ports is created in Windows Firewall after Zabbix agent installation (MSI)
Impacted products
Vendor Product Version
Zabbix Zabbix agent 2 (MSI packages) Version: Oct. 29, 2022 - Dec 2, 2022
Patch: Dec 3, 2022
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T13:32:59.496Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://support.zabbix.com/browse/ZBX-22002"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Zabbix agent (MSI packages)",
          "vendor": "Zabbix",
          "versions": [
            {
              "status": "affected",
              "version": "Oct. 29, 2022 - Dec 2, 2022"
            },
            {
              "lessThan": "unspecified",
              "status": "unaffected",
              "version": "Dec 3, 2022",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "Zabbix agent 2 (MSI packages)",
          "vendor": "Zabbix",
          "versions": [
            {
              "status": "affected",
              "version": "Oct. 29, 2022 - Dec 2, 2022"
            },
            {
              "lessThan": "unspecified",
              "status": "unaffected",
              "version": "Dec 3, 2022",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "Joshua PowellNishiyama"
        }
      ],
      "datePublic": "2022-11-30T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "A Firewall Rule which allows all incoming TCP connections to all programs from any source and to all ports is created in Windows Firewall after Zabbix agent installation (MSI)"
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-16",
              "description": "CWE-16 Configuration",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-12-05T00:00:00",
        "orgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8",
        "shortName": "Zabbix"
      },
      "references": [
        {
          "url": "https://support.zabbix.com/browse/ZBX-22002"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "value": "To remediate this vulnerability, apply the updates listed in the \u0027Unaffected\u0027 section to appropriate products or use the workaround"
        }
      ],
      "source": {
        "discovery": "INTERNAL"
      },
      "title": "Zabbix Agent installer adds \u201callow all TCP any any\u201d firewall rule",
      "workarounds": [
        {
          "lang": "en",
          "value": "If an immediate update is not possible, change the applied local firewall rule to allow the agent port only."
        }
      ],
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8",
    "assignerShortName": "Zabbix",
    "cveId": "CVE-2022-43516",
    "datePublished": "2022-12-12T01:49:10.008967Z",
    "dateReserved": "2022-10-19T00:00:00",
    "dateUpdated": "2024-09-16T20:22:44.845Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2011-3264
Vulnerability from cvelistv5
Published
2011-08-19 21:00
Modified
2024-08-06 23:29
Severity ?
Summary
Zabbix before 1.8.6 allows remote attackers to obtain sensitive information via an invalid srcfld2 parameter to popup.php, which reveals the installation path in an error message.
References
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T23:29:56.401Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://support.zabbix.com/browse/ZBX-3840"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.zabbix.com/rn1.8.6.php"
          },
          {
            "name": "zabbix-popup-path-dsiclsoure(69377)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69377"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-08-04T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Zabbix before 1.8.6 allows remote attackers to obtain sensitive information via an invalid srcfld2 parameter to popup.php, which reveals the installation path in an error message."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-28T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://support.zabbix.com/browse/ZBX-3840"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.zabbix.com/rn1.8.6.php"
        },
        {
          "name": "zabbix-popup-path-dsiclsoure(69377)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69377"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2011-3264",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Zabbix before 1.8.6 allows remote attackers to obtain sensitive information via an invalid srcfld2 parameter to popup.php, which reveals the installation path in an error message."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://support.zabbix.com/browse/ZBX-3840",
              "refsource": "CONFIRM",
              "url": "https://support.zabbix.com/browse/ZBX-3840"
            },
            {
              "name": "http://www.zabbix.com/rn1.8.6.php",
              "refsource": "CONFIRM",
              "url": "http://www.zabbix.com/rn1.8.6.php"
            },
            {
              "name": "zabbix-popup-path-dsiclsoure(69377)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69377"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2011-3264",
    "datePublished": "2011-08-19T21:00:00",
    "dateReserved": "2011-08-19T00:00:00",
    "dateUpdated": "2024-08-06T23:29:56.401Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2023-29452
Vulnerability from cvelistv5
Published
2023-07-13 09:29
Modified
2024-10-22 16:23
Summary
Currently, geomap configuration (Administration -> General -> Geographical maps) allows using HTML in the field “Attribution text” when selected “Other” Tile provider.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T14:07:46.290Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://support.zabbix.com/browse/ZBX-22981"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-29452",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-22T16:21:55.147830Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-22T16:23:20.957Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "affected",
          "modules": [
            "Frontend"
          ],
          "product": "Zabbix",
          "repo": "https://git.zabbix.com/",
          "vendor": "Zabbix",
          "versions": [
            {
              "changes": [
                {
                  "at": "6.0.18rc1",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.0.17",
              "status": "affected",
              "version": "6.0.0",
              "versionType": "git"
            },
            {
              "changes": [
                {
                  "at": "6.4.2rc1",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.4.2",
              "status": "affected",
              "version": "6.4.0",
              "versionType": "git"
            },
            {
              "changes": [
                {
                  "at": "7.0.0alpha1",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "7.0.0alpha1",
              "status": "affected",
              "version": "7.0.0",
              "versionType": "git"
            }
          ]
        }
      ],
      "datePublic": "2023-06-16T08:53:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eCurrently, geomap configuration (Administration -\u0026gt; General -\u0026gt; Geographical maps) allows using HTML in the field \u201cAttribution text\u201d when selected \u201cOther\u201d Tile provider.\u003c/span\u003e\n\n"
            }
          ],
          "value": "\nCurrently, geomap configuration (Administration -\u003e General -\u003e Geographical maps) allows using HTML in the field \u201cAttribution text\u201d when selected \u201cOther\u201d Tile provider.\n\n"
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-148",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-148 Content Spoofing"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-20",
              "description": "CWE-20 Improper Input Validation",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-07-13T10:03:20.357Z",
        "orgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8",
        "shortName": "Zabbix"
      },
      "references": [
        {
          "url": "https://support.zabbix.com/browse/ZBX-22981"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Remove possibility to add html into Geomap attribution field",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8",
    "assignerShortName": "Zabbix",
    "cveId": "CVE-2023-29452",
    "datePublished": "2023-07-13T09:29:55.833Z",
    "dateReserved": "2023-04-06T18:04:44.892Z",
    "dateUpdated": "2024-10-22T16:23:20.957Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2013-3628
Vulnerability from cvelistv5
Published
2020-02-07 14:19
Modified
2024-08-06 16:14
Severity ?
Summary
Zabbix 2.0.9 has an Arbitrary Command Execution Vulnerability
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T16:14:56.579Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://community.rapid7.com/community/metasploit/blog/2013/10/30/seven-tricks-and-treats"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://community.rapid7.com/community/metasploit/blog/2013/10/30/seven-foss-disclosures-part-one"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/63453"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.exploit-db.com/exploits/29321"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Zabbix",
          "vendor": "Zabbix",
          "versions": [
            {
              "status": "affected",
              "version": "2.0.9"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Zabbix 2.0.9 has an Arbitrary Command Execution Vulnerability"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Arbitrary Command Execution Vulnerability",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-02-07T14:19:00",
        "orgId": "37e5125f-f79b-445b-8fad-9564f167944b",
        "shortName": "certcc"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://community.rapid7.com/community/metasploit/blog/2013/10/30/seven-tricks-and-treats"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://community.rapid7.com/community/metasploit/blog/2013/10/30/seven-foss-disclosures-part-one"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.securityfocus.com/bid/63453"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.exploit-db.com/exploits/29321"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cert@cert.org",
          "ID": "CVE-2013-3628",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Zabbix",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "2.0.9"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Zabbix"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Zabbix 2.0.9 has an Arbitrary Command Execution Vulnerability"
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Arbitrary Command Execution Vulnerability"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://community.rapid7.com/community/metasploit/blog/2013/10/30/seven-tricks-and-treats",
              "refsource": "MISC",
              "url": "https://community.rapid7.com/community/metasploit/blog/2013/10/30/seven-tricks-and-treats"
            },
            {
              "name": "https://community.rapid7.com/community/metasploit/blog/2013/10/30/seven-foss-disclosures-part-one",
              "refsource": "MISC",
              "url": "https://community.rapid7.com/community/metasploit/blog/2013/10/30/seven-foss-disclosures-part-one"
            },
            {
              "name": "http://www.securityfocus.com/bid/63453",
              "refsource": "MISC",
              "url": "http://www.securityfocus.com/bid/63453"
            },
            {
              "name": "http://www.exploit-db.com/exploits/29321",
              "refsource": "MISC",
              "url": "http://www.exploit-db.com/exploits/29321"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b",
    "assignerShortName": "certcc",
    "cveId": "CVE-2013-3628",
    "datePublished": "2020-02-07T14:19:00",
    "dateReserved": "2013-05-21T00:00:00",
    "dateUpdated": "2024-08-06T16:14:56.579Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2023-32728
Vulnerability from cvelistv5
Published
2023-12-18 09:19
Modified
2024-11-27 20:43
Summary
The Zabbix Agent 2 item key smart.disk.get does not sanitize its parameters before passing them to a shell command resulting possible vulnerability for remote code execution.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T15:25:36.700Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://support.zabbix.com/browse/ZBX-23858"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-32728",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-27T20:43:15.626286Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-27T20:43:26.283Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "modules": [
            "Agent 2"
          ],
          "product": "Zabbix",
          "repo": "https://git.zabbix.com/",
          "vendor": "Zabbix",
          "versions": [
            {
              "changes": [
                {
                  "at": "5.0.39rc1",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.0.38",
              "status": "affected",
              "version": "5,0,0",
              "versionType": "git"
            },
            {
              "changes": [
                {
                  "at": "6.0.24rc1",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.0.23",
              "status": "affected",
              "version": "6.0.0",
              "versionType": "git"
            },
            {
              "changes": [
                {
                  "at": "6.4.9rc1",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.4.8 ",
              "status": "affected",
              "version": "6.4.0",
              "versionType": "git"
            },
            {
              "changes": [
                {
                  "at": "7.0.0alpha8",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "7.0.0alpha7 ",
              "status": "affected",
              "version": "7.0.0alpha1",
              "versionType": "git"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "This vulnerability is reported in HackerOne bounty hunter platform by Philippe Antoine (catenacyber)"
        }
      ],
      "datePublic": "2023-11-06T13:14:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "The Zabbix Agent 2 item key smart.disk.get does not sanitize its parameters before passing them to a shell command resulting possible vulnerability for remote code execution."
            }
          ],
          "value": "The Zabbix Agent 2 item key smart.disk.get does not sanitize its parameters before passing them to a shell command resulting possible vulnerability for remote code execution."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-253",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-253 Remote Code Inclusion"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 4.6,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-20",
              "description": "CWE-20 Improper Input Validation",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-12-18T09:19:51.507Z",
        "orgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8",
        "shortName": "Zabbix"
      },
      "references": [
        {
          "url": "https://support.zabbix.com/browse/ZBX-23858"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "Code injection in zabbix_agent2 smart.disk.get caused by smartctl plugin",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8",
    "assignerShortName": "Zabbix",
    "cveId": "CVE-2023-32728",
    "datePublished": "2023-12-18T09:19:51.507Z",
    "dateReserved": "2023-05-11T21:25:43.368Z",
    "dateUpdated": "2024-11-27T20:43:26.283Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2023-32724
Vulnerability from cvelistv5
Published
2023-10-12 06:14
Modified
2024-09-17 13:53
Severity ?
Summary
Memory pointer is in a property of the Ducktape object. This leads to multiple vulnerabilities related to direct memory access and manipulation.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T15:25:36.701Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://support.zabbix.com/browse/ZBX-23391"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-32724",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-09-17T13:43:17.431115Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-09-17T13:53:20.580Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "modules": [
            "Proxy",
            "Server"
          ],
          "product": "Zabbix",
          "repo": "https://git.zabbix.com/",
          "vendor": "Zabbix",
          "versions": [
            {
              "changes": [
                {
                  "at": "5.0.37rc1",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.0.36",
              "status": "affected",
              "version": "5.0.0",
              "versionType": "git"
            },
            {
              "changes": [
                {
                  "at": "6.0.21rc1",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.0.20",
              "status": "affected",
              "version": "6.0.0",
              "versionType": "git"
            },
            {
              "changes": [
                {
                  "at": "6.4.6rc1",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.4.5",
              "status": "affected",
              "version": "6.4.0",
              "versionType": "git"
            },
            {
              "changes": [
                {
                  "at": "7.0.0alpha4",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "7.0.0alpha3",
              "status": "affected",
              "version": "7.0.0alpha1",
              "versionType": "git"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "This vulnerability is found by Pavel Voit (pavelvoit) from HackerOne community."
        }
      ],
      "datePublic": "2023-09-11T10:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Memory pointer is in a property of the Ducktape object. This leads to multiple vulnerabilities related to direct memory access and manipulation."
            }
          ],
          "value": "Memory pointer is in a property of the Ducktape object. This leads to multiple vulnerabilities related to direct memory access and manipulation."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-253",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-253 Remote Code Inclusion"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.1,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-732",
              "description": "CWE-732 Incorrect Permission Assignment for Critical Resource",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-10-12T06:14:45.978Z",
        "orgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8",
        "shortName": "Zabbix"
      },
      "references": [
        {
          "url": "https://support.zabbix.com/browse/ZBX-23391"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "JavaScript engine memory pointers are directly available for Zabbix users for modification",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8",
    "assignerShortName": "Zabbix",
    "cveId": "CVE-2023-32724",
    "datePublished": "2023-10-12T06:14:45.978Z",
    "dateReserved": "2023-05-11T21:25:43.368Z",
    "dateUpdated": "2024-09-17T13:53:20.580Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2016-4338
Vulnerability from cvelistv5
Published
2017-01-23 21:00
Modified
2024-08-06 00:25
Severity ?
Summary
The mysql user parameter configuration script (userparameter_mysql.conf) in the agent in Zabbix before 2.0.18, 2.2.x before 2.2.13, and 3.0.x before 3.0.3, when used with a shell other than bash, allows context-dependent attackers to execute arbitrary code or SQL commands via the mysql.size parameter.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T00:25:14.512Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://packetstormsecurity.com/files/136898/Zabbix-Agent-3.0.1-mysql.size-Shell-Command-Injection.html"
          },
          {
            "name": "39769",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "https://www.exploit-db.com/exploits/39769/"
          },
          {
            "name": "20160503 CVE-2016-4338: Zabbix Agent 3.0.1 mysql.size shell command injection",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/538258/100/0/threaded"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://support.zabbix.com/browse/ZBX-10741"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.zabbix.com/documentation/2.2/manual/introduction/whatsnew2213#miscellaneous_improvements"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.zabbix.com/documentation/3.0/manual/introduction/whatsnew303#miscellaneous_improvements"
          },
          {
            "name": "20160503 CVE-2016-4338: Zabbix Agent 3.0.1 mysql.size shell command injection",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2016/May/9"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.zabbix.com/documentation/2.0/manual/introduction/whatsnew2018#miscellaneous_improvements"
          },
          {
            "name": "89631",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/89631"
          },
          {
            "name": "GLSA-201612-42",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "https://security.gentoo.org/glsa/201612-42"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2016-05-03T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The mysql user parameter configuration script (userparameter_mysql.conf) in the agent in Zabbix before 2.0.18, 2.2.x before 2.2.13, and 3.0.x before 3.0.3, when used with a shell other than bash, allows context-dependent attackers to execute arbitrary code or SQL commands via the mysql.size parameter."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-09T18:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://packetstormsecurity.com/files/136898/Zabbix-Agent-3.0.1-mysql.size-Shell-Command-Injection.html"
        },
        {
          "name": "39769",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "https://www.exploit-db.com/exploits/39769/"
        },
        {
          "name": "20160503 CVE-2016-4338: Zabbix Agent 3.0.1 mysql.size shell command injection",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/538258/100/0/threaded"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://support.zabbix.com/browse/ZBX-10741"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.zabbix.com/documentation/2.2/manual/introduction/whatsnew2213#miscellaneous_improvements"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.zabbix.com/documentation/3.0/manual/introduction/whatsnew303#miscellaneous_improvements"
        },
        {
          "name": "20160503 CVE-2016-4338: Zabbix Agent 3.0.1 mysql.size shell command injection",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://seclists.org/fulldisclosure/2016/May/9"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.zabbix.com/documentation/2.0/manual/introduction/whatsnew2018#miscellaneous_improvements"
        },
        {
          "name": "89631",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/89631"
        },
        {
          "name": "GLSA-201612-42",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "https://security.gentoo.org/glsa/201612-42"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2016-4338",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The mysql user parameter configuration script (userparameter_mysql.conf) in the agent in Zabbix before 2.0.18, 2.2.x before 2.2.13, and 3.0.x before 3.0.3, when used with a shell other than bash, allows context-dependent attackers to execute arbitrary code or SQL commands via the mysql.size parameter."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://packetstormsecurity.com/files/136898/Zabbix-Agent-3.0.1-mysql.size-Shell-Command-Injection.html",
              "refsource": "MISC",
              "url": "http://packetstormsecurity.com/files/136898/Zabbix-Agent-3.0.1-mysql.size-Shell-Command-Injection.html"
            },
            {
              "name": "39769",
              "refsource": "EXPLOIT-DB",
              "url": "https://www.exploit-db.com/exploits/39769/"
            },
            {
              "name": "20160503 CVE-2016-4338: Zabbix Agent 3.0.1 mysql.size shell command injection",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/538258/100/0/threaded"
            },
            {
              "name": "https://support.zabbix.com/browse/ZBX-10741",
              "refsource": "CONFIRM",
              "url": "https://support.zabbix.com/browse/ZBX-10741"
            },
            {
              "name": "https://www.zabbix.com/documentation/2.2/manual/introduction/whatsnew2213#miscellaneous_improvements",
              "refsource": "CONFIRM",
              "url": "https://www.zabbix.com/documentation/2.2/manual/introduction/whatsnew2213#miscellaneous_improvements"
            },
            {
              "name": "https://www.zabbix.com/documentation/3.0/manual/introduction/whatsnew303#miscellaneous_improvements",
              "refsource": "CONFIRM",
              "url": "https://www.zabbix.com/documentation/3.0/manual/introduction/whatsnew303#miscellaneous_improvements"
            },
            {
              "name": "20160503 CVE-2016-4338: Zabbix Agent 3.0.1 mysql.size shell command injection",
              "refsource": "FULLDISC",
              "url": "http://seclists.org/fulldisclosure/2016/May/9"
            },
            {
              "name": "https://www.zabbix.com/documentation/2.0/manual/introduction/whatsnew2018#miscellaneous_improvements",
              "refsource": "CONFIRM",
              "url": "https://www.zabbix.com/documentation/2.0/manual/introduction/whatsnew2018#miscellaneous_improvements"
            },
            {
              "name": "89631",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/89631"
            },
            {
              "name": "GLSA-201612-42",
              "refsource": "GENTOO",
              "url": "https://security.gentoo.org/glsa/201612-42"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2016-4338",
    "datePublished": "2017-01-23T21:00:00",
    "dateReserved": "2016-04-27T00:00:00",
    "dateUpdated": "2024-08-06T00:25:14.512Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2011-3265
Vulnerability from cvelistv5
Published
2011-08-19 21:00
Modified
2024-08-06 23:29
Severity ?
Summary
popup.php in Zabbix before 1.8.7 allows remote attackers to read the contents of arbitrary database tables via a modified srctbl parameter.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T23:29:56.536Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://support.zabbix.com/browse/ZBX-3840"
          },
          {
            "name": "FEDORA-2011-12489",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066092.html"
          },
          {
            "name": "49277",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/49277"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://support.zabbix.com/browse/ZBX-3955"
          },
          {
            "name": "zabbix-popup-path-disclosure(69376)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69376"
          },
          {
            "name": "FEDORA-2011-12485",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066110.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-05-25T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "popup.php in Zabbix before 1.8.7 allows remote attackers to read the contents of arbitrary database tables via a modified srctbl parameter."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-28T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://support.zabbix.com/browse/ZBX-3840"
        },
        {
          "name": "FEDORA-2011-12489",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066092.html"
        },
        {
          "name": "49277",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/49277"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://support.zabbix.com/browse/ZBX-3955"
        },
        {
          "name": "zabbix-popup-path-disclosure(69376)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69376"
        },
        {
          "name": "FEDORA-2011-12485",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066110.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2011-3265",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "popup.php in Zabbix before 1.8.7 allows remote attackers to read the contents of arbitrary database tables via a modified srctbl parameter."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://support.zabbix.com/browse/ZBX-3840",
              "refsource": "CONFIRM",
              "url": "https://support.zabbix.com/browse/ZBX-3840"
            },
            {
              "name": "FEDORA-2011-12489",
              "refsource": "FEDORA",
              "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066092.html"
            },
            {
              "name": "49277",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/49277"
            },
            {
              "name": "https://support.zabbix.com/browse/ZBX-3955",
              "refsource": "CONFIRM",
              "url": "https://support.zabbix.com/browse/ZBX-3955"
            },
            {
              "name": "zabbix-popup-path-disclosure(69376)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69376"
            },
            {
              "name": "FEDORA-2011-12485",
              "refsource": "FEDORA",
              "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066110.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2011-3265",
    "datePublished": "2011-08-19T21:00:00",
    "dateReserved": "2011-08-19T00:00:00",
    "dateUpdated": "2024-08-06T23:29:56.536Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2012-6086
Vulnerability from cvelistv5
Published
2014-01-29 18:00
Modified
2024-08-06 21:21
Severity ?
Summary
libs/zbxmedia/eztexting.c in Zabbix 1.8.x before 1.8.18rc1, 2.0.x before 2.0.8rc1, and 2.1.x before 2.1.2 does not properly set the CURLOPT_SSL_VERIFYHOST option for libcurl, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
References
http://www.securityfocus.com/bid/57103vdb-entry, x_refsource_BID
https://support.zabbix.com/browse/ZBX-5924x_refsource_CONFIRM
http://www.openwall.com/lists/oss-security/2013/01/03/1mailing-list, x_refsource_MLIST
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T21:21:28.456Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "57103",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/57103"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://support.zabbix.com/browse/ZBX-5924"
          },
          {
            "name": "[oss-security] 20130103 Re: CVE request: Curl insecure usage",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2013/01/03/1"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-12-02T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "libs/zbxmedia/eztexting.c in Zabbix 1.8.x before 1.8.18rc1, 2.0.x before 2.0.8rc1, and 2.1.x before 2.1.2 does not properly set the CURLOPT_SSL_VERIFYHOST option for libcurl, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2015-05-04T18:57:00",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "57103",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/57103"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://support.zabbix.com/browse/ZBX-5924"
        },
        {
          "name": "[oss-security] 20130103 Re: CVE request: Curl insecure usage",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2013/01/03/1"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2012-6086",
    "datePublished": "2014-01-29T18:00:00",
    "dateReserved": "2012-12-06T00:00:00",
    "dateUpdated": "2024-08-06T21:21:28.456Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2024-36463
Vulnerability from cvelistv5
Published
2024-11-26 15:06
Modified
2024-11-26 16:21
Summary
The implementation of atob in "Zabbix JS" allows to create a string with arbitrary content and use it to access internal properties of objects.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-36463",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-26T16:21:34.528363Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-26T16:21:54.142Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "modules": [
            "Proxy",
            "Server"
          ],
          "product": "Zabbix",
          "repo": "https://git.zabbix.com/",
          "vendor": "Zabbix",
          "versions": [
            {
              "changes": [
                {
                  "at": "5.0.43rc1",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.0.42",
              "status": "affected",
              "version": "5.0.0",
              "versionType": "git"
            },
            {
              "changes": [
                {
                  "at": "6.0.33rc1",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.0.32",
              "status": "affected",
              "version": "6.0.0",
              "versionType": "git"
            },
            {
              "changes": [
                {
                  "at": "6.4.18rc1",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.4.17",
              "status": "affected",
              "version": "6.4.0",
              "versionType": "git"
            },
            {
              "changes": [
                {
                  "at": "7.0.3rc1",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "7.0.2",
              "status": "affected",
              "version": "7.0.0",
              "versionType": "git"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "value": "Zabbix wants to thank zhutyra for submitting this report on the HackerOne bug bounty platform."
        }
      ],
      "datePublic": "2024-09-05T07:45:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "The implementation of atob in \"Zabbix JS\" allows to create a string with arbitrary content and use it to access internal properties of objects."
            }
          ],
          "value": "The implementation of atob in \"Zabbix JS\" allows to create a string with arbitrary content and use it to access internal properties of objects."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-253",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-253 Remote Code Inclusion"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-767",
              "description": "CWE-767 Access to Critical Private Variable via Public Method",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-11-26T15:06:14.217Z",
        "orgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8",
        "shortName": "Zabbix"
      },
      "references": [
        {
          "url": "https://support.zabbix.com/browse/ZBX-25611"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8",
    "assignerShortName": "Zabbix",
    "cveId": "CVE-2024-36463",
    "datePublished": "2024-11-26T15:06:14.217Z",
    "dateReserved": "2024-05-28T11:21:24.946Z",
    "dateUpdated": "2024-11-26T16:21:54.142Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2021-27927
Vulnerability from cvelistv5
Published
2021-03-03 00:00
Modified
2024-08-03 21:33
Severity ?
Summary
In Zabbix from 4.0.x before 4.0.28rc1, 5.0.0alpha1 before 5.0.10rc1, 5.2.x before 5.2.6rc1, and 5.4.0alpha1 before 5.4.0beta2, the CControllerAuthenticationUpdate controller lacks a CSRF protection mechanism. The code inside this controller calls diableSIDValidation inside the init() method. An attacker doesn't have to know Zabbix user login credentials, but has to know the correct Zabbix URL and contact information of an existing user with sufficient privileges.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T21:33:16.680Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://support.zabbix.com/browse/ZBX-18942"
          },
          {
            "name": "[debian-lts-announce] 20230412 [SECURITY] [DLA 3390-1] zabbix security update",
            "tags": [
              "mailing-list",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00013.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "In Zabbix from 4.0.x before 4.0.28rc1, 5.0.0alpha1 before 5.0.10rc1, 5.2.x before 5.2.6rc1, and 5.4.0alpha1 before 5.4.0beta2, the CControllerAuthenticationUpdate controller lacks a CSRF protection mechanism. The code inside this controller calls diableSIDValidation inside the init() method. An attacker doesn\u0027t have to know Zabbix user login credentials, but has to know the correct Zabbix URL and contact information of an existing user with sufficient privileges."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-04-12T00:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "https://support.zabbix.com/browse/ZBX-18942"
        },
        {
          "name": "[debian-lts-announce] 20230412 [SECURITY] [DLA 3390-1] zabbix security update",
          "tags": [
            "mailing-list"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00013.html"
        }
      ],
      "source": {
        "discovery": "INTERNAL"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2021-27927",
    "datePublished": "2021-03-03T00:00:00",
    "dateReserved": "2021-03-03T00:00:00",
    "dateUpdated": "2024-08-03T21:33:16.680Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2013-7484
Vulnerability from cvelistv5
Published
2019-11-30 00:00
Modified
2024-08-06 18:09
Severity ?
Summary
Zabbix before 5.0 represents passwords in the users table with unsalted MD5.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T18:09:16.946Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://support.zabbix.com/browse/ZBX-16551"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://support.zabbix.com/browse/ZBXNEXT-1898"
          },
          {
            "name": "[debian-lts-announce] 20230822 [SECURITY] [DLA 3538-1] zabbix security update",
            "tags": [
              "mailing-list",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00027.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Zabbix before 5.0 represents passwords in the users table with unsalted MD5."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-08-22T15:06:19.080387",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "https://support.zabbix.com/browse/ZBX-16551"
        },
        {
          "url": "https://support.zabbix.com/browse/ZBXNEXT-1898"
        },
        {
          "name": "[debian-lts-announce] 20230822 [SECURITY] [DLA 3538-1] zabbix security update",
          "tags": [
            "mailing-list"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00027.html"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2013-7484",
    "datePublished": "2019-11-30T00:00:00",
    "dateReserved": "2019-11-30T00:00:00",
    "dateUpdated": "2024-08-06T18:09:16.946Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2024-36464
Vulnerability from cvelistv5
Published
2024-11-27 14:01
Modified
2024-11-27 14:28
Summary
When exporting media types, the password is exported in the YAML in plain text. This appears to be a best practices type issue and may have no actual impact. The user would need to have permissions to access the media types and therefore would be expected to have access to these passwords.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-36464",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-27T14:27:15.357237Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-27T14:28:40.384Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "modules": [
            "API",
            "Frontend",
            "Server"
          ],
          "product": "Zabbix",
          "repo": "https://git.zabbix.com/",
          "vendor": "Zabbix",
          "versions": [
            {
              "changes": [
                {
                  "at": "6.0.30rc1",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.0.29",
              "status": "affected",
              "version": "6.0.0",
              "versionType": "git"
            },
            {
              "changes": [
                {
                  "at": "6.4.16rc1",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.4.15",
              "status": "affected",
              "version": "6.4.0",
              "versionType": "git"
            },
            {
              "changes": [
                {
                  "at": "7.0.1rc1",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "7.0.0",
              "status": "affected",
              "version": "7.0.0alpha1",
              "versionType": "git"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "value": "Zabbix wants to thank Jayateertha G for submitting this report on the HackerOne bug bounty platform."
        }
      ],
      "datePublic": "2024-10-30T13:37:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "When exporting media types, the password is exported in the YAML in plain text. This appears to be a best practices type issue and may have no actual impact. The user would need to have permissions to access the media types and therefore would be expected to have access to these passwords."
            }
          ],
          "value": "When exporting media types, the password is exported in the YAML in plain text. This appears to be a best practices type issue and may have no actual impact. The user would need to have permissions to access the media types and therefore would be expected to have access to these passwords."
        }
      ],
      "impacts": [
        {
          "descriptions": [
            {
              "lang": "en",
              "value": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 2.7,
            "baseSeverity": "LOW",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-256",
              "description": "CWE-256 Plaintext Storage of a Password",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-11-27T14:01:58.136Z",
        "orgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8",
        "shortName": "Zabbix"
      },
      "references": [
        {
          "url": "https://support.zabbix.com/browse/ZBX-25630"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "Media Types: Office365, SMTP passwords are unencrypted and visible in plaintext when exported",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8",
    "assignerShortName": "Zabbix",
    "cveId": "CVE-2024-36464",
    "datePublished": "2024-11-27T14:01:58.136Z",
    "dateReserved": "2024-05-28T11:21:24.946Z",
    "dateUpdated": "2024-11-27T14:28:40.384Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2022-35229
Vulnerability from cvelistv5
Published
2022-07-06 11:05
Modified
2024-09-16 22:36
Summary
An authenticated user can create a link with reflected Javascript code inside it for the discovery page and send it to other users. The payload can be executed only with a known CSRF token value of the victim, which is changed periodically and is difficult to predict.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T09:29:17.467Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://support.zabbix.com/browse/ZBX-21306"
          },
          {
            "name": "[debian-lts-announce] 20230412 [SECURITY] [DLA 3390-1] zabbix security update",
            "tags": [
              "mailing-list",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00013.html"
          },
          {
            "name": "[debian-lts-announce] 20230822 [SECURITY] [DLA 3538-1] zabbix security update",
            "tags": [
              "mailing-list",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00027.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Frontend",
          "vendor": "Zabbix",
          "versions": [
            {
              "status": "affected",
              "version": "4.0.0-4.0.42"
            },
            {
              "status": "affected",
              "version": "5.0.0-5.0.24"
            },
            {
              "status": "affected",
              "version": "6.0.0-6.0.4"
            },
            {
              "status": "affected",
              "version": "6.2alpha1-6.2beta3"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "internal research"
        }
      ],
      "datePublic": "2022-04-27T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "An authenticated user can create a link with reflected Javascript code inside it for the discovery page and send it to other users. The payload can be executed only with a known CSRF token value of the victim, which is changed periodically and is difficult to predict."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 3.7,
            "baseSeverity": "LOW",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-79",
              "description": "CWE-79 Cross-site Scripting (XSS)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-08-22T15:06:20.620530",
        "orgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8",
        "shortName": "Zabbix"
      },
      "references": [
        {
          "url": "https://support.zabbix.com/browse/ZBX-21306"
        },
        {
          "name": "[debian-lts-announce] 20230412 [SECURITY] [DLA 3390-1] zabbix security update",
          "tags": [
            "mailing-list"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00013.html"
        },
        {
          "name": "[debian-lts-announce] 20230822 [SECURITY] [DLA 3538-1] zabbix security update",
          "tags": [
            "mailing-list"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00027.html"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "value": "To remediate this vulnerability, apply the updates"
        }
      ],
      "source": {
        "discovery": "INTERNAL"
      },
      "title": "Reflected XSS in discovery page of Zabbix Frontend",
      "workarounds": [
        {
          "lang": "en",
          "value": "The vulnerability can be exploited only by authenticated users. If an immediate update is not possible, review user access rights to your Zabbix Frontend, be attentive to browser warnings and always check any links you can receive via email or other means of communication, which lead to the discoveryconf.php page of Zabbix Frontend and contain suspicious parameters with special symbols. If you have clicked on the suspicious link, do not fill out the opened form."
        }
      ],
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8",
    "assignerShortName": "Zabbix",
    "cveId": "CVE-2022-35229",
    "datePublished": "2022-07-06T11:05:12.493372Z",
    "dateReserved": "2022-07-05T00:00:00",
    "dateUpdated": "2024-09-16T22:36:46.204Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2023-29454
Vulnerability from cvelistv5
Published
2023-07-13 09:30
Modified
2024-10-21 21:10
Summary
Stored or persistent cross-site scripting (XSS) is a type of XSS where the attacker first sends the payload to the web application, then the application saves the payload (e.g., in a database or server-side text files), and finally, the application unintentionally executes the payload for every victim visiting its web pages.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T14:07:46.221Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://support.zabbix.com/browse/ZBX-22985"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00027.html"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-29454",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-21T21:06:47.259753Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-21T21:10:04.632Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "affected",
          "modules": [
            "Frontend"
          ],
          "product": "Zabbix",
          "repo": "https://git.zabbix.com/",
          "vendor": "Zabbix",
          "versions": [
            {
              "changes": [
                {
                  "at": "4.0.46rc1",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "4.0.45",
              "status": "affected",
              "version": "4.0.0",
              "versionType": "git"
            },
            {
              "changes": [
                {
                  "at": "5.0.35rc1",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.0.33",
              "status": "affected",
              "version": "5.0.0",
              "versionType": "git"
            },
            {
              "changes": [
                {
                  "at": "6.0.18rc1",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.0.16",
              "status": "affected",
              "version": "6.0.0",
              "versionType": "git"
            }
          ]
        }
      ],
      "datePublic": "2023-06-16T10:42:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": " Stored or persistent cross-site scripting (XSS) is a type of XSS where the attacker first sends the payload to the web application, then the application saves the payload (e.g., in a database or server-side text files), and finally, the application unintentionally executes the payload for every victim visiting its web pages."
            }
          ],
          "value": " Stored or persistent cross-site scripting (XSS) is a type of XSS where the attacker first sends the payload to the web application, then the application saves the payload (e.g., in a database or server-side text files), and finally, the application unintentionally executes the payload for every victim visiting its web pages."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-592",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-592 Stored XSS"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:H/I:L/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-20",
              "description": "CWE-20 Improper Input Validation",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-07-13T09:30:27.523Z",
        "orgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8",
        "shortName": "Zabbix"
      },
      "references": [
        {
          "url": "https://support.zabbix.com/browse/ZBX-22985"
        },
        {
          "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00027.html"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Persistent XSS in the user form",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8",
    "assignerShortName": "Zabbix",
    "cveId": "CVE-2023-29454",
    "datePublished": "2023-07-13T09:30:27.523Z",
    "dateReserved": "2023-04-06T18:04:44.892Z",
    "dateUpdated": "2024-10-21T21:10:04.632Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2006-6692
Vulnerability from cvelistv5
Published
2006-12-21 21:00
Modified
2024-08-07 20:34
Severity ?
Summary
Multiple format string vulnerabilities in zabbix before 20061006 allow attackers to cause a denial of service (application crash) and possibly execute arbitrary code via format string specifiers in information that would be recorded in the system log using (1) zabbix_log or (2) zabbix_syslog.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T20:34:00.541Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "ADV-2006-3959",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/3959"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi/zabbix.security.patch?bug=391388%3Bmsg=5%3Batt=1"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=391388"
          },
          {
            "name": "20416",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/20416"
          },
          {
            "name": "22313",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/22313"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-10-06T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple format string vulnerabilities in zabbix before 20061006 allow attackers to cause a denial of service (application crash) and possibly execute arbitrary code via format string specifiers in information that would be recorded in the system log using (1) zabbix_log or (2) zabbix_syslog."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2009-02-26T10:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "ADV-2006-3959",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/3959"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi/zabbix.security.patch?bug=391388%3Bmsg=5%3Batt=1"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=391388"
        },
        {
          "name": "20416",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/20416"
        },
        {
          "name": "22313",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/22313"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-6692",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple format string vulnerabilities in zabbix before 20061006 allow attackers to cause a denial of service (application crash) and possibly execute arbitrary code via format string specifiers in information that would be recorded in the system log using (1) zabbix_log or (2) zabbix_syslog."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "ADV-2006-3959",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/3959"
            },
            {
              "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi/zabbix.security.patch?bug=391388;msg=5;att=1",
              "refsource": "CONFIRM",
              "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi/zabbix.security.patch?bug=391388;msg=5;att=1"
            },
            {
              "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=391388",
              "refsource": "CONFIRM",
              "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=391388"
            },
            {
              "name": "20416",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/20416"
            },
            {
              "name": "22313",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/22313"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-6692",
    "datePublished": "2006-12-21T21:00:00",
    "dateReserved": "2006-12-21T00:00:00",
    "dateUpdated": "2024-08-07T20:34:00.541Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2009-4501
Vulnerability from cvelistv5
Published
2009-12-31 18:00
Modified
2024-09-17 01:37
Severity ?
Summary
The zbx_get_next_field function in libs/zbxcommon/str.c in Zabbix Server before 1.6.8 allows remote attackers to cause a denial of service (crash) via a request that lacks expected separators, which triggers a NULL pointer dereference, as demonstrated using the Command keyword.
References
http://www.securityfocus.com/archive/1/508436/30/60/threadedmailing-list, x_refsource_BUGTRAQ
https://support.zabbix.com/browse/ZBX-1355x_refsource_CONFIRM
http://secunia.com/advisories/37740third-party-advisory, x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2009/3514vdb-entry, x_refsource_VUPEN
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T07:08:36.835Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20091213 Zabbix Server : Multiple remote vulnerabilities",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/508436/30/60/threaded"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://support.zabbix.com/browse/ZBX-1355"
          },
          {
            "name": "37740",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/37740"
          },
          {
            "name": "ADV-2009-3514",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/3514"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The zbx_get_next_field function in libs/zbxcommon/str.c in Zabbix Server before 1.6.8 allows remote attackers to cause a denial of service (crash) via a request that lacks expected separators, which triggers a NULL pointer dereference, as demonstrated using the Command keyword."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2009-12-31T18:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "20091213 Zabbix Server : Multiple remote vulnerabilities",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/508436/30/60/threaded"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://support.zabbix.com/browse/ZBX-1355"
        },
        {
          "name": "37740",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/37740"
        },
        {
          "name": "ADV-2009-3514",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/3514"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-4501",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The zbx_get_next_field function in libs/zbxcommon/str.c in Zabbix Server before 1.6.8 allows remote attackers to cause a denial of service (crash) via a request that lacks expected separators, which triggers a NULL pointer dereference, as demonstrated using the Command keyword."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20091213 Zabbix Server : Multiple remote vulnerabilities",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/508436/30/60/threaded"
            },
            {
              "name": "https://support.zabbix.com/browse/ZBX-1355",
              "refsource": "CONFIRM",
              "url": "https://support.zabbix.com/browse/ZBX-1355"
            },
            {
              "name": "37740",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/37740"
            },
            {
              "name": "ADV-2009-3514",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2009/3514"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-4501",
    "datePublished": "2009-12-31T18:00:00Z",
    "dateReserved": "2009-12-30T00:00:00Z",
    "dateUpdated": "2024-09-17T01:37:01.050Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2019-15132
Vulnerability from cvelistv5
Published
2019-08-17 00:00
Modified
2024-08-05 00:34
Severity ?
Summary
Zabbix through 4.4.0alpha1 allows User Enumeration. With login requests, it is possible to enumerate application usernames based on the variability of server responses (e.g., the "Login name or password is incorrect" and "No permissions for system access" messages, or just blocking for a number of seconds). This affects both api_jsonrpc.php and index.php.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T00:34:53.334Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://support.zabbix.com/browse/ZBX-16532"
          },
          {
            "name": "[debian-lts-announce] 20210421 [SECURITY] [DLA 2631-1] zabbix security update",
            "tags": [
              "mailing-list",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00018.html"
          },
          {
            "name": "[debian-lts-announce] 20230412 [SECURITY] [DLA 3390-1] zabbix security update",
            "tags": [
              "mailing-list",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00013.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Zabbix through 4.4.0alpha1 allows User Enumeration. With login requests, it is possible to enumerate application usernames based on the variability of server responses (e.g., the \"Login name or password is incorrect\" and \"No permissions for system access\" messages, or just blocking for a number of seconds). This affects both api_jsonrpc.php and index.php."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-04-12T00:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "https://support.zabbix.com/browse/ZBX-16532"
        },
        {
          "name": "[debian-lts-announce] 20210421 [SECURITY] [DLA 2631-1] zabbix security update",
          "tags": [
            "mailing-list"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00018.html"
        },
        {
          "name": "[debian-lts-announce] 20230412 [SECURITY] [DLA 3390-1] zabbix security update",
          "tags": [
            "mailing-list"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00013.html"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2019-15132",
    "datePublished": "2019-08-17T00:00:00",
    "dateReserved": "2019-08-17T00:00:00",
    "dateUpdated": "2024-08-05T00:34:53.334Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2023-29455
Vulnerability from cvelistv5
Published
2023-07-13 09:33
Modified
2024-10-21 21:09
Summary
Reflected XSS attacks, also known as non-persistent attacks, occur when a malicious script is reflected off a web application to the victim's browser. The script is activated through a link, which sends a request to a website with a vulnerability that enables execution of malicious scripts.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T14:07:46.256Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://support.zabbix.com/browse/ZBX-22986"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00027.html"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-29455",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-21T21:06:45.657463Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-21T21:09:57.121Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "affected",
          "modules": [
            "Frontend"
          ],
          "product": "Zabbix",
          "repo": "https://git.zabbix.com/",
          "vendor": "Zabbix",
          "versions": [
            {
              "changes": [
                {
                  "at": "4.0.46rc1",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "4.0.45",
              "status": "affected",
              "version": "4.0.0",
              "versionType": "git"
            },
            {
              "changes": [
                {
                  "at": "5.0.35rc1",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.0.33",
              "status": "affected",
              "version": "5.0.0",
              "versionType": "git"
            }
          ]
        }
      ],
      "datePublic": "2023-06-16T10:57:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Reflected XSS attacks, also known as non-persistent attacks, occur when a malicious script is reflected off a web application to the victim\u0027s browser. The script is activated through a link, which sends a request to a website with a vulnerability that enables execution of malicious scripts."
            }
          ],
          "value": "Reflected XSS attacks, also known as non-persistent attacks, occur when a malicious script is reflected off a web application to the victim\u0027s browser. The script is activated through a link, which sends a request to a website with a vulnerability that enables execution of malicious scripts."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-591",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-591 Reflected XSS"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 5.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-20",
              "description": "CWE-20 Improper Input Validation",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-07-13T09:33:18.965Z",
        "orgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8",
        "shortName": "Zabbix"
      },
      "references": [
        {
          "url": "https://support.zabbix.com/browse/ZBX-22986"
        },
        {
          "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00027.html"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Reflected XSS in several fields of graph form",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8",
    "assignerShortName": "Zabbix",
    "cveId": "CVE-2023-29455",
    "datePublished": "2023-07-13T09:33:18.965Z",
    "dateReserved": "2023-04-06T18:04:44.892Z",
    "dateUpdated": "2024-10-21T21:09:57.121Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2024-42332
Vulnerability from cvelistv5
Published
2024-11-27 12:06
Modified
2024-11-27 14:55
Summary
The researcher is showing that due to the way the SNMP trap log is parsed, an attacker can craft an SNMP trap with additional lines of information and have forged data show in the Zabbix UI. This attack requires SNMP auth to be off and/or the attacker to know the community/auth details. The attack requires an SNMP item to be configured as text on the target host.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-42332",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-27T14:54:59.322691Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-27T14:55:10.340Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "modules": [
            "Server"
          ],
          "product": "Zabbix",
          "repo": "https://git.zabbix.com/",
          "vendor": "Zabbix",
          "versions": [
            {
              "changes": [
                {
                  "at": "6.0.35rc1",
                  "status": "unaffected"
                }
              ],
              "lessThan": "6.0.34",
              "status": "affected",
              "version": "6.0.0",
              "versionType": "git"
            },
            {
              "changes": [
                {
                  "at": "6.4.20rc1",
                  "status": "unaffected"
                }
              ],
              "lessThan": "6.4.19",
              "status": "affected",
              "version": "6.4.0",
              "versionType": "git"
            },
            {
              "changes": [
                {
                  "at": "7.0.5rc1",
                  "status": "unaffected"
                }
              ],
              "lessThan": "7.0.4",
              "status": "affected",
              "version": "7.0.0",
              "versionType": "git"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "value": "Zabbix wants to thank chamal for submitting this report on the HackerOne bug bounty platform."
        }
      ],
      "datePublic": "2024-10-30T06:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "The researcher is showing that due to the way the SNMP trap log is parsed, an attacker can craft an SNMP trap with additional lines of information and have forged data show in the Zabbix UI. This attack requires SNMP auth to be off and/or the attacker to know the community/auth details. The attack requires an SNMP item to be configured as text on the target host."
            }
          ],
          "value": "The researcher is showing that due to the way the SNMP trap log is parsed, an attacker can craft an SNMP trap with additional lines of information and have forged data show in the Zabbix UI. This attack requires SNMP auth to be off and/or the attacker to know the community/auth details. The attack requires an SNMP item to be configured as text on the target host."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-93",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-93 Log Injection-Tampering-Forging"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 3.7,
            "baseSeverity": "LOW",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "CWE 117 Improper Output Neutralization for Logs",
              "lang": "en"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-11-27T12:06:44.515Z",
        "orgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8",
        "shortName": "Zabbix"
      },
      "references": [
        {
          "url": "https://support.zabbix.com/browse/ZBX-25628"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "New line injection in Zabbix SNMP traps",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8",
    "assignerShortName": "Zabbix",
    "cveId": "CVE-2024-42332",
    "datePublished": "2024-11-27T12:06:44.515Z",
    "dateReserved": "2024-07-30T08:27:36.132Z",
    "dateUpdated": "2024-11-27T14:55:10.340Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2014-3005
Vulnerability from cvelistv5
Published
2018-02-01 17:00
Modified
2024-08-06 10:28
Severity ?
Summary
XML external entity (XXE) vulnerability in Zabbix 1.8.x before 1.8.21rc1, 2.0.x before 2.0.13rc1, 2.2.x before 2.2.5rc1, and 2.3.x before 2.3.2 allows remote attackers to read arbitrary files or potentially execute arbitrary code via a crafted DTD in an XML request.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T10:28:46.259Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "FEDORA-2014-7594",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134885.html"
          },
          {
            "name": "68075",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/68075"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://support.zabbix.com/browse/ZBX-8151"
          },
          {
            "name": "FEDORA-2014-7603",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134909.html"
          },
          {
            "name": "20140617 [CVE-2014-3005]Zabbix 1.8.x-2.2.x Local File Inclusion via XXE Attack",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2014/Jun/87"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1110496"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://web.archive.org/web/20140622034155/http://www.pnigos.com:80/?p=273"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-04-25T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "XML external entity (XXE) vulnerability in Zabbix 1.8.x before 1.8.21rc1, 2.0.x before 2.0.13rc1, 2.2.x before 2.2.5rc1, and 2.3.x before 2.3.2 allows remote attackers to read arbitrary files or potentially execute arbitrary code via a crafted DTD in an XML request."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-02-01T16:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "FEDORA-2014-7594",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134885.html"
        },
        {
          "name": "68075",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/68075"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://support.zabbix.com/browse/ZBX-8151"
        },
        {
          "name": "FEDORA-2014-7603",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134909.html"
        },
        {
          "name": "20140617 [CVE-2014-3005]Zabbix 1.8.x-2.2.x Local File Inclusion via XXE Attack",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://seclists.org/fulldisclosure/2014/Jun/87"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1110496"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://web.archive.org/web/20140622034155/http://www.pnigos.com:80/?p=273"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2014-3005",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "XML external entity (XXE) vulnerability in Zabbix 1.8.x before 1.8.21rc1, 2.0.x before 2.0.13rc1, 2.2.x before 2.2.5rc1, and 2.3.x before 2.3.2 allows remote attackers to read arbitrary files or potentially execute arbitrary code via a crafted DTD in an XML request."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "FEDORA-2014-7594",
              "refsource": "FEDORA",
              "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134885.html"
            },
            {
              "name": "68075",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/68075"
            },
            {
              "name": "https://support.zabbix.com/browse/ZBX-8151",
              "refsource": "CONFIRM",
              "url": "https://support.zabbix.com/browse/ZBX-8151"
            },
            {
              "name": "FEDORA-2014-7603",
              "refsource": "FEDORA",
              "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134909.html"
            },
            {
              "name": "20140617 [CVE-2014-3005]Zabbix 1.8.x-2.2.x Local File Inclusion via XXE Attack",
              "refsource": "FULLDISC",
              "url": "http://seclists.org/fulldisclosure/2014/Jun/87"
            },
            {
              "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1110496",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1110496"
            },
            {
              "name": "https://web.archive.org/web/20140622034155/http://www.pnigos.com:80/?p=273",
              "refsource": "MISC",
              "url": "https://web.archive.org/web/20140622034155/http://www.pnigos.com:80/?p=273"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2014-3005",
    "datePublished": "2018-02-01T17:00:00",
    "dateReserved": "2014-04-25T00:00:00",
    "dateUpdated": "2024-08-06T10:28:46.259Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2023-32725
Vulnerability from cvelistv5
Published
2023-12-18 09:15
Modified
2024-08-02 15:25
Severity ?
Summary
The website configured in the URL widget will receive a session cookie when testing or executing scheduled reports. The received session cookie can then be used to access the frontend as the particular user.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T15:25:36.630Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://support.zabbix.com/browse/ZBX-23854"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "modules": [
            "Server",
            "Web service"
          ],
          "product": "Zabbix",
          "repo": "https://git.zabbix.com/",
          "vendor": "Zabbix",
          "versions": [
            {
              "changes": [
                {
                  "at": "6.0.22rc1",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.0.21",
              "status": "affected",
              "version": "6.0.0 ",
              "versionType": "git"
            },
            {
              "changes": [
                {
                  "at": "6.4.7rc1",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.4.6",
              "status": "affected",
              "version": "6.4.0",
              "versionType": "git"
            },
            {
              "changes": [
                {
                  "at": "7.0.0alpha4",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "7.0.0alpha3",
              "status": "affected",
              "version": "7.0.0alpha1 ",
              "versionType": "git"
            }
          ]
        }
      ],
      "datePublic": "2023-11-06T08:04:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "The website configured in the URL widget will receive a session cookie when testing or executing scheduled reports. The received session cookie can then be used to access the frontend as the particular user."
            }
          ],
          "value": "The website configured in the URL widget will receive a session cookie when testing or executing scheduled reports. The received session cookie can then be used to access the frontend as the particular user."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-593",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-593 Session Hijacking"
            }
          ]
        },
        {
          "capecId": "CAPEC-233",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-233 Privilege Escalation"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.6,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-565",
              "description": "CWE-565 Reliance on Cookies without Validation and Integrity Checking",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-12-18T09:15:23.931Z",
        "orgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8",
        "shortName": "Zabbix"
      },
      "references": [
        {
          "url": "https://support.zabbix.com/browse/ZBX-23854"
        }
      ],
      "source": {
        "discovery": "INTERNAL"
      },
      "title": "Leak of zbx_session cookie when using a scheduled report that includes a dashboard with a URL widget.",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8",
    "assignerShortName": "Zabbix",
    "cveId": "CVE-2023-32725",
    "datePublished": "2023-12-18T09:15:23.931Z",
    "dateReserved": "2023-05-11T21:25:43.368Z",
    "dateUpdated": "2024-08-02T15:25:36.630Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2006-6693
Vulnerability from cvelistv5
Published
2006-12-21 21:00
Modified
2024-08-07 20:33
Severity ?
Summary
Multiple buffer overflows in zabbix before 20061006 allow attackers to cause a denial of service (application crash) and possibly execute arbitrary code via long strings to the (1) zabbix_log and (2) zabbix_syslog functions.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T20:33:59.977Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "ADV-2006-3959",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/3959"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi/zabbix.security.patch?bug=391388%3Bmsg=5%3Batt=1"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=391388"
          },
          {
            "name": "20416",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/20416"
          },
          {
            "name": "22313",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/22313"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-10-06T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple buffer overflows in zabbix before 20061006 allow attackers to cause a denial of service (application crash) and possibly execute arbitrary code via long strings to the (1) zabbix_log and (2) zabbix_syslog functions."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2009-02-26T10:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "ADV-2006-3959",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/3959"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi/zabbix.security.patch?bug=391388%3Bmsg=5%3Batt=1"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=391388"
        },
        {
          "name": "20416",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/20416"
        },
        {
          "name": "22313",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/22313"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-6693",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple buffer overflows in zabbix before 20061006 allow attackers to cause a denial of service (application crash) and possibly execute arbitrary code via long strings to the (1) zabbix_log and (2) zabbix_syslog functions."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "ADV-2006-3959",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/3959"
            },
            {
              "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi/zabbix.security.patch?bug=391388;msg=5;att=1",
              "refsource": "CONFIRM",
              "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi/zabbix.security.patch?bug=391388;msg=5;att=1"
            },
            {
              "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=391388",
              "refsource": "CONFIRM",
              "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=391388"
            },
            {
              "name": "20416",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/20416"
            },
            {
              "name": "22313",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/22313"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-6693",
    "datePublished": "2006-12-21T21:00:00",
    "dateReserved": "2006-12-21T00:00:00",
    "dateUpdated": "2024-08-07T20:33:59.977Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2024-22122
Vulnerability from cvelistv5
Published
2024-08-09 08:46
Modified
2024-08-09 14:47
Summary
Zabbix allows to configure SMS notifications. AT command injection occurs on "Zabbix Server" because there is no validation of "Number" field on Web nor on Zabbix server side. Attacker can run test of SMS providing specially crafted phone number and execute additional AT commands on modem.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-22122",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-08-09T14:46:40.478878Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-09T14:47:01.476Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "modules": [
            "Server",
            "Frontend"
          ],
          "product": "Zabbix",
          "repo": "https://git.zabbix.com/",
          "vendor": "Zabbix",
          "versions": [
            {
              "changes": [
                {
                  "at": "5.0.43rc1",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.0.42",
              "status": "affected",
              "version": "5.0.0",
              "versionType": "git"
            },
            {
              "changes": [
                {
                  "at": "6.0.31rc1",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.0.30",
              "status": "affected",
              "version": "6.0.0",
              "versionType": "git"
            },
            {
              "changes": [
                {
                  "at": "6.4.16rc1",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.4.15",
              "status": "affected",
              "version": "6.4.0",
              "versionType": "git"
            },
            {
              "changes": [
                {
                  "at": "7.0.0rc3",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "7.0.0rc2",
              "status": "affected",
              "version": "7.0.0alpha1",
              "versionType": "git"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "value": "Zabbix wants to thank Maksim Tiukov (mf0cuz) who submitted this report in HackerOne bug bounty platform"
        }
      ],
      "datePublic": "2024-06-12T11:04:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Zabbix allows to configure SMS notifications. AT command injection occurs on \"Zabbix Server\" because there is no validation of \"Number\" field on Web nor on Zabbix server side. Attacker can run test of SMS providing specially crafted phone number and execute additional AT commands on modem."
            }
          ],
          "value": "Zabbix allows to configure SMS notifications. AT command injection occurs on \"Zabbix Server\" because there is no validation of \"Number\" field on Web nor on Zabbix server side. Attacker can run test of SMS providing specially crafted phone number and execute additional AT commands on modem."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-253",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-253 Remote Code Inclusion"
            }
          ]
        },
        {
          "capecId": "CAPEC-664",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-664 Server Side Request Forgery"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 3,
            "baseSeverity": "LOW",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-77",
              "description": "CWE-77 Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-08-09T13:17:56.611Z",
        "orgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8",
        "shortName": "Zabbix"
      },
      "references": [
        {
          "url": "https://support.zabbix.com/browse/ZBX-25012"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "AT(GSM) Command Injection",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8",
    "assignerShortName": "Zabbix",
    "cveId": "CVE-2024-22122",
    "datePublished": "2024-08-09T08:46:21.444Z",
    "dateReserved": "2024-01-05T07:44:01.395Z",
    "dateUpdated": "2024-08-09T14:47:01.476Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-15803
Vulnerability from cvelistv5
Published
2020-07-17 00:00
Modified
2024-08-04 13:30
Severity ?
Summary
Zabbix before 3.0.32rc1, 4.x before 4.0.22rc1, 4.1.x through 4.4.x before 4.4.10rc1, and 5.x before 5.0.2rc1 allows stored XSS in the URL Widget.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T13:30:22.339Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://support.zabbix.com/browse/ZBX-18057"
          },
          {
            "name": "FEDORA-2020-519516feec",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TIRIMOXH6GSBAANDCB3ANLJK4CRLWRXT/"
          },
          {
            "name": "FEDORA-2020-02cf7850ca",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2ZHHIUYIVA5GZYLKW6A5G6HRELPOBZFE/"
          },
          {
            "name": "[debian-lts-announce] 20200803 [SECURITY] [DLA 2311-1] zabbix security update",
            "tags": [
              "mailing-list",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00007.html"
          },
          {
            "name": "openSUSE-SU-2020:1604",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00007.html"
          },
          {
            "name": "[debian-lts-announce] 20210421 [SECURITY] [DLA 2631-1] zabbix security update",
            "tags": [
              "mailing-list",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00018.html"
          },
          {
            "name": "[debian-lts-announce] 20230412 [SECURITY] [DLA 3390-1] zabbix security update",
            "tags": [
              "mailing-list",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00013.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Zabbix before 3.0.32rc1, 4.x before 4.0.22rc1, 4.1.x through 4.4.x before 4.4.10rc1, and 5.x before 5.0.2rc1 allows stored XSS in the URL Widget."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-04-12T00:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "https://support.zabbix.com/browse/ZBX-18057"
        },
        {
          "name": "FEDORA-2020-519516feec",
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TIRIMOXH6GSBAANDCB3ANLJK4CRLWRXT/"
        },
        {
          "name": "FEDORA-2020-02cf7850ca",
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2ZHHIUYIVA5GZYLKW6A5G6HRELPOBZFE/"
        },
        {
          "name": "[debian-lts-announce] 20200803 [SECURITY] [DLA 2311-1] zabbix security update",
          "tags": [
            "mailing-list"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00007.html"
        },
        {
          "name": "openSUSE-SU-2020:1604",
          "tags": [
            "vendor-advisory"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00007.html"
        },
        {
          "name": "[debian-lts-announce] 20210421 [SECURITY] [DLA 2631-1] zabbix security update",
          "tags": [
            "mailing-list"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00018.html"
        },
        {
          "name": "[debian-lts-announce] 20230412 [SECURITY] [DLA 3390-1] zabbix security update",
          "tags": [
            "mailing-list"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00013.html"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2020-15803",
    "datePublished": "2020-07-17T00:00:00",
    "dateReserved": "2020-07-17T00:00:00",
    "dateUpdated": "2024-08-04T13:30:22.339Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2011-2904
Vulnerability from cvelistv5
Published
2011-08-19 21:00
Modified
2024-08-06 23:15
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in acknow.php in Zabbix before 1.8.6 allows remote attackers to inject arbitrary web script or HTML via the backurl parameter.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T23:15:31.951Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "45502",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/45502"
          },
          {
            "name": "49016",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/49016"
          },
          {
            "name": "[oss-security] 20110809 Re: CVE request: zabbix XSS flaw",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2011/08/09/5"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.zabbix.com/rn1.8.6.php"
          },
          {
            "name": "[oss-security] 20110808 CVE request: zabbix XSS flaw",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2011/08/08/2"
          },
          {
            "name": "FEDORA-2011-10601",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063904.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://support.zabbix.com/browse/ZBX-3835"
          },
          {
            "name": "FEDORA-2011-10618",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063884.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=729162"
          },
          {
            "name": "45677",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/45677"
          },
          {
            "name": "zabbix-acknow-xss(69025)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69025"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-08-04T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting (XSS) vulnerability in acknow.php in Zabbix before 1.8.6 allows remote attackers to inject arbitrary web script or HTML via the backurl parameter."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-28T12:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "45502",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/45502"
        },
        {
          "name": "49016",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/49016"
        },
        {
          "name": "[oss-security] 20110809 Re: CVE request: zabbix XSS flaw",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2011/08/09/5"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.zabbix.com/rn1.8.6.php"
        },
        {
          "name": "[oss-security] 20110808 CVE request: zabbix XSS flaw",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2011/08/08/2"
        },
        {
          "name": "FEDORA-2011-10601",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063904.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://support.zabbix.com/browse/ZBX-3835"
        },
        {
          "name": "FEDORA-2011-10618",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063884.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=729162"
        },
        {
          "name": "45677",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/45677"
        },
        {
          "name": "zabbix-acknow-xss(69025)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69025"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2011-2904",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting (XSS) vulnerability in acknow.php in Zabbix before 1.8.6 allows remote attackers to inject arbitrary web script or HTML via the backurl parameter."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "45502",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/45502"
            },
            {
              "name": "49016",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/49016"
            },
            {
              "name": "[oss-security] 20110809 Re: CVE request: zabbix XSS flaw",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2011/08/09/5"
            },
            {
              "name": "http://www.zabbix.com/rn1.8.6.php",
              "refsource": "CONFIRM",
              "url": "http://www.zabbix.com/rn1.8.6.php"
            },
            {
              "name": "[oss-security] 20110808 CVE request: zabbix XSS flaw",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2011/08/08/2"
            },
            {
              "name": "FEDORA-2011-10601",
              "refsource": "FEDORA",
              "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063904.html"
            },
            {
              "name": "https://support.zabbix.com/browse/ZBX-3835",
              "refsource": "CONFIRM",
              "url": "https://support.zabbix.com/browse/ZBX-3835"
            },
            {
              "name": "FEDORA-2011-10618",
              "refsource": "FEDORA",
              "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063884.html"
            },
            {
              "name": "https://bugzilla.redhat.com/show_bug.cgi?id=729162",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.redhat.com/show_bug.cgi?id=729162"
            },
            {
              "name": "45677",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/45677"
            },
            {
              "name": "zabbix-acknow-xss(69025)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69025"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2011-2904",
    "datePublished": "2011-08-19T21:00:00",
    "dateReserved": "2011-07-27T00:00:00",
    "dateUpdated": "2024-08-06T23:15:31.951Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2024-42326
Vulnerability from cvelistv5
Published
2024-11-27 12:03
Modified
2024-11-27 14:57
Summary
There was discovered a use after free bug in browser.c in the es_browser_get_variant function
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-42326",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-27T14:56:46.762724Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-27T14:57:07.595Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "modules": [
            "Server"
          ],
          "product": "Zabbix",
          "repo": "https://git.zabbix.com/",
          "vendor": "Zabbix",
          "versions": [
            {
              "changes": [
                {
                  "at": "7.0.4rc1",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "7.0.3",
              "status": "affected",
              "version": "7.0.0",
              "versionType": "git"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "value": "Zabbix wants to thank chamal for submitting this report on the HackerOne bug bounty platform."
        }
      ],
      "datePublic": "2024-10-30T12:49:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "There was discovered a use after free bug in browser.c in the es_browser_get_variant function"
            }
          ],
          "value": "There was discovered a use after free bug in browser.c in the es_browser_get_variant function"
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-100",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-100 Overflow Buffers"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "LOW",
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-416",
              "description": "CWE-416 Use After Free",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-11-27T12:03:37.611Z",
        "orgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8",
        "shortName": "Zabbix"
      },
      "references": [
        {
          "url": "https://support.zabbix.com/browse/ZBX-25622"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "Use after free vulnerability in browser.c",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8",
    "assignerShortName": "Zabbix",
    "cveId": "CVE-2024-42326",
    "datePublished": "2024-11-27T12:03:37.611Z",
    "dateReserved": "2024-07-30T08:27:36.132Z",
    "dateUpdated": "2024-11-27T14:57:07.595Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2013-3738
Vulnerability from cvelistv5
Published
2020-02-17 15:54
Modified
2024-08-06 16:21
Severity ?
Summary
A File Inclusion vulnerability exists in Zabbix 2.0.6 due to inadequate sanitization of request strings in CGI scripts, which could let a remote malicious user execute arbitrary code.
References
http://support.zabbix.com/browse/ZBX-6652x_refsource_MISC
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T16:21:59.690Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://support.zabbix.com/browse/ZBX-6652"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2013-05-31T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "A File Inclusion vulnerability exists in Zabbix 2.0.6 due to inadequate sanitization of request strings in CGI scripts, which could let a remote malicious user execute arbitrary code."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-02-17T15:54:11",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://support.zabbix.com/browse/ZBX-6652"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2013-3738",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A File Inclusion vulnerability exists in Zabbix 2.0.6 due to inadequate sanitization of request strings in CGI scripts, which could let a remote malicious user execute arbitrary code."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://support.zabbix.com/browse/ZBX-6652",
              "refsource": "MISC",
              "url": "http://support.zabbix.com/browse/ZBX-6652"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2013-3738",
    "datePublished": "2020-02-17T15:54:11",
    "dateReserved": "2013-06-03T00:00:00",
    "dateUpdated": "2024-08-06T16:21:59.690Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2013-5743
Vulnerability from cvelistv5
Published
2019-12-11 18:43
Modified
2024-08-06 17:22
Severity ?
Summary
Multiple SQL injection vulnerabilities in Zabbix 1.8.x before 1.8.18rc1, 2.0.x before 2.0.9rc1, and 2.1.x before 2.1.7.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T17:22:30.176Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://admin.fedoraproject.org/updates/zabbix-1.8.18-1.el6"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://admin.fedoraproject.org/updates/zabbix20-2.0.8-3.el6"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://admin.fedoraproject.org/updates/zabbix20-2.0.9-1.el5"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://support.zabbix.com/browse/ZBX-7091"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2013-10-02T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple SQL injection vulnerabilities in Zabbix 1.8.x before 1.8.18rc1, 2.0.x before 2.0.9rc1, and 2.1.x before 2.1.7."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-12-11T18:43:26",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://admin.fedoraproject.org/updates/zabbix-1.8.18-1.el6"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://admin.fedoraproject.org/updates/zabbix20-2.0.8-3.el6"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://admin.fedoraproject.org/updates/zabbix20-2.0.9-1.el5"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://support.zabbix.com/browse/ZBX-7091"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2013-5743",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple SQL injection vulnerabilities in Zabbix 1.8.x before 1.8.18rc1, 2.0.x before 2.0.9rc1, and 2.1.x before 2.1.7."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://admin.fedoraproject.org/updates/zabbix-1.8.18-1.el6",
              "refsource": "CONFIRM",
              "url": "https://admin.fedoraproject.org/updates/zabbix-1.8.18-1.el6"
            },
            {
              "name": "https://admin.fedoraproject.org/updates/zabbix20-2.0.8-3.el6",
              "refsource": "CONFIRM",
              "url": "https://admin.fedoraproject.org/updates/zabbix20-2.0.8-3.el6"
            },
            {
              "name": "https://admin.fedoraproject.org/updates/zabbix20-2.0.9-1.el5",
              "refsource": "CONFIRM",
              "url": "https://admin.fedoraproject.org/updates/zabbix20-2.0.9-1.el5"
            },
            {
              "name": "https://support.zabbix.com/browse/ZBX-7091",
              "refsource": "CONFIRM",
              "url": "https://support.zabbix.com/browse/ZBX-7091"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2013-5743",
    "datePublished": "2019-12-11T18:43:26",
    "dateReserved": "2013-09-16T00:00:00",
    "dateUpdated": "2024-08-06T17:22:30.176Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2010-5049
Vulnerability from cvelistv5
Published
2011-11-23 01:00
Modified
2024-08-07 04:09
Severity ?
Summary
SQL injection vulnerability in events.php in Zabbix 1.8.1 and earlier allows remote attackers to execute arbitrary SQL commands via the nav_time parameter.
References
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T04:09:38.781Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20100524 SQL injection vulnerability in Zabbix \u003c= 1.8.1",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/511454/100/0/threaded"
          },
          {
            "name": "ADV-2010-1240",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2010/1240"
          },
          {
            "name": "39752",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/39752"
          },
          {
            "name": "39119",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/39119"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://packetstormsecurity.org/1004-exploits/zabbix181-sql.txt"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2010-04-24T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "SQL injection vulnerability in events.php in Zabbix 1.8.1 and earlier allows remote attackers to execute arbitrary SQL commands via the nav_time parameter."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-10T18:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "20100524 SQL injection vulnerability in Zabbix \u003c= 1.8.1",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/511454/100/0/threaded"
        },
        {
          "name": "ADV-2010-1240",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2010/1240"
        },
        {
          "name": "39752",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/39752"
        },
        {
          "name": "39119",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/39119"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://packetstormsecurity.org/1004-exploits/zabbix181-sql.txt"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2010-5049",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "SQL injection vulnerability in events.php in Zabbix 1.8.1 and earlier allows remote attackers to execute arbitrary SQL commands via the nav_time parameter."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20100524 SQL injection vulnerability in Zabbix \u003c= 1.8.1",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/511454/100/0/threaded"
            },
            {
              "name": "ADV-2010-1240",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2010/1240"
            },
            {
              "name": "39752",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/39752"
            },
            {
              "name": "39119",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/39119"
            },
            {
              "name": "http://packetstormsecurity.org/1004-exploits/zabbix181-sql.txt",
              "refsource": "MISC",
              "url": "http://packetstormsecurity.org/1004-exploits/zabbix181-sql.txt"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2010-5049",
    "datePublished": "2011-11-23T01:00:00",
    "dateReserved": "2011-11-22T00:00:00",
    "dateUpdated": "2024-08-07T04:09:38.781Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2011-4674
Vulnerability from cvelistv5
Published
2011-12-02 18:00
Modified
2024-08-07 00:09
Severity ?
Summary
SQL injection vulnerability in popup.php in Zabbix 1.8.3 and 1.8.4, and possibly other versions before 1.8.9, allows remote attackers to execute arbitrary SQL commands via the only_hostid parameter.
References
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T00:09:19.400Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "18155",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "http://www.exploit-db.com/exploits/18155"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://support.zabbix.com/browse/ZBX-4385"
          },
          {
            "name": "zabbix-popup-sql-injection(71479)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71479"
          },
          {
            "name": "50803",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/50803"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-11-24T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "SQL injection vulnerability in popup.php in Zabbix 1.8.3 and 1.8.4, and possibly other versions before 1.8.9, allows remote attackers to execute arbitrary SQL commands via the only_hostid parameter."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-28T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "18155",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "http://www.exploit-db.com/exploits/18155"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://support.zabbix.com/browse/ZBX-4385"
        },
        {
          "name": "zabbix-popup-sql-injection(71479)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71479"
        },
        {
          "name": "50803",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/50803"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2011-4674",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "SQL injection vulnerability in popup.php in Zabbix 1.8.3 and 1.8.4, and possibly other versions before 1.8.9, allows remote attackers to execute arbitrary SQL commands via the only_hostid parameter."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "18155",
              "refsource": "EXPLOIT-DB",
              "url": "http://www.exploit-db.com/exploits/18155"
            },
            {
              "name": "https://support.zabbix.com/browse/ZBX-4385",
              "refsource": "CONFIRM",
              "url": "https://support.zabbix.com/browse/ZBX-4385"
            },
            {
              "name": "zabbix-popup-sql-injection(71479)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71479"
            },
            {
              "name": "50803",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/50803"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2011-4674",
    "datePublished": "2011-12-02T18:00:00",
    "dateReserved": "2011-12-02T00:00:00",
    "dateUpdated": "2024-08-07T00:09:19.400Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2022-23132
Vulnerability from cvelistv5
Published
2022-01-13 15:50
Modified
2024-09-16 20:37
Summary
During Zabbix installation from RPM, DAC_OVERRIDE SELinux capability is in use to access PID files in [/var/run/zabbix] folder. In this case, Zabbix Proxy or Server processes can bypass file read, write and execute permissions check on the file system level
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T03:36:20.009Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://support.zabbix.com/browse/ZBX-20341"
          },
          {
            "name": "FEDORA-2022-dfe346f53f",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6SZYHXINBKCY42ITFSNCYE7KCSF33VRA/"
          },
          {
            "name": "FEDORA-2022-1a667b0f90",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VB6W556GVXOKUYTASTDGL3AI7S3SJHX7/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Proxy, Server",
          "vendor": "Zabbix",
          "versions": [
            {
              "status": "affected",
              "version": "4.0.0 - 4.0.36"
            },
            {
              "status": "affected",
              "version": "5.0.0 \u2013 5.0.18"
            },
            {
              "status": "affected",
              "version": "5.4.0 \u2013 5.4.8"
            },
            {
              "lessThan": "5.0.19*",
              "status": "unaffected",
              "version": "5.0.19",
              "versionType": "custom"
            },
            {
              "lessThan": "5.4.9*",
              "status": "unaffected",
              "version": "5.4.9",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "Zabbix wants to thank Brian J. Murrell for reporting this issue to us"
        }
      ],
      "datePublic": "2021-12-01T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "During Zabbix installation from RPM, DAC_OVERRIDE SELinux capability is in use to access PID files in [/var/run/zabbix] folder. In this case, Zabbix Proxy or Server processes can bypass file read, write and execute permissions check on the file system level"
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-284",
              "description": "CWE-284 Improper Access Control",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-01-23T03:06:29",
        "orgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8",
        "shortName": "Zabbix"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://support.zabbix.com/browse/ZBX-20341"
        },
        {
          "name": "FEDORA-2022-dfe346f53f",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6SZYHXINBKCY42ITFSNCYE7KCSF33VRA/"
        },
        {
          "name": "FEDORA-2022-1a667b0f90",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VB6W556GVXOKUYTASTDGL3AI7S3SJHX7/"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "value": "To remediate this vulnerability, apply the updates."
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "Incorrect permissions of [/var/run/zabbix] forces dac_override",
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@zabbix.com",
          "DATE_PUBLIC": "2021-12-01T16:09:00.000Z",
          "ID": "CVE-2022-23132",
          "STATE": "PUBLIC",
          "TITLE": "Incorrect permissions of [/var/run/zabbix] forces dac_override"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Proxy, Server",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_name": "4.0.0 - 4.0.36",
                            "version_value": "4.0.0 - 4.0.36"
                          },
                          {
                            "version_affected": "=",
                            "version_name": "5.0.0 \u2013 5.0.18",
                            "version_value": "5.0.0 \u2013 5.0.18"
                          },
                          {
                            "version_affected": "=",
                            "version_name": "5.4.0 \u2013 5.4.8",
                            "version_value": "5.4.0 \u2013 5.4.8"
                          },
                          {
                            "version_affected": "!\u003e=",
                            "version_name": "5.0.19",
                            "version_value": "5.0.19"
                          },
                          {
                            "version_affected": "!\u003e=",
                            "version_name": "5.4.9",
                            "version_value": "5.4.9"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Zabbix"
              }
            ]
          }
        },
        "credit": [
          {
            "lang": "eng",
            "value": "Zabbix wants to thank Brian J. Murrell for reporting this issue to us"
          }
        ],
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "During Zabbix installation from RPM, DAC_OVERRIDE SELinux capability is in use to access PID files in [/var/run/zabbix] folder. In this case, Zabbix Proxy or Server processes can bypass file read, write and execute permissions check on the file system level"
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "impact": {
          "cvss": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N",
            "version": "3.1"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-284 Improper Access Control"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://support.zabbix.com/browse/ZBX-20341",
              "refsource": "MISC",
              "url": "https://support.zabbix.com/browse/ZBX-20341"
            },
            {
              "name": "FEDORA-2022-dfe346f53f",
              "refsource": "FEDORA",
              "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6SZYHXINBKCY42ITFSNCYE7KCSF33VRA/"
            },
            {
              "name": "FEDORA-2022-1a667b0f90",
              "refsource": "FEDORA",
              "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VB6W556GVXOKUYTASTDGL3AI7S3SJHX7/"
            }
          ]
        },
        "solution": [
          {
            "lang": "en",
            "value": "To remediate this vulnerability, apply the updates."
          }
        ],
        "source": {
          "discovery": "EXTERNAL"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8",
    "assignerShortName": "Zabbix",
    "cveId": "CVE-2022-23132",
    "datePublished": "2022-01-13T15:50:40.425921Z",
    "dateReserved": "2022-01-11T00:00:00",
    "dateUpdated": "2024-09-16T20:37:11.038Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2023-29451
Vulnerability from cvelistv5
Published
2023-07-13 09:29
Modified
2024-10-22 16:26
Summary
Specially crafted string can cause a buffer overrun in the JSON parser library leading to a crash of the Zabbix Server or a Zabbix Proxy.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T14:07:46.279Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://support.zabbix.com/browse/ZBX-22587"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00027.html"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-29451",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-22T16:25:43.640794Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-22T16:26:17.639Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "affected",
          "modules": [
            "Server",
            "Proxy"
          ],
          "product": "Zabbix",
          "repo": "https://git.zabbix.com/",
          "vendor": "Zabbix",
          "versions": [
            {
              "changes": [
                {
                  "at": "6.0.15rc1",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.0.14",
              "status": "affected",
              "version": "6.0",
              "versionType": "git"
            },
            {
              "changes": [
                {
                  "at": "6.2.9rc2",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.2.8",
              "status": "affected",
              "version": "6.2",
              "versionType": "git"
            },
            {
              "changes": [
                {
                  "at": "6.4.1rc2",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.4.0",
              "status": "affected",
              "version": "6.4",
              "versionType": "git"
            },
            {
              "changes": [
                {
                  "at": "7.0.0alpha1",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "7.0.0alpha1 ",
              "status": "affected",
              "version": "7.0.0alpha1",
              "versionType": "git"
            }
          ]
        }
      ],
      "datePublic": "2023-03-10T11:05:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Specially crafted string can cause a buffer overrun in the JSON parser library leading to a crash of the Zabbix Server or a Zabbix Proxy."
            }
          ],
          "value": "Specially crafted string can cause a buffer overrun in the JSON parser library leading to a crash of the Zabbix Server or a Zabbix Proxy."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-469",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-469 HTTP DoS"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-20",
              "description": "CWE-20 Improper Input Validation",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-07-13T09:29:42.494Z",
        "orgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8",
        "shortName": "Zabbix"
      },
      "references": [
        {
          "url": "https://support.zabbix.com/browse/ZBX-22587"
        },
        {
          "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00027.html"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Denial of service caused by a bug in the JSON parser",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8",
    "assignerShortName": "Zabbix",
    "cveId": "CVE-2023-29451",
    "datePublished": "2023-07-13T09:29:42.494Z",
    "dateReserved": "2023-04-06T18:04:44.891Z",
    "dateUpdated": "2024-10-22T16:26:17.639Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2023-29458
Vulnerability from cvelistv5
Published
2023-07-13 09:33
Modified
2024-10-22 16:22
Summary
Duktape is an 3rd-party embeddable JavaScript engine, with a focus on portability and compact footprint. When adding too many values in valstack JavaScript will crash. This issue occurs due to bug in Duktape 2.6 which is an 3rd-party solution that we use.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T14:07:46.220Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://support.zabbix.com/browse/ZBX-22989"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-29458",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-22T16:19:37.201477Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-22T16:22:56.866Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "affected",
          "modules": [
            "Proxy",
            "Server"
          ],
          "product": "Zabbix",
          "repo": "https://git.zabbix.com/",
          "vendor": "Zabbix",
          "versions": [
            {
              "changes": [
                {
                  "at": "5.0.35rc1",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.0.34",
              "status": "affected",
              "version": "5,0,0",
              "versionType": "git"
            },
            {
              "changes": [
                {
                  "at": "6.0.18rc1",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.0.17",
              "status": "affected",
              "version": "6,0,0",
              "versionType": "git"
            },
            {
              "changes": [
                {
                  "at": "6.4.3rc1",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.4.2",
              "status": "affected",
              "version": "6.4.0",
              "versionType": "git"
            },
            {
              "changes": [
                {
                  "at": "7.0.0alpha1",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "7.0.0alpha1 ",
              "status": "affected",
              "version": "7.0.0alpha1",
              "versionType": "git"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "nepalihacker0x01"
        }
      ],
      "datePublic": "2023-06-16T11:16:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Duktape is an 3rd-party embeddable JavaScript engine, with a focus on portability and compact footprint. When adding too many values in valstack JavaScript will crash. This issue occurs due to bug in Duktape 2.6 which is an 3rd-party solution that we use."
            }
          ],
          "value": "Duktape is an 3rd-party embeddable JavaScript engine, with a focus on portability and compact footprint. When adding too many values in valstack JavaScript will crash. This issue occurs due to bug in Duktape 2.6 which is an 3rd-party solution that we use."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-125",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-125 Flooding"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-129",
              "description": "CWE-129 Improper Validation of Array Index",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-07-13T09:33:46.403Z",
        "orgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8",
        "shortName": "Zabbix"
      },
      "references": [
        {
          "url": "https://support.zabbix.com/browse/ZBX-22989"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Duktape 2.6 bug crashes JavaScript putting too many values in valstack.",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8",
    "assignerShortName": "Zabbix",
    "cveId": "CVE-2023-29458",
    "datePublished": "2023-07-13T09:33:46.403Z",
    "dateReserved": "2023-04-06T18:04:44.892Z",
    "dateUpdated": "2024-10-22T16:22:56.866Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2023-32727
Vulnerability from cvelistv5
Published
2023-12-18 09:18
Modified
2024-08-02 15:25
Summary
An attacker who has the privilege to configure Zabbix items can use function icmpping() with additional malicious command inside it to execute arbitrary code on the current Zabbix server.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T15:25:36.967Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://support.zabbix.com/browse/ZBX-23857"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "modules": [
            "Server"
          ],
          "product": "Zabbix",
          "repo": "https://git.zabbix.com/",
          "vendor": "Zabbix",
          "versions": [
            {
              "changes": [
                {
                  "at": "4.0.50",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "4.0.49",
              "status": "affected",
              "version": "4.0.0",
              "versionType": "git"
            },
            {
              "changes": [
                {
                  "at": "5.0.39",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.0.38",
              "status": "affected",
              "version": "5.0.0 ",
              "versionType": "git"
            },
            {
              "changes": [
                {
                  "at": "6.0.23rc1",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.0.22",
              "status": "affected",
              "version": "6.0.0",
              "versionType": "git"
            },
            {
              "changes": [
                {
                  "at": "6.4.8rc1",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.4.7",
              "status": "affected",
              "version": "6.4.0",
              "versionType": "git"
            },
            {
              "changes": [
                {
                  "at": "7.0.0alpha7",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "7.0.0alpha6",
              "status": "affected",
              "version": "7.0.0alpha1",
              "versionType": "git"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "This vulnerability is reported in HackerOne bounty hunter platform by Philippe Antoine (catenacyber)"
        }
      ],
      "datePublic": "2023-11-06T12:36:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "An attacker who has the privilege to configure Zabbix items can use function icmpping() with additional malicious command inside it to execute arbitrary code on the current Zabbix server."
            }
          ],
          "value": "An attacker who has the privilege to configure Zabbix items can use function icmpping() with additional malicious command inside it to execute arbitrary code on the current Zabbix server."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-248",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-248 Command Injection"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.8,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-20",
              "description": "CWE-20 Improper Input Validation",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-12-18T09:18:48.446Z",
        "orgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8",
        "shortName": "Zabbix"
      },
      "references": [
        {
          "url": "https://support.zabbix.com/browse/ZBX-23857"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "Code execution vulnerability in icmpping",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8",
    "assignerShortName": "Zabbix",
    "cveId": "CVE-2023-32727",
    "datePublished": "2023-12-18T09:18:48.446Z",
    "dateReserved": "2023-05-11T21:25:43.368Z",
    "dateUpdated": "2024-08-02T15:25:36.967Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2011-3263
Vulnerability from cvelistv5
Published
2011-08-19 21:00
Modified
2024-08-06 23:29
Severity ?
Summary
zabbix_agentd in Zabbix before 1.8.6 and 1.9.x before 1.9.4 allows context-dependent attackers to cause a denial of service (CPU consumption) by executing the vfs.file.cksum command for a special device, as demonstrated by the /dev/urandom device.
References
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T23:29:56.674Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.zabbix.com/rn1.8.6.php"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://support.zabbix.com/browse/ZBX-3794"
          },
          {
            "name": "zabbix-zabbixagentd-vfsfilecksum-dos(69378)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69378"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-08-04T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "zabbix_agentd in Zabbix before 1.8.6 and 1.9.x before 1.9.4 allows context-dependent attackers to cause a denial of service (CPU consumption) by executing the vfs.file.cksum command for a special device, as demonstrated by the /dev/urandom device."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-28T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.zabbix.com/rn1.8.6.php"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://support.zabbix.com/browse/ZBX-3794"
        },
        {
          "name": "zabbix-zabbixagentd-vfsfilecksum-dos(69378)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69378"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2011-3263",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "zabbix_agentd in Zabbix before 1.8.6 and 1.9.x before 1.9.4 allows context-dependent attackers to cause a denial of service (CPU consumption) by executing the vfs.file.cksum command for a special device, as demonstrated by the /dev/urandom device."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.zabbix.com/rn1.8.6.php",
              "refsource": "CONFIRM",
              "url": "http://www.zabbix.com/rn1.8.6.php"
            },
            {
              "name": "https://support.zabbix.com/browse/ZBX-3794",
              "refsource": "CONFIRM",
              "url": "https://support.zabbix.com/browse/ZBX-3794"
            },
            {
              "name": "zabbix-zabbixagentd-vfsfilecksum-dos(69378)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69378"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2011-3263",
    "datePublished": "2011-08-19T21:00:00",
    "dateReserved": "2011-08-19T00:00:00",
    "dateUpdated": "2024-08-06T23:29:56.674Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-11800
Vulnerability from cvelistv5
Published
2020-10-07 15:02
Modified
2024-08-04 11:41
Severity ?
Summary
Zabbix Server 2.2.x and 3.0.x before 3.0.31, and 3.2 allows remote attackers to execute arbitrary code.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T11:41:59.916Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://support.zabbix.com/browse/DEV-1538"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://support.zabbix.com/browse/ZBXSEC-30"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00007.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://support.zabbix.com/browse/ZBX-17600"
          },
          {
            "name": "[debian-lts-announce] 20201121 [SECURITY] [DLA 2461-1] zabbix security update",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00039.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Zabbix Server 2.2.x and 3.0.x before 3.0.31, and 3.2 allows remote attackers to execute arbitrary code."
        }
      ],
      "metrics": [
        {
          "cvssV3_0": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AC:H/AV:N/A:H/C:H/I:H/PR:N/S:C/UI:N",
            "version": "3.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-11-21T19:06:24",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://support.zabbix.com/browse/DEV-1538"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://support.zabbix.com/browse/ZBXSEC-30"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00007.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://support.zabbix.com/browse/ZBX-17600"
        },
        {
          "name": "[debian-lts-announce] 20201121 [SECURITY] [DLA 2461-1] zabbix security update",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00039.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2020-11800",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Zabbix Server 2.2.x and 3.0.x before 3.0.31, and 3.2 allows remote attackers to execute arbitrary code."
            }
          ]
        },
        "impact": {
          "cvss": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.0/AC:H/AV:N/A:H/C:H/I:H/PR:N/S:C/UI:N",
            "version": "3.0"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://support.zabbix.com/browse/DEV-1538",
              "refsource": "CONFIRM",
              "url": "https://support.zabbix.com/browse/DEV-1538"
            },
            {
              "name": "https://support.zabbix.com/browse/ZBXSEC-30",
              "refsource": "CONFIRM",
              "url": "https://support.zabbix.com/browse/ZBXSEC-30"
            },
            {
              "name": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00007.html",
              "refsource": "MISC",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00007.html"
            },
            {
              "name": "https://support.zabbix.com/browse/ZBX-17600",
              "refsource": "CONFIRM",
              "url": "https://support.zabbix.com/browse/ZBX-17600"
            },
            {
              "name": "[debian-lts-announce] 20201121 [SECURITY] [DLA 2461-1] zabbix security update",
              "refsource": "MLIST",
              "url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00039.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2020-11800",
    "datePublished": "2020-10-07T15:02:53",
    "dateReserved": "2020-04-15T00:00:00",
    "dateUpdated": "2024-08-04T11:41:59.916Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2009-4502
Vulnerability from cvelistv5
Published
2009-12-31 18:00
Modified
2024-09-17 00:05
Severity ?
Summary
The NET_TCP_LISTEN function in net.c in Zabbix Agent before 1.6.7, when running on FreeBSD or Solaris, allows remote attackers to bypass the EnableRemoteCommands setting and execute arbitrary commands via shell metacharacters in the argument to net.tcp.listen. NOTE: this attack is limited to attacks from trusted IP addresses.
References
http://www.securityfocus.com/archive/1/508439mailing-list, x_refsource_BUGTRAQ
https://support.zabbix.com/browse/ZBX-1032x_refsource_CONFIRM
http://secunia.com/advisories/37740third-party-advisory, x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2009/3514vdb-entry, x_refsource_VUPEN
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T07:08:37.012Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20091213 Zabbix Agent : Bypass of EnableRemoteCommands=0",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/508439"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://support.zabbix.com/browse/ZBX-1032"
          },
          {
            "name": "37740",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/37740"
          },
          {
            "name": "ADV-2009-3514",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/3514"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The NET_TCP_LISTEN function in net.c in Zabbix Agent before 1.6.7, when running on FreeBSD or Solaris, allows remote attackers to bypass the EnableRemoteCommands setting and execute arbitrary commands via shell metacharacters in the argument to net.tcp.listen.  NOTE: this attack is limited to attacks from trusted IP addresses."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2009-12-31T18:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "20091213 Zabbix Agent : Bypass of EnableRemoteCommands=0",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/508439"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://support.zabbix.com/browse/ZBX-1032"
        },
        {
          "name": "37740",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/37740"
        },
        {
          "name": "ADV-2009-3514",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/3514"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-4502",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The NET_TCP_LISTEN function in net.c in Zabbix Agent before 1.6.7, when running on FreeBSD or Solaris, allows remote attackers to bypass the EnableRemoteCommands setting and execute arbitrary commands via shell metacharacters in the argument to net.tcp.listen.  NOTE: this attack is limited to attacks from trusted IP addresses."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20091213 Zabbix Agent : Bypass of EnableRemoteCommands=0",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/508439"
            },
            {
              "name": "https://support.zabbix.com/browse/ZBX-1032",
              "refsource": "CONFIRM",
              "url": "https://support.zabbix.com/browse/ZBX-1032"
            },
            {
              "name": "37740",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/37740"
            },
            {
              "name": "ADV-2009-3514",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2009/3514"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-4502",
    "datePublished": "2009-12-31T18:00:00Z",
    "dateReserved": "2009-12-30T00:00:00Z",
    "dateUpdated": "2024-09-17T00:05:31.046Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2016-10742
Vulnerability from cvelistv5
Published
2019-02-17 16:00
Modified
2024-08-06 03:30
Severity ?
Summary
Zabbix before 2.2.21rc1, 3.x before 3.0.13rc1, 3.1.x and 3.2.x before 3.2.10rc1, and 3.3.x and 3.4.x before 3.4.4rc1 allows open redirect via the request parameter.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T03:30:20.304Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://support.zabbix.com/browse/ZBX-10272"
          },
          {
            "name": "[debian-lts-announce] 20190311 [SECURITY] [DLA 1708-1] zabbix security update",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00010.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://support.zabbix.com/browse/ZBX-13133"
          },
          {
            "name": "[debian-lts-announce] 20201121 [SECURITY] [DLA 2461-1] zabbix security update",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00039.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2019-02-17T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Zabbix before 2.2.21rc1, 3.x before 3.0.13rc1, 3.1.x and 3.2.x before 3.2.10rc1, and 3.3.x and 3.4.x before 3.4.4rc1 allows open redirect via the request parameter."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-11-21T19:06:23",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://support.zabbix.com/browse/ZBX-10272"
        },
        {
          "name": "[debian-lts-announce] 20190311 [SECURITY] [DLA 1708-1] zabbix security update",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00010.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://support.zabbix.com/browse/ZBX-13133"
        },
        {
          "name": "[debian-lts-announce] 20201121 [SECURITY] [DLA 2461-1] zabbix security update",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00039.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2016-10742",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Zabbix before 2.2.21rc1, 3.x before 3.0.13rc1, 3.1.x and 3.2.x before 3.2.10rc1, and 3.3.x and 3.4.x before 3.4.4rc1 allows open redirect via the request parameter."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://support.zabbix.com/browse/ZBX-10272",
              "refsource": "MISC",
              "url": "https://support.zabbix.com/browse/ZBX-10272"
            },
            {
              "name": "[debian-lts-announce] 20190311 [SECURITY] [DLA 1708-1] zabbix security update",
              "refsource": "MLIST",
              "url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00010.html"
            },
            {
              "name": "https://support.zabbix.com/browse/ZBX-13133",
              "refsource": "MISC",
              "url": "https://support.zabbix.com/browse/ZBX-13133"
            },
            {
              "name": "[debian-lts-announce] 20201121 [SECURITY] [DLA 2461-1] zabbix security update",
              "refsource": "MLIST",
              "url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00039.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2016-10742",
    "datePublished": "2019-02-17T16:00:00",
    "dateReserved": "2019-02-17T00:00:00",
    "dateUpdated": "2024-08-06T03:30:20.304Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2021-46088
Vulnerability from cvelistv5
Published
2022-01-27 15:43
Modified
2024-08-04 05:02
Severity ?
Summary
Zabbix 4.0 LTS, 4.2, 4.4, and 5.0 LTS is vulnerable to Remote Code Execution (RCE). Any user with the "Zabbix Admin" role is able to run custom shell script on the application server in the context of the application user.
References
https://github.com/paalbra/zabbix-zbxsec-7x_refsource_MISC
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T05:02:10.184Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://github.com/paalbra/zabbix-zbxsec-7"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Zabbix 4.0 LTS, 4.2, 4.4, and 5.0 LTS is vulnerable to Remote Code Execution (RCE). Any user with the \"Zabbix Admin\" role is able to run custom shell script on the application server in the context of the application user."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-01-27T15:43:42",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/paalbra/zabbix-zbxsec-7"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2021-46088",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Zabbix 4.0 LTS, 4.2, 4.4, and 5.0 LTS is vulnerable to Remote Code Execution (RCE). Any user with the \"Zabbix Admin\" role is able to run custom shell script on the application server in the context of the application user."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://github.com/paalbra/zabbix-zbxsec-7",
              "refsource": "MISC",
              "url": "https://github.com/paalbra/zabbix-zbxsec-7"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2021-46088",
    "datePublished": "2022-01-27T15:43:42",
    "dateReserved": "2022-01-03T00:00:00",
    "dateUpdated": "2024-08-04T05:02:10.184Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2024-42330
Vulnerability from cvelistv5
Published
2024-11-27 12:05
Modified
2024-12-04 04:55
Severity ?
Summary
The HttpRequest object allows to get the HTTP headers from the server's response after sending the request. The problem is that the returned strings are created directly from the data returned by the server and are not correctly encoded for JavaScript. This allows to create internal strings that can be used to access hidden properties of objects.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:zabbix:frontend:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "frontend",
            "vendor": "zabbix",
            "versions": [
              {
                "lessThanOrEqual": "6.0.33",
                "status": "affected",
                "version": "6.0.0",
                "versionType": "git"
              },
              {
                "lessThanOrEqual": "6.4.18",
                "status": "affected",
                "version": "6.4.0",
                "versionType": "git"
              },
              {
                "lessThanOrEqual": "7.0.3",
                "status": "affected",
                "version": "7.0.0",
                "versionType": "git"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-42330",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-12-03T00:00:00+00:00",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-12-04T04:55:23.233Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "modules": [
            "Server"
          ],
          "product": "Zabbix",
          "repo": "https://git.zabbix.com/",
          "vendor": "Zabbix",
          "versions": [
            {
              "changes": [
                {
                  "at": "6.0.34rc1",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.0.33",
              "status": "affected",
              "version": "6.0.0",
              "versionType": "git"
            },
            {
              "changes": [
                {
                  "at": "6.4.19rc1",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.4.18",
              "status": "affected",
              "version": "6.4.0",
              "versionType": "git"
            },
            {
              "changes": [
                {
                  "at": "7.0.4rc1",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "7.0.3",
              "status": "affected",
              "version": "7.0.0",
              "versionType": "git"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "value": "Zabbix wants to thank zhutyra for submitting this report on the HackerOne bug bounty platform."
        }
      ],
      "datePublic": "2024-10-30T09:43:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "The HttpRequest object allows to get the HTTP headers from the server\u0027s response after sending the request. The problem is that the returned strings are created directly from the data returned by the server and are not correctly encoded for JavaScript. This allows to create internal strings that can be used to access hidden properties of objects."
            }
          ],
          "value": "The HttpRequest object allows to get the HTTP headers from the server\u0027s response after sending the request. The problem is that the returned strings are created directly from the data returned by the server and are not correctly encoded for JavaScript. This allows to create internal strings that can be used to access hidden properties of objects."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-100",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-100 Overflow Buffers"
            }
          ]
        },
        {
          "capecId": "CAPEC-253",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-253 Remote Code Inclusion"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.1,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-134",
              "description": "CWE-134 Use of Externally-Controlled Format String",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-11-27T12:05:47.722Z",
        "orgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8",
        "shortName": "Zabbix"
      },
      "references": [
        {
          "url": "https://support.zabbix.com/browse/ZBX-25626"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "JS - Internal strings in HTTP headers",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8",
    "assignerShortName": "Zabbix",
    "cveId": "CVE-2024-42330",
    "datePublished": "2024-11-27T12:05:47.722Z",
    "dateReserved": "2024-07-30T08:27:36.132Z",
    "dateUpdated": "2024-12-04T04:55:23.233Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2022-23131
Vulnerability from cvelistv5
Published
2022-01-13 15:50
Modified
2024-09-16 16:52
Severity ?
Summary
In the case of instances where the SAML SSO authentication is enabled (non-default), session data can be modified by a malicious actor, because a user login stored in the session was not verified. Malicious unauthenticated actor may exploit this issue to escalate privileges and gain admin access to Zabbix Frontend. To perform the attack, SAML authentication is required to be enabled and the actor has to know the username of Zabbix user (or use the guest account, which is disabled by default).
References
https://support.zabbix.com/browse/ZBX-20350x_refsource_MISC
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T03:36:20.024Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://support.zabbix.com/browse/ZBX-20350"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Frontend",
          "vendor": "Zabbix",
          "versions": [
            {
              "status": "affected",
              "version": "5.4.0 - 5.4.8"
            },
            {
              "lessThan": "5.4.9*",
              "status": "unaffected",
              "version": "5.4.9",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "Zabbix wants to thank Thomas Chauchefoin from SonarSource for reporting this issue to us"
        }
      ],
      "datePublic": "2021-11-22T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "In the case of instances where the SAML SSO authentication is enabled (non-default), session data can be modified by a malicious actor, because a user login stored in the session was not verified. Malicious unauthenticated actor may exploit this issue to escalate privileges and gain admin access to Zabbix Frontend. To perform the attack, SAML authentication is required to be enabled and the actor has to know the username of Zabbix user (or use the guest account, which is disabled by default)."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 9.1,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-290",
              "description": "CWE-290 Authentication Bypass by Spoofing",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-01-13T15:50:39",
        "orgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8",
        "shortName": "Zabbix"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://support.zabbix.com/browse/ZBX-20350"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "value": "To remediate this vulnerability, install the updates or if an immediate update is not possible, follow the presented workarounds."
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "Unsafe client-side session storage leading to authentication bypass/instance takeover via Zabbix Frontend with configured SAML",
      "workarounds": [
        {
          "lang": "en",
          "value": "Disable SAML authentication"
        }
      ],
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@zabbix.com",
          "DATE_PUBLIC": "2021-11-22T14:03:00.000Z",
          "ID": "CVE-2022-23131",
          "STATE": "PUBLIC",
          "TITLE": "Unsafe client-side session storage leading to authentication bypass/instance takeover via Zabbix Frontend with configured SAML"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Frontend",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_name": "5.4.0 - 5.4.8",
                            "version_value": "5.4.0 - 5.4.8"
                          },
                          {
                            "version_affected": "!\u003e=",
                            "version_name": "5.4.9",
                            "version_value": "5.4.9"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Zabbix"
              }
            ]
          }
        },
        "credit": [
          {
            "lang": "eng",
            "value": "Zabbix wants to thank Thomas Chauchefoin from SonarSource for reporting this issue to us"
          }
        ],
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In the case of instances where the SAML SSO authentication is enabled (non-default), session data can be modified by a malicious actor, because a user login stored in the session was not verified. Malicious unauthenticated actor may exploit this issue to escalate privileges and gain admin access to Zabbix Frontend. To perform the attack, SAML authentication is required to be enabled and the actor has to know the username of Zabbix user (or use the guest account, which is disabled by default)."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "impact": {
          "cvss": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 9.1,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.1"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-290 Authentication Bypass by Spoofing"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://support.zabbix.com/browse/ZBX-20350",
              "refsource": "MISC",
              "url": "https://support.zabbix.com/browse/ZBX-20350"
            }
          ]
        },
        "solution": [
          {
            "lang": "en",
            "value": "To remediate this vulnerability, install the updates or if an immediate update is not possible, follow the presented workarounds."
          }
        ],
        "source": {
          "discovery": "EXTERNAL"
        },
        "work_around": [
          {
            "lang": "en",
            "value": "Disable SAML authentication"
          }
        ]
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8",
    "assignerShortName": "Zabbix",
    "cveId": "CVE-2022-23131",
    "datePublished": "2022-01-13T15:50:39.137588Z",
    "dateReserved": "2022-01-11T00:00:00",
    "dateUpdated": "2024-09-16T16:52:43.145Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2009-4500
Vulnerability from cvelistv5
Published
2009-12-31 18:00
Modified
2024-09-17 01:56
Severity ?
Summary
The process_trap function in trapper/trapper.c in Zabbix Server before 1.6.6 allows remote attackers to cause a denial of service (crash) via a crafted request with data that lacks an expected : (colon) separator, which triggers a NULL pointer dereference.
References
http://www.securityfocus.com/archive/1/508436/30/60/threadedmailing-list, x_refsource_BUGTRAQ
https://support.zabbix.com/browse/ZBX-993x_refsource_CONFIRM
http://secunia.com/advisories/37740third-party-advisory, x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2009/3514vdb-entry, x_refsource_VUPEN
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T07:08:36.655Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20091213 Zabbix Server : Multiple remote vulnerabilities",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/508436/30/60/threaded"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://support.zabbix.com/browse/ZBX-993"
          },
          {
            "name": "37740",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/37740"
          },
          {
            "name": "ADV-2009-3514",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/3514"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "The process_trap function in trapper/trapper.c in Zabbix Server before 1.6.6 allows remote attackers to cause a denial of service (crash) via a crafted request with data that lacks an expected : (colon) separator, which triggers a NULL pointer dereference."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2009-12-31T18:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "20091213 Zabbix Server : Multiple remote vulnerabilities",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/508436/30/60/threaded"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://support.zabbix.com/browse/ZBX-993"
        },
        {
          "name": "37740",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/37740"
        },
        {
          "name": "ADV-2009-3514",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/3514"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-4500",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The process_trap function in trapper/trapper.c in Zabbix Server before 1.6.6 allows remote attackers to cause a denial of service (crash) via a crafted request with data that lacks an expected : (colon) separator, which triggers a NULL pointer dereference."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20091213 Zabbix Server : Multiple remote vulnerabilities",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/508436/30/60/threaded"
            },
            {
              "name": "https://support.zabbix.com/browse/ZBX-993",
              "refsource": "CONFIRM",
              "url": "https://support.zabbix.com/browse/ZBX-993"
            },
            {
              "name": "37740",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/37740"
            },
            {
              "name": "ADV-2009-3514",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2009/3514"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-4500",
    "datePublished": "2009-12-31T18:00:00Z",
    "dateReserved": "2009-12-30T00:00:00Z",
    "dateUpdated": "2024-09-17T01:56:19.933Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2024-22120
Vulnerability from cvelistv5
Published
2024-05-17 09:53
Modified
2024-08-01 22:35
Severity ?
Summary
Zabbix server can perform command execution for configured scripts. After command is executed, audit entry is added to "Audit Log". Due to "clientip" field is not sanitized, it is possible to injection SQL into "clientip" and exploit time based blind SQL injection.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:zabbix:zabbix_server:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "affected",
            "product": "zabbix_server",
            "vendor": "zabbix",
            "versions": [
              {
                "status": "affected",
                "version": "6.0.0"
              },
              {
                "status": "affected",
                "version": "6.4.0"
              },
              {
                "status": "affected",
                "version": "7.0.0alpha1"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-22120",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-05-20T13:29:40.805103Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-06-04T17:52:44.718Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T22:35:34.820Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://support.zabbix.com/browse/ZBX-24505"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "modules": [
            "Server"
          ],
          "product": "Zabbix",
          "repo": "https://git.zabbix.com/",
          "vendor": "Zabbix",
          "versions": [
            {
              "changes": [
                {
                  "at": "6.0.28rc1",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.0.27",
              "status": "affected",
              "version": "6.0.0",
              "versionType": "git"
            },
            {
              "changes": [
                {
                  "at": "6.4.13rc1",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.4.12",
              "status": "affected",
              "version": "6.4.0",
              "versionType": "git"
            },
            {
              "changes": [
                {
                  "at": "7.0.0beta1",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "7.0.0beta1",
              "status": "affected",
              "version": "7.0.0alpha1",
              "versionType": "git"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "value": "Zabbix wants to thank Maxim Tyukov (mf0cuz) who submitted this report in HackerOne bug bounty platform"
        }
      ],
      "datePublic": "2024-05-17T08:22:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Zabbix server can perform command execution for configured scripts. After command is executed, audit entry is added to \"Audit Log\". Due to \"clientip\" field is not sanitized, it is possible to injection SQL into \"clientip\" and exploit time based blind SQL injection."
            }
          ],
          "value": "Zabbix server can perform command execution for configured scripts. After command is executed, audit entry is added to \"Audit Log\". Due to \"clientip\" field is not sanitized, it is possible to injection SQL into \"clientip\" and exploit time based blind SQL injection."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-253",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-253 Remote Code Inclusion"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.1,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-20",
              "description": "CWE-20 Improper Input Validation",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-05-20T06:45:42.494Z",
        "orgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8",
        "shortName": "Zabbix"
      },
      "references": [
        {
          "url": "https://support.zabbix.com/browse/ZBX-24505"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "Time Based SQL Injection in Zabbix Server Audit Log",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8",
    "assignerShortName": "Zabbix",
    "cveId": "CVE-2024-22120",
    "datePublished": "2024-05-17T09:53:52.798Z",
    "dateReserved": "2024-01-05T07:44:01.395Z",
    "dateUpdated": "2024-08-01T22:35:34.820Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2014-9450
Vulnerability from cvelistv5
Published
2015-01-02 20:00
Modified
2024-09-16 22:46
Severity ?
Summary
Multiple SQL injection vulnerabilities in chart_bar.php in the frontend in Zabbix before 1.8.22, 2.0.x before 2.0.14, and 2.2.x before 2.2.8 allow remote attackers to execute arbitrary SQL commands via the (1) itemid or (2) periods parameter.
References
http://www.zabbix.com/rn1.8.22.phpx_refsource_CONFIRM
http://secunia.com/advisories/61554third-party-advisory, x_refsource_SECUNIA
https://support.zabbix.com/browse/ZBX-8582x_refsource_CONFIRM
http://www.zabbix.com/rn2.0.14.phpx_refsource_CONFIRM
http://www.zabbix.com/rn2.2.8.phpx_refsource_CONFIRM
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T13:47:41.322Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.zabbix.com/rn1.8.22.php"
          },
          {
            "name": "61554",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/61554"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://support.zabbix.com/browse/ZBX-8582"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.zabbix.com/rn2.0.14.php"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.zabbix.com/rn2.2.8.php"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple SQL injection vulnerabilities in chart_bar.php in the frontend in Zabbix before 1.8.22, 2.0.x before 2.0.14, and 2.2.x before 2.2.8 allow remote attackers to execute arbitrary SQL commands via the (1) itemid or (2) periods parameter."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2015-01-02T20:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.zabbix.com/rn1.8.22.php"
        },
        {
          "name": "61554",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/61554"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://support.zabbix.com/browse/ZBX-8582"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.zabbix.com/rn2.0.14.php"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.zabbix.com/rn2.2.8.php"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2014-9450",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple SQL injection vulnerabilities in chart_bar.php in the frontend in Zabbix before 1.8.22, 2.0.x before 2.0.14, and 2.2.x before 2.2.8 allow remote attackers to execute arbitrary SQL commands via the (1) itemid or (2) periods parameter."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.zabbix.com/rn1.8.22.php",
              "refsource": "CONFIRM",
              "url": "http://www.zabbix.com/rn1.8.22.php"
            },
            {
              "name": "61554",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/61554"
            },
            {
              "name": "https://support.zabbix.com/browse/ZBX-8582",
              "refsource": "CONFIRM",
              "url": "https://support.zabbix.com/browse/ZBX-8582"
            },
            {
              "name": "http://www.zabbix.com/rn2.0.14.php",
              "refsource": "CONFIRM",
              "url": "http://www.zabbix.com/rn2.0.14.php"
            },
            {
              "name": "http://www.zabbix.com/rn2.2.8.php",
              "refsource": "CONFIRM",
              "url": "http://www.zabbix.com/rn2.2.8.php"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2014-9450",
    "datePublished": "2015-01-02T20:00:00Z",
    "dateReserved": "2015-01-02T00:00:00Z",
    "dateUpdated": "2024-09-16T22:46:01.055Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2024-36467
Vulnerability from cvelistv5
Published
2024-11-27 06:16
Modified
2024-12-04 14:36
Summary
An authenticated user with API access (e.g.: user with default User role), more specifically a user with access to the user.update API endpoint is enough to be able to add themselves to any group (e.g.: Zabbix Administrators), except to groups that are disabled or having restricted GUI access.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "zabbix",
            "vendor": "zabbix",
            "versions": [
              {
                "lessThanOrEqual": "5.0.42",
                "status": "affected",
                "version": "5.0.0",
                "versionType": "custom"
              },
              {
                "lessThanOrEqual": "6.0.32",
                "status": "affected",
                "version": "6.0.0",
                "versionType": "custom"
              },
              {
                "lessThanOrEqual": "6.4.17",
                "status": "affected",
                "version": "6.4.0",
                "versionType": "custom"
              },
              {
                "lessThanOrEqual": "7.0.1rc",
                "status": "affected",
                "version": "7.0.0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-36467",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-12-04T04:55:25.645854Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-12-04T14:36:54.043Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "modules": [
            "API"
          ],
          "product": "Zabbix",
          "repo": "https://git.zabbix.com/",
          "vendor": "Zabbix",
          "versions": [
            {
              "changes": [
                {
                  "at": "5.0.43rc1",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "5.0.42",
              "status": "affected",
              "version": "5.0.0",
              "versionType": "git"
            },
            {
              "changes": [
                {
                  "at": "6.0.33rc1",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.0.32",
              "status": "affected",
              "version": "6.0.0",
              "versionType": "git"
            },
            {
              "changes": [
                {
                  "at": "6.4.18rc1",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "6.4.17",
              "status": "affected",
              "version": "6.4.0",
              "versionType": "git"
            },
            {
              "changes": [
                {
                  "at": "7.0.2rc1",
                  "status": "unaffected"
                }
              ],
              "lessThanOrEqual": "7.0.1rc1",
              "status": "affected",
              "version": "7.0.0",
              "versionType": "git"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "value": "Zabbix wants to thank M\u00e1rk R\u00e1k\u00f3czi for submitting this report on the HackerOne bug bounty platform."
        }
      ],
      "datePublic": "2024-09-12T08:25:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "An authenticated user with API access (e.g.: user with default User role), more specifically a user with access to the user.update API endpoint is enough to be able to add themselves to any group (e.g.: Zabbix Administrators), except to groups that are disabled or having restricted GUI access."
            }
          ],
          "value": "An authenticated user with API access (e.g.: user with default User role), more specifically a user with access to the user.update API endpoint is enough to be able to add themselves to any group (e.g.: Zabbix Administrators), except to groups that are disabled or having restricted GUI access."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-233",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-233 Privilege Escalation"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-285",
              "description": "CWE-285 Improper Authorization",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-11-27T06:16:30.381Z",
        "orgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8",
        "shortName": "Zabbix"
      },
      "references": [
        {
          "url": "https://support.zabbix.com/browse/ZBX-25614"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "Authentication privilege escalation via user groups due to missing authorization checks",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8",
    "assignerShortName": "Zabbix",
    "cveId": "CVE-2024-36467",
    "datePublished": "2024-11-27T06:16:30.381Z",
    "dateReserved": "2024-05-28T11:21:24.947Z",
    "dateUpdated": "2024-12-04T14:36:54.043Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

Vulnerability from fkie_nvd
Published
2024-02-09 09:15
Modified
2024-11-21 08:55
Summary
The cause of vulnerability is improper validation of form input field “Name” on Graph page in Items section.
Impacted products
Vendor Product Version
zabbix zabbix *
zabbix zabbix *
zabbix zabbix *
zabbix zabbix 7.0.0
zabbix zabbix 7.0.0
zabbix zabbix 7.0.0
zabbix zabbix 7.0.0
zabbix zabbix 7.0.0
zabbix zabbix 7.0.0
zabbix zabbix 7.0.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C94731C-B779-45AD-BBB4-E6F0D5A3E149",
              "versionEndExcluding": "5.0.40",
              "versionStartIncluding": "5.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "398840EF-B622-4395-8336-92ADABBBA142",
              "versionEndExcluding": "6.0.24",
              "versionStartIncluding": "6.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6105048-6C2E-4638-9595-3BEB09D06442",
              "versionEndExcluding": "6.4.9",
              "versionStartIncluding": "6.4.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:alpha1:*:*:*:*:*:*",
              "matchCriteriaId": "93EB5757-7F98-4428-9616-C30A647A6612",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:alpha2:*:*:*:*:*:*",
              "matchCriteriaId": "DA00BDB5-433F-44E5-87AC-DA01C64B5DB3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:alpha3:*:*:*:*:*:*",
              "matchCriteriaId": "98C46C92-9D86-45CD-88FE-DFBB5502BB88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:alpha4:*:*:*:*:*:*",
              "matchCriteriaId": "B568E6DD-A6D1-4402-BB40-7DA2596A5BC8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:alpha5:*:*:*:*:*:*",
              "matchCriteriaId": "B9C3673B-8459-4C63-8E90-724D1D42A8BB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:alpha6:*:*:*:*:*:*",
              "matchCriteriaId": "7C9F6957-7526-4852-A579-DE556DBFAA97",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:alpha7:*:*:*:*:*:*",
              "matchCriteriaId": "81A7A191-93DE-4C5D-963E-E8890FF7AACA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The cause of vulnerability is improper validation of form input field \u201cName\u201d on Graph page in Items section."
    },
    {
      "lang": "es",
      "value": "La causa de la vulnerabilidad es la validaci\u00f3n inadecuada del campo de entrada del formulario \"Nombre\" en la p\u00e1gina Gr\u00e1fico en la secci\u00f3n Elementos."
    }
  ],
  "id": "CVE-2024-22119",
  "lastModified": "2024-11-21T08:55:37.150",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "LOW",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L",
          "version": "3.1"
        },
        "exploitabilityScore": 2.1,
        "impactScore": 3.4,
        "source": "security@zabbix.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.3,
        "impactScore": 2.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-02-09T09:15:08.380",
  "references": [
    {
      "source": "security@zabbix.com",
      "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00020.html"
    },
    {
      "source": "security@zabbix.com",
      "tags": [
        "Exploit",
        "Issue Tracking",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://support.zabbix.com/browse/ZBX-24070"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.debian.org/debian-lts-announce/2024/04/msg00020.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Issue Tracking",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://support.zabbix.com/browse/ZBX-24070"
    }
  ],
  "sourceIdentifier": "security@zabbix.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "security@zabbix.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-10-07 16:15
Modified
2024-11-21 04:58
Severity ?
Summary
Zabbix Server 2.2.x and 3.0.x before 3.0.31, and 3.2 allows remote attackers to execute arbitrary code.
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "038194B7-A39D-4041-83D6-7FBAE03185CE",
              "versionEndExcluding": "3.0.31",
              "versionStartIncluding": "2.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:3.2.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "80857FF1-7D86-4893-B2C5-9F931692AB35",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "40513095-7E6E-46B3-B604-C926F1BA3568",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:opensuse:backports_sle:15.0:sp2:*:*:*:*:*:*",
              "matchCriteriaId": "67E82302-4B77-44F3-97B1-24C18AC4A35D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "B009C22E-30A4-4288-BCF6-C3E81DEAF45A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Zabbix Server 2.2.x and 3.0.x before 3.0.31, and 3.2 allows remote attackers to execute arbitrary code."
    },
    {
      "lang": "es",
      "value": "Zabbix Server versiones 2.2.x y 3.0.x anteriores a 3.0.31 y 3.2, permite a atacantes remotos ejecutar c\u00f3digo arbitrario"
    }
  ],
  "id": "CVE-2020-11800",
  "lastModified": "2024-11-21T04:58:39.210",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.0,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 2.2,
        "impactScore": 6.0,
        "source": "cve@mitre.org",
        "type": "Secondary"
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-10-07T16:15:15.343",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00007.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00039.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://support.zabbix.com/browse/DEV-1538"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://support.zabbix.com/browse/ZBX-17600"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Permissions Required",
        "Vendor Advisory"
      ],
      "url": "https://support.zabbix.com/browse/ZBXSEC-30"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00007.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00039.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://support.zabbix.com/browse/DEV-1538"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://support.zabbix.com/browse/ZBX-17600"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Permissions Required",
        "Vendor Advisory"
      ],
      "url": "https://support.zabbix.com/browse/ZBXSEC-30"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-02-17 16:15
Modified
2024-11-21 01:54
Severity ?
Summary
A File Inclusion vulnerability exists in Zabbix 2.0.6 due to inadequate sanitization of request strings in CGI scripts, which could let a remote malicious user execute arbitrary code.
Impacted products
Vendor Product Version
zabbix zabbix 2.0.6



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "C31B0F7D-E0A5-4EB8-BEE6-963905C734A1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A File Inclusion vulnerability exists in Zabbix 2.0.6 due to inadequate sanitization of request strings in CGI scripts, which could let a remote malicious user execute arbitrary code."
    },
    {
      "lang": "es",
      "value": "Se presenta una vulnerabilidad de inclusi\u00f3n de archivos en Zabbix versi\u00f3n 2.0.6, debido a un saneamiento inapropiado de las cadenas de petici\u00f3n en los scripts CGI, lo que podr\u00eda conllevar a un usuario malicioso remoto ejecutar c\u00f3digo arbitrario."
    }
  ],
  "id": "CVE-2013-3738",
  "lastModified": "2024-11-21T01:54:12.443",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-02-17T16:15:16.880",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://support.zabbix.com/browse/ZBX-6652"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://support.zabbix.com/browse/ZBX-6652"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2019-11-30 02:15
Modified
2024-11-21 02:01
Summary
Zabbix before 5.0 represents passwords in the users table with unsalted MD5.
Impacted products
Vendor Product Version
zabbix zabbix 2.0.8
zabbix zabbix 4.4.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.8:-:*:*:*:*:*:*",
              "matchCriteriaId": "956330DC-EB51-44AA-BB88-7F393D978A34",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:4.4.0:alpha2:*:*:*:*:*:*",
              "matchCriteriaId": "C21DD887-14DF-4CD1-A2E9-F91910ECE94E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Zabbix before 5.0 represents passwords in the users table with unsalted MD5."
    },
    {
      "lang": "es",
      "value": "Zabbix versiones anteriores a 5.0, representa contrase\u00f1as en la tabla de usuarios con MD5 sin sal."
    }
  ],
  "id": "CVE-2013-7484",
  "lastModified": "2024-11-21T02:01:07.413",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-11-30T02:15:10.390",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00027.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://support.zabbix.com/browse/ZBX-16551"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://support.zabbix.com/browse/ZBXNEXT-1898"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00027.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://support.zabbix.com/browse/ZBX-16551"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://support.zabbix.com/browse/ZBXNEXT-1898"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-326"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2019-12-11 19:15
Modified
2024-11-21 01:58
Severity ?
Summary
Multiple SQL injection vulnerabilities in Zabbix 1.8.x before 1.8.18rc1, 2.0.x before 2.0.9rc1, and 2.1.x before 2.1.7.
Impacted products
Vendor Product Version
zabbix zabbix *
zabbix zabbix *
zabbix zabbix *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C78EB6E-CD6D-4945-BBE2-10477B6DA7E2",
              "versionEndIncluding": "1.8.17",
              "versionStartIncluding": "1.8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C740046-F507-4D01-B2E1-AD0CEA6642A8",
              "versionEndIncluding": "2.0.8",
              "versionStartIncluding": "2.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CEAA2ECD-74D0-4D65-BF20-6C77BF628011",
              "versionEndIncluding": "2.1.7",
              "versionStartIncluding": "2.1.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple SQL injection vulnerabilities in Zabbix 1.8.x before 1.8.18rc1, 2.0.x before 2.0.9rc1, and 2.1.x before 2.1.7."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples vulnerabilidades de inyecci\u00f3n SQL en Zabbix versiones 1.8.x anteriores a 1.8.18rc1, versiones 2.0.x anteriores a 2.0.9rc1 y versiones 2.1.x anteriores a 2.1.7."
    }
  ],
  "id": "CVE-2013-5743",
  "lastModified": "2024-11-21T01:58:02.250",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-12-11T19:15:12.483",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link"
      ],
      "url": "https://admin.fedoraproject.org/updates/zabbix-1.8.18-1.el6"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link"
      ],
      "url": "https://admin.fedoraproject.org/updates/zabbix20-2.0.8-3.el6"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link"
      ],
      "url": "https://admin.fedoraproject.org/updates/zabbix20-2.0.9-1.el5"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://support.zabbix.com/browse/ZBX-7091"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "https://admin.fedoraproject.org/updates/zabbix-1.8.18-1.el6"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "https://admin.fedoraproject.org/updates/zabbix20-2.0.8-3.el6"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link"
      ],
      "url": "https://admin.fedoraproject.org/updates/zabbix20-2.0.9-1.el5"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://support.zabbix.com/browse/ZBX-7091"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-89"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2006-12-21 21:28
Modified
2024-11-21 00:23
Severity ?
Summary
Multiple format string vulnerabilities in zabbix before 20061006 allow attackers to cause a denial of service (application crash) and possibly execute arbitrary code via format string specifiers in information that would be recorded in the system log using (1) zabbix_log or (2) zabbix_syslog.
Impacted products
Vendor Product Version
zabbix zabbix 1.1.2



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0FB47B1-330E-4ED4-A4AF-993DC613B782",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple format string vulnerabilities in zabbix before 20061006 allow attackers to cause a denial of service (application crash) and possibly execute arbitrary code via format string specifiers in information that would be recorded in the system log using (1) zabbix_log or (2) zabbix_syslog."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples vulnerabilidades de formato de cadena en zabbix versiones anteriores a 20061006 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda de aplicaci\u00f3n) y posiblemente ejecutar c\u00f3digo de su elecci\u00f3n mediante especificadores de formato de cadena en informaci\u00f3n que ser\u00eda guardada en el fichero de trazas (log) del sistema usando (1) zabbix_log \u00f3 (2) zabbix_syslog."
    }
  ],
  "id": "CVE-2006-6692",
  "lastModified": "2024-11-21T00:23:25.247",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": true,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2006-12-21T21:28:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi/zabbix.security.patch?bug=391388%3Bmsg=5%3Batt=1"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=391388"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/22313"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/20416"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2006/3959"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi/zabbix.security.patch?bug=391388%3Bmsg=5%3Batt=1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=391388"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/22313"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/20416"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/3959"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-07-13 09:15
Modified
2024-11-21 07:57
Summary
JavaScript pre-processing can be used by the attacker to gain access to the file system (read-only access on behalf of user "zabbix") on the Zabbix Server or Zabbix Proxy, potentially leading to unauthorized access to sensitive data.
Impacted products
Vendor Product Version
zabbix zabbix *
zabbix zabbix *
zabbix zabbix *
zabbix zabbix *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F04570DF-A096-42C3-B16D-1B134B009F3D",
              "versionEndIncluding": "5.0.33",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "221530A4-AB8C-434C-BB41-F5A5E98317B4",
              "versionEndIncluding": "6.0.15",
              "versionStartIncluding": "6.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FB7A41B-6B72-4A37-8A30-AA23BADAE942",
              "versionEndIncluding": "6.4.1",
              "versionStartIncluding": "6.4.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5B6F1C5-A8C8-4F4B-848C-5585523280E0",
              "versionEndIncluding": "6.4.4",
              "versionStartIncluding": "6.4.3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "JavaScript pre-processing can be used by the attacker to gain access to the file system (read-only access on behalf of user \"zabbix\") on the Zabbix Server or Zabbix Proxy, potentially leading to unauthorized access to sensitive data."
    }
  ],
  "id": "CVE-2023-29450",
  "lastModified": "2024-11-21T07:57:04.870",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 6.0,
        "source": "security@zabbix.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-07-13T09:15:09.660",
  "references": [
    {
      "source": "security@zabbix.com",
      "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00027.html"
    },
    {
      "source": "security@zabbix.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://support.zabbix.com/browse/ZBX-22588"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00027.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://support.zabbix.com/browse/ZBX-22588"
    }
  ],
  "sourceIdentifier": "security@zabbix.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-200"
        },
        {
          "lang": "en",
          "value": "CWE-552"
        }
      ],
      "source": "security@zabbix.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-552"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-07-13 10:15
Modified
2024-11-21 07:57
Summary
Specially crafted string can cause a buffer overrun in the JSON parser library leading to a crash of the Zabbix Server or a Zabbix Proxy.
Impacted products
Vendor Product Version
zabbix zabbix *
zabbix zabbix *
zabbix zabbix 6.4.0
zabbix zabbix 6.4.0
zabbix zabbix 6.4.0
zabbix zabbix 6.4.0
zabbix zabbix 6.4.0
zabbix zabbix 6.4.0
zabbix zabbix 6.4.0
zabbix zabbix 6.4.0
zabbix zabbix 6.4.0
zabbix zabbix 6.4.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "01F553B6-48B5-4415-BF02-FBD83B16D577",
              "versionEndIncluding": "6.0.14",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DE4CDDA-721E-4B2D-ACCE-718B98C85059",
              "versionEndIncluding": "6.4.4",
              "versionStartIncluding": "6.4.2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:6.4.0:alpha1:*:*:*:*:*:*",
              "matchCriteriaId": "F8EEB422-9B08-4BB9-A1DD-1F391B93031B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:6.4.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "D2DBFD04-80FA-496C-8A4D-36008777FCE3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:6.4.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "409DEB61-6951-48FE-8BA8-32AFE432C114",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:6.4.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "E596AE82-54AD-4689-A59C-E4E906439731",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:6.4.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "AD9D1FC3-9AD5-4281-82DD-46957ECD4EEF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:6.4.0:beta5:*:*:*:*:*:*",
              "matchCriteriaId": "81B14635-6FD0-4E9D-BCCD-3F88A3337B3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:6.4.0:beta6:*:*:*:*:*:*",
              "matchCriteriaId": "425BB43B-4557-4D6F-9748-D0E6146A47E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:6.4.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "495EB7AA-D9AD-43C0-A04E-66013AF2DBC0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:6.4.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "1FCEBEB2-AD19-4259-9BAC-D96E55384193",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:6.4.0:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "E8290F5B-E1F0-4081-B365-CB1A7F2A5DA3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Specially crafted string can cause a buffer overrun in the JSON parser library leading to a crash of the Zabbix Server or a Zabbix Proxy."
    }
  ],
  "id": "CVE-2023-29451",
  "lastModified": "2024-11-21T07:57:04.990",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "LOW",
          "baseScore": 4.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
          "version": "3.1"
        },
        "exploitabilityScore": 1.2,
        "impactScore": 3.4,
        "source": "security@zabbix.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-07-13T10:15:09.137",
  "references": [
    {
      "source": "security@zabbix.com",
      "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00027.html"
    },
    {
      "source": "security@zabbix.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://support.zabbix.com/browse/ZBX-22587"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00027.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://support.zabbix.com/browse/ZBX-22587"
    }
  ],
  "sourceIdentifier": "security@zabbix.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "security@zabbix.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-07-06 11:15
Modified
2024-11-21 07:10
Summary
An authenticated user can create a link with reflected Javascript code inside it for the discovery page and send it to other users. The payload can be executed only with a known CSRF token value of the victim, which is changed periodically and is difficult to predict.
Impacted products
Vendor Product Version
zabbix zabbix *
zabbix zabbix *
zabbix zabbix *
zabbix zabbix 5.0.25



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F7CB4BC-34EC-4BB9-B2D4-ABA99E766FE5",
              "versionEndExcluding": "4.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6CE7409-6EE6-4A32-B843-13E54CBA294A",
              "versionEndExcluding": "5.0.25",
              "versionStartIncluding": "5.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "629B0F32-F758-4322-B04E-B363BEE6F731",
              "versionEndIncluding": "6.0.4",
              "versionStartIncluding": "6.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:5.0.25:-:*:*:*:*:*:*",
              "matchCriteriaId": "93246229-E4FF-49BB-9BCD-01CCCD43FCD5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "An authenticated user can create a link with reflected Javascript code inside it for the discovery page and send it to other users. The payload can be executed only with a known CSRF token value of the victim, which is changed periodically and is difficult to predict."
    },
    {
      "lang": "es",
      "value": "Un usuario autenticado puede crear un enlace con c\u00f3digo Javascript reflejado en su interior para la p\u00e1gina de detecci\u00f3n y enviarlo a otros usuarios. La carga \u00fatil s\u00f3lo puede ejecutarse con un valor de token CSRF conocido de la v\u00edctima, que es cambiado peri\u00f3dicamente y es dif\u00edcil de predecir"
    }
  ],
  "id": "CVE-2022-35229",
  "lastModified": "2024-11-21T07:10:56.297",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "NONE",
          "baseScore": 3.5,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 6.8,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 3.7,
          "baseSeverity": "LOW",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.2,
        "impactScore": 2.5,
        "source": "security@zabbix.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.3,
        "impactScore": 2.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-07-06T11:15:08.967",
  "references": [
    {
      "source": "security@zabbix.com",
      "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00013.html"
    },
    {
      "source": "security@zabbix.com",
      "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00027.html"
    },
    {
      "source": "security@zabbix.com",
      "tags": [
        "Issue Tracking",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://support.zabbix.com/browse/ZBX-21306"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00013.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00027.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://support.zabbix.com/browse/ZBX-21306"
    }
  ],
  "sourceIdentifier": "security@zabbix.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "security@zabbix.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-07-06 11:15
Modified
2024-11-21 07:10
Summary
An authenticated user can create a link with reflected Javascript code inside it for the graphs page and send it to other users. The payload can be executed only with a known CSRF token value of the victim, which is changed periodically and is difficult to predict.
Impacted products
Vendor Product Version
zabbix zabbix *
zabbix zabbix 5.0.25
zabbix zabbix 5.0.25



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F14B0723-57AD-4B46-9C1A-E9C06C2E1716",
              "versionEndExcluding": "5.0.25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:5.0.25:-:*:*:*:*:*:*",
              "matchCriteriaId": "93246229-E4FF-49BB-9BCD-01CCCD43FCD5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:5.0.25:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "A7B52616-759E-41B3-8983-F721AF87DCA5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "An authenticated user can create a link with reflected Javascript code inside it for the graphs page and send it to other users. The payload can be executed only with a known CSRF token value of the victim, which is changed periodically and is difficult to predict."
    },
    {
      "lang": "es",
      "value": "Un usuario autenticado puede crear un enlace con c\u00f3digo Javascript reflejado en su interior para la p\u00e1gina de gr\u00e1ficos y enviarlo a otros usuarios. La carga \u00fatil s\u00f3lo puede ejecutarse con un valor conocido del token CSRF de la v\u00edctima, que es cambiado peri\u00f3dicamente y es dif\u00edcil de predecir"
    }
  ],
  "id": "CVE-2022-35230",
  "lastModified": "2024-11-21T07:10:56.437",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "NONE",
          "baseScore": 3.5,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 6.8,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 3.7,
          "baseSeverity": "LOW",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.2,
        "impactScore": 2.5,
        "source": "security@zabbix.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.3,
        "impactScore": 2.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-07-06T11:15:09.020",
  "references": [
    {
      "source": "security@zabbix.com",
      "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00013.html"
    },
    {
      "source": "security@zabbix.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://support.zabbix.com/browse/ZBX-21305"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00013.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://support.zabbix.com/browse/ZBX-21305"
    }
  ],
  "sourceIdentifier": "security@zabbix.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "security@zabbix.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-10-12 07:15
Modified
2024-11-21 08:03
Summary
The zabbix/src/libs/zbxjson module is vulnerable to a buffer overflow when parsing JSON files via zbx_json_open.
Impacted products
Vendor Product Version
zabbix zabbix *
zabbix zabbix *
zabbix zabbix 7.0.0
zabbix zabbix 7.0.0
zabbix zabbix 7.0.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "531CCCBF-46AD-4988-8A9D-ED4FD5208C71",
              "versionEndIncluding": "6.0.20",
              "versionStartIncluding": "6.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "868F271E-2595-4D01-BF53-46460F98891A",
              "versionEndIncluding": "6.4.5",
              "versionStartIncluding": "6.4.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:alpha1:*:*:*:*:*:*",
              "matchCriteriaId": "93EB5757-7F98-4428-9616-C30A647A6612",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:alpha2:*:*:*:*:*:*",
              "matchCriteriaId": "DA00BDB5-433F-44E5-87AC-DA01C64B5DB3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:alpha3:*:*:*:*:*:*",
              "matchCriteriaId": "98C46C92-9D86-45CD-88FE-DFBB5502BB88",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The zabbix/src/libs/zbxjson module is vulnerable to a buffer overflow when parsing JSON files via zbx_json_open."
    },
    {
      "lang": "es",
      "value": "El m\u00f3dulo zabbix/src/libs/zbxjson es vulnerable a un desbordamiento del b\u00fafer al analizar archivos JSON a trav\u00e9s de zbx_json_open."
    }
  ],
  "id": "CVE-2023-32722",
  "lastModified": "2024-11-21T08:03:54.820",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.6,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 6.0,
        "source": "security@zabbix.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-10-12T07:15:10.217",
  "references": [
    {
      "source": "security@zabbix.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://support.zabbix.com/browse/ZBX-23390"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://support.zabbix.com/browse/ZBX-23390"
    }
  ],
  "sourceIdentifier": "security@zabbix.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-120"
        }
      ],
      "source": "security@zabbix.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-01-13 16:15
Modified
2024-11-21 06:48
Summary
During Zabbix installation from RPM, DAC_OVERRIDE SELinux capability is in use to access PID files in [/var/run/zabbix] folder. In this case, Zabbix Proxy or Server processes can bypass file read, write and execute permissions check on the file system level
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "285CF526-ACA1-438C-98FA-BEB4365E6531",
              "versionEndIncluding": "4.0.36",
              "versionStartIncluding": "4.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5754717-C846-47CA-81C2-D2BA46BED5AD",
              "versionEndIncluding": "5.0.18",
              "versionStartIncluding": "5.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "19429F9A-8623-4BA9-984B-4982418C21CD",
              "versionEndIncluding": "5.4.8",
              "versionStartIncluding": "5.4.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:6.0.0:alpha1:*:*:*:*:*:*",
              "matchCriteriaId": "0DC67B03-AF43-45C9-8EAC-D60DA5887712",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:6.0.0:alpha2:*:*:*:*:*:*",
              "matchCriteriaId": "9C483257-D279-4A20-8451-1C2D34AF8C7D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:6.0.0:alpha3:*:*:*:*:*:*",
              "matchCriteriaId": "F9B37226-5339-4B5E-B515-BBC5D95A122D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:6.0.0:alpha4:*:*:*:*:*:*",
              "matchCriteriaId": "69B35CCA-9F00-4FED-B2F6-3A561369AF44",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:6.0.0:alpha5:*:*:*:*:*:*",
              "matchCriteriaId": "4270E53E-563E-4B60-9C19-5E8E78635B86",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:6.0.0:alpha6:*:*:*:*:*:*",
              "matchCriteriaId": "E7BCC855-4C6A-4E00-BA2A-3CAD738DF49D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:6.0.0:alpha7:*:*:*:*:*:*",
              "matchCriteriaId": "E5EE65D8-BD54-491F-8B61-A58D57C2D1CA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
              "matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
              "matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "During Zabbix installation from RPM, DAC_OVERRIDE SELinux capability is in use to access PID files in [/var/run/zabbix] folder. In this case, Zabbix Proxy or Server processes can bypass file read, write and execute permissions check on the file system level"
    },
    {
      "lang": "es",
      "value": "Durante la instalaci\u00f3n de Zabbix desde RPM, es usada la capacidad DAC_OVERRIDE SELinux para acceder a los archivos PID en la carpeta [/var/run/zabbix]. En este caso, los procesos del proxy o del servidor de Zabbix pueden omitir la comprobaci\u00f3n de los permisos de lectura, escritura y ejecuci\u00f3n de los archivos en el nivel del sistema de archivos"
    }
  ],
  "id": "CVE-2022-23132",
  "lastModified": "2024-11-21T06:48:04.023",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 3.3,
          "baseSeverity": "LOW",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 2.5,
        "source": "security@zabbix.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "LOW",
          "baseScore": 7.3,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.4,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-01-13T16:15:08.113",
  "references": [
    {
      "source": "security@zabbix.com",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6SZYHXINBKCY42ITFSNCYE7KCSF33VRA/"
    },
    {
      "source": "security@zabbix.com",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VB6W556GVXOKUYTASTDGL3AI7S3SJHX7/"
    },
    {
      "source": "security@zabbix.com",
      "tags": [
        "Issue Tracking",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://support.zabbix.com/browse/ZBX-20341"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6SZYHXINBKCY42ITFSNCYE7KCSF33VRA/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VB6W556GVXOKUYTASTDGL3AI7S3SJHX7/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://support.zabbix.com/browse/ZBX-20341"
    }
  ],
  "sourceIdentifier": "security@zabbix.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-284"
        }
      ],
      "source": "security@zabbix.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-732"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2013-12-14 17:21
Modified
2024-11-21 01:49
Severity ?
Summary
The user.login function in Zabbix before 1.8.16 and 2.x before 2.0.5rc1 allows remote attackers to override LDAP configuration via the cnf parameter.
Impacted products
Vendor Product Version
zabbix zabbix *
zabbix zabbix 2.0.0
zabbix zabbix 2.0.1
zabbix zabbix 2.0.2
zabbix zabbix 2.0.3
zabbix zabbix 2.0.4



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "790CFCE1-C950-4866-A3AA-90FF2BC4D6DB",
              "versionEndIncluding": "1.8.15",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A13691AD-76EE-461B-A5A8-C8433AC907CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7F5CFFB-7492-4E87-8B85-2EB99CE2A9EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "29ACE6F0-E3B4-4B9D-A40A-47B66BA81FA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E538292A-0573-4F6E-8504-F86863AE1D04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "8213C387-7A54-4C86-AB6C-DF72AA17EFD6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The user.login function in Zabbix before 1.8.16 and 2.x before 2.0.5rc1 allows remote attackers to override LDAP configuration via the cnf parameter."
    },
    {
      "lang": "es",
      "value": "La funci\u00f3n user.login en Zabbix anteriores a 1.8.16 y 2.x (anteriores a 2.0.5rc1) permite a atacantes remotos sobreescribir configuraciones LDAP a trav\u00e9s del par\u00e1metro cnf."
    }
  ],
  "id": "CVE-2013-1364",
  "lastModified": "2024-11-21T01:49:26.130",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2013-12-14T17:21:45.537",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/55824"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://security.gentoo.org/glsa/glsa-201311-15.xml"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/57471"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.zabbix.com/rn1.8.16.php"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.zabbix.com/rn2.0.5rc1.php"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://support.zabbix.com/browse/ZBX-6097"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/55824"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-201311-15.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/57471"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.zabbix.com/rn1.8.16.php"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.zabbix.com/rn2.0.5rc1.php"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://support.zabbix.com/browse/ZBX-6097"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-287"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-08-12 13:38
Modified
2024-12-04 15:28
Summary
User with no permission to any of the Hosts can access and view host count & other statistics through System Information Widget in Global View Dashboard.
Impacted products
Vendor Product Version
zabbix zabbix *
zabbix zabbix *
zabbix zabbix *
zabbix zabbix 7.0.0
zabbix zabbix 7.0.0
zabbix zabbix 7.0.0
zabbix zabbix 7.0.0
zabbix zabbix 7.0.0
zabbix zabbix 7.0.0
zabbix zabbix 7.0.0
zabbix zabbix 7.0.0
zabbix zabbix 7.0.0
zabbix zabbix 7.0.0
zabbix zabbix 7.0.0
zabbix zabbix 7.0.0
zabbix zabbix 7.0.0
zabbix zabbix 7.0.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5950D0D-9DFF-4B36-9AAF-43CBCEFE7101",
              "versionEndIncluding": "5.0.42",
              "versionStartIncluding": "5.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1D26F5C-A94F-4273-81D7-7DDF7541C3E7",
              "versionEndIncluding": "6.0.30",
              "versionStartIncluding": "6.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0DA6900-EB3E-4867-BD97-243686EECADD",
              "versionEndIncluding": "6.4.15",
              "versionStartIncluding": "6.4.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:alpha1:*:*:*:*:*:*",
              "matchCriteriaId": "93EB5757-7F98-4428-9616-C30A647A6612",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:alpha2:*:*:*:*:*:*",
              "matchCriteriaId": "DA00BDB5-433F-44E5-87AC-DA01C64B5DB3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:alpha3:*:*:*:*:*:*",
              "matchCriteriaId": "98C46C92-9D86-45CD-88FE-DFBB5502BB88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:alpha4:*:*:*:*:*:*",
              "matchCriteriaId": "B568E6DD-A6D1-4402-BB40-7DA2596A5BC8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:alpha5:*:*:*:*:*:*",
              "matchCriteriaId": "B9C3673B-8459-4C63-8E90-724D1D42A8BB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:alpha6:*:*:*:*:*:*",
              "matchCriteriaId": "7C9F6957-7526-4852-A579-DE556DBFAA97",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:alpha7:*:*:*:*:*:*",
              "matchCriteriaId": "81A7A191-93DE-4C5D-963E-E8890FF7AACA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:alpha8:*:*:*:*:*:*",
              "matchCriteriaId": "AEE202D5-3C88-43A5-9328-FC78D0B9B8CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:alpha9:*:*:*:*:*:*",
              "matchCriteriaId": "F88BFB75-7951-47D5-941F-3839E9E31FFA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "8216247E-C160-4D2C-906E-9D8CD731B5C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "06548219-0DC3-4B5B-85D1-B1EE0FA30CD2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "4D23985B-2F4D-41F6-B9D6-7B184FC7E447",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "97964B9B-6A5E-4547-8886-E81B0849A876",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "40992B5F-0D83-4D5C-9188-E84C369FF92F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "User with no permission to any of the Hosts can access and view host count \u0026 other statistics through System Information Widget in Global View Dashboard."
    },
    {
      "lang": "es",
      "value": "El usuario sin permiso para ninguno de los Hosts puede acceder y ver el recuento de hosts y otras estad\u00edsticas a trav\u00e9s del widget de informaci\u00f3n del sistema en Global View Dashboard."
    }
  ],
  "id": "CVE-2024-22114",
  "lastModified": "2024-12-04T15:28:53.450",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 1.4,
        "source": "security@zabbix.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 1.4,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-08-12T13:38:15.627",
  "references": [
    {
      "source": "security@zabbix.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://support.zabbix.com/browse/ZBX-25015"
    }
  ],
  "sourceIdentifier": "security@zabbix.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-281"
        }
      ],
      "source": "security@zabbix.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-281"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2018-04-20 21:29
Modified
2024-11-21 03:24
Summary
In the trapper functionality of Zabbix Server 2.4.x, specifically crafted trapper packets can pass database logic checks, resulting in database writes. An attacker can set up a Man-in-the-Middle server to alter trapper requests made between an active Zabbix proxy and Server to trigger this vulnerability.
Impacted products
Vendor Product Version
zabbix zabbix *
debian debian_linux 8.0
debian debian_linux 9.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "52E766F0-9C78-4A6E-9321-B7F78885CC5C",
              "versionEndIncluding": "2.4.8",
              "versionStartIncluding": "2.4.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In the trapper functionality of Zabbix Server 2.4.x, specifically crafted trapper packets can pass database logic checks, resulting in database writes. An attacker can set up a Man-in-the-Middle server to alter trapper requests made between an active Zabbix proxy and Server to trigger this vulnerability."
    },
    {
      "lang": "es",
      "value": "En la funcionalidad trapper de Zabbix Server 2.4.x, los paquetes trapper espec\u00edficamente manipulados pueden pasar comprobaciones de l\u00f3gica de base de datos, lo que resulta en escrituras en la base de datos. Un atacante puede establecer un servidor Man-in-the-Middle para alterar las peticiones trapper realizadas entre un proxy y un servidor Zabbix para desencadenar esta vulnerabilidad."
    }
  ],
  "id": "CVE-2017-2825",
  "lastModified": "2024-11-21T03:24:13.560",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "NETWORK",
          "availabilityImpact": "LOW",
          "baseScore": 7.0,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "LOW",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:L",
          "version": "3.0"
        },
        "exploitabilityScore": 2.2,
        "impactScore": 4.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2018-04-20T21:29:00.563",
  "references": [
    {
      "source": "talos-cna@cisco.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/98094"
    },
    {
      "source": "talos-cna@cisco.com",
      "tags": [
        "Exploit",
        "Technical Description",
        "Third Party Advisory"
      ],
      "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2017-0326"
    },
    {
      "source": "talos-cna@cisco.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.debian.org/security/2017/dsa-3937"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/98094"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Technical Description",
        "Third Party Advisory"
      ],
      "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2017-0326"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.debian.org/security/2017/dsa-3937"
    }
  ],
  "sourceIdentifier": "talos-cna@cisco.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-08-12 13:38
Modified
2024-12-10 16:32
Summary
Setting SMS media allows to set GSM modem file. Later this file is used as Linux device. But due everything is a file for Linux, it is possible to set another file, e.g. log file and zabbix_server will try to communicate with it as modem. As a result, log file will be broken with AT commands and small part for log file content will be leaked to UI.
Impacted products
Vendor Product Version
zabbix zabbix *
zabbix zabbix *
zabbix zabbix *
zabbix zabbix 7.0.0
zabbix zabbix 7.0.0
zabbix zabbix 7.0.0
zabbix zabbix 7.0.0
zabbix zabbix 7.0.0
zabbix zabbix 7.0.0
zabbix zabbix 7.0.0
zabbix zabbix 7.0.0
zabbix zabbix 7.0.0
zabbix zabbix 7.0.0
zabbix zabbix 7.0.0
zabbix zabbix 7.0.0
zabbix zabbix 7.0.0
zabbix zabbix 7.0.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5950D0D-9DFF-4B36-9AAF-43CBCEFE7101",
              "versionEndIncluding": "5.0.42",
              "versionStartIncluding": "5.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1D26F5C-A94F-4273-81D7-7DDF7541C3E7",
              "versionEndIncluding": "6.0.30",
              "versionStartIncluding": "6.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0DA6900-EB3E-4867-BD97-243686EECADD",
              "versionEndIncluding": "6.4.15",
              "versionStartIncluding": "6.4.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:alpha1:*:*:*:*:*:*",
              "matchCriteriaId": "93EB5757-7F98-4428-9616-C30A647A6612",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:alpha2:*:*:*:*:*:*",
              "matchCriteriaId": "DA00BDB5-433F-44E5-87AC-DA01C64B5DB3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:alpha3:*:*:*:*:*:*",
              "matchCriteriaId": "98C46C92-9D86-45CD-88FE-DFBB5502BB88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:alpha4:*:*:*:*:*:*",
              "matchCriteriaId": "B568E6DD-A6D1-4402-BB40-7DA2596A5BC8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:alpha5:*:*:*:*:*:*",
              "matchCriteriaId": "B9C3673B-8459-4C63-8E90-724D1D42A8BB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:alpha6:*:*:*:*:*:*",
              "matchCriteriaId": "7C9F6957-7526-4852-A579-DE556DBFAA97",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:alpha7:*:*:*:*:*:*",
              "matchCriteriaId": "81A7A191-93DE-4C5D-963E-E8890FF7AACA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:alpha8:*:*:*:*:*:*",
              "matchCriteriaId": "AEE202D5-3C88-43A5-9328-FC78D0B9B8CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:alpha9:*:*:*:*:*:*",
              "matchCriteriaId": "F88BFB75-7951-47D5-941F-3839E9E31FFA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "8216247E-C160-4D2C-906E-9D8CD731B5C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "06548219-0DC3-4B5B-85D1-B1EE0FA30CD2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "4D23985B-2F4D-41F6-B9D6-7B184FC7E447",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "97964B9B-6A5E-4547-8886-E81B0849A876",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "40992B5F-0D83-4D5C-9188-E84C369FF92F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Setting SMS media allows to set GSM modem file. Later this file is used as Linux device. But due everything is a file for Linux, it is possible to set another file, e.g. log file and zabbix_server will try to communicate with it as modem. As a result, log file will be broken with AT commands and small part for log file content will be leaked to UI."
    },
    {
      "lang": "es",
      "value": "La configuraci\u00f3n de medios SMS permite configurar el archivo del m\u00f3dem GSM. Posteriormente este archivo se utiliza como dispositivo Linux. Pero debido a que todo es un archivo para Linux, es posible configurar otro archivo, por ejemplo, un archivo de registro y zabbix_server intentar\u00e1 comunicarse con \u00e9l como m\u00f3dem. Como resultado, el archivo de registro se romper\u00e1 con los comandos AT y una peque\u00f1a parte del contenido del archivo de registro se filtrar\u00e1 a la interfaz de usuario."
    }
  ],
  "id": "CVE-2024-22123",
  "lastModified": "2024-12-10T16:32:45.670",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 2.7,
          "baseSeverity": "LOW",
          "confidentialityImpact": "NONE",
          "integrityImpact": "LOW",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.2,
        "impactScore": 1.4,
        "source": "security@zabbix.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 2.7,
          "baseSeverity": "LOW",
          "confidentialityImpact": "NONE",
          "integrityImpact": "LOW",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.2,
        "impactScore": 1.4,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-08-12T13:38:16.520",
  "references": [
    {
      "source": "security@zabbix.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://support.zabbix.com/browse/ZBX-25013"
    }
  ],
  "sourceIdentifier": "security@zabbix.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-94"
        }
      ],
      "source": "security@zabbix.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-94"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2021-03-03 17:15
Modified
2024-11-21 05:58
Summary
In Zabbix from 4.0.x before 4.0.28rc1, 5.0.0alpha1 before 5.0.10rc1, 5.2.x before 5.2.6rc1, and 5.4.0alpha1 before 5.4.0beta2, the CControllerAuthenticationUpdate controller lacks a CSRF protection mechanism. The code inside this controller calls diableSIDValidation inside the init() method. An attacker doesn't have to know Zabbix user login credentials, but has to know the correct Zabbix URL and contact information of an existing user with sufficient privileges.
Impacted products
Vendor Product Version
zabbix zabbix *
zabbix zabbix *
zabbix zabbix *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DBC6970-CABB-481C-9797-A2C27DE6FCCB",
              "versionEndIncluding": "4.0.27",
              "versionStartIncluding": "4.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD1D7614-E9FA-4DED-BBFA-D872E75757B6",
              "versionEndIncluding": "5.0.9",
              "versionStartIncluding": "5.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5499DEBB-A4E5-4035-8F23-77C1AF3D34E3",
              "versionEndIncluding": "5.2.3",
              "versionStartIncluding": "5.2.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In Zabbix from 4.0.x before 4.0.28rc1, 5.0.0alpha1 before 5.0.10rc1, 5.2.x before 5.2.6rc1, and 5.4.0alpha1 before 5.4.0beta2, the CControllerAuthenticationUpdate controller lacks a CSRF protection mechanism. The code inside this controller calls diableSIDValidation inside the init() method. An attacker doesn\u0027t have to know Zabbix user login credentials, but has to know the correct Zabbix URL and contact information of an existing user with sufficient privileges."
    },
    {
      "lang": "es",
      "value": "En Zabbix desde las versiones 4.0.x anteriores a 4.0.28rc1, versiones 5.0.0alpha1 anteriores a 5.0.10rc1, versiones 5.2.x anteriores a 5.2.6rc1, y versiones 5.4.0alpha1 anteriores a 5.4.0beta2, el controlador CControllerAuthenticationUpdate carece de un mecanismo de protecci\u00f3n CSRF. El c\u00f3digo dentro de este controlador llama a diableSIDValidation dentro del m\u00e9todo init(). Un atacante no tiene que conocer las credenciales de inicio de sesi\u00f3n del usuario de Zabbix, pero tiene que conocer la URL correcta de Zabbix y la informaci\u00f3n de contacto de un usuario existente con suficientes privilegios"
    }
  ],
  "id": "CVE-2021-27927",
  "lastModified": "2024-11-21T05:58:50.260",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-03-03T17:15:12.753",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00013.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Issue Tracking",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://support.zabbix.com/browse/ZBX-18942"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00013.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://support.zabbix.com/browse/ZBX-18942"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-352"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2011-08-19 21:55
Modified
2024-11-21 01:30
Severity ?
Summary
Zabbix before 1.8.6 allows remote attackers to obtain sensitive information via an invalid srcfld2 parameter to popup.php, which reveals the installation path in an error message.
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D78293D-800A-497D-86ED-A32181AB6F60",
              "versionEndIncluding": "1.8.5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E916BD0-BA65-4895-B6A1-1F30E1178BEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1:beta10:*:*:*:*:*:*",
              "matchCriteriaId": "1B3EBE7F-36B9-4D00-B2CF-E933F2A7D578",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1:beta11:*:*:*:*:*:*",
              "matchCriteriaId": "472C48A5-7E2E-440D-A92C-D7F180CD630C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1:beta12:*:*:*:*:*:*",
              "matchCriteriaId": "02A06CE1-FE5B-46C5-8E1A-3EEF0E1B0D4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "00A0CA98-C23B-4042-A55F-9ED6F3A2DB5E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "481DB798-D0F7-48D2-9A07-2785FF31E613",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "A0EC0649-B10E-4557-8D67-FAAAF4AB04B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1:beta5:*:*:*:*:*:*",
              "matchCriteriaId": "ED71C8A8-14FD-4183-99AA-D9359E8DCF32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1:beta6:*:*:*:*:*:*",
              "matchCriteriaId": "16FF6B60-5D7F-4288-9CAF-1FD96DF8D318",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1:beta7:*:*:*:*:*:*",
              "matchCriteriaId": "CFA20306-A682-42AD-A8E9-A623D06476E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1:beta8:*:*:*:*:*:*",
              "matchCriteriaId": "2EA9F77B-7F7D-43C8-97EA-0985A2E275CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1:beta9:*:*:*:*:*:*",
              "matchCriteriaId": "9DA4C658-BF18-484C-9A72-EDC79E55BBF8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0FDE68D0-CF1B-4063-B3DD-850EFF17B4F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0FB47B1-330E-4ED4-A4AF-993DC613B782",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA7AA37E-2E1A-471D-95AE-83A2CABF1DF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "DFABFF16-FD5E-4FCF-BDF8-AE8D654CEAD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "03E211F0-2F61-4503-AE89-0F750C2848B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "652DC200-54ED-4354-A80C-62253CC42210",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "C581C36A-70EE-4E06-9A4C-7CDF99C0E80A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.3:beta:*:*:*:*:*:*",
              "matchCriteriaId": "A660D65E-D5C9-4D33-ABC2-E803644D0666",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.3.1:beta:*:*:*:*:*:*",
              "matchCriteriaId": "8080D8E8-738D-4EBE-B5A3-6F8819617890",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.3.2:beta:*:*:*:*:*:*",
              "matchCriteriaId": "DBC71B56-59CA-4189-BAF0-AA511FF5B944",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.3.3:beta:*:*:*:*:*:*",
              "matchCriteriaId": "13620EBC-D721-47C9-B054-8C243E300773",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.3.4:beta:*:*:*:*:*:*",
              "matchCriteriaId": "72BEAE7A-97FA-4A9E-8F3E-082F3D73597F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.3.5:beta:*:*:*:*:*:*",
              "matchCriteriaId": "CA18F8F3-33FD-4FD0-B739-23B279ABCB32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.3.6:beta:*:*:*:*:*:*",
              "matchCriteriaId": "DA7D5B83-1D9A-4E7D-9F8B-391ED384C1B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.3.7:beta:*:*:*:*:*:*",
              "matchCriteriaId": "76957BA1-20EB-4CD9-8F6F-6B742DE4B7A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.3.8:beta:*:*:*:*:*:*",
              "matchCriteriaId": "09CB3919-850F-420C-B148-7434DF8F4237",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "55BC3D41-DB27-4509-8908-0A7F0A19206E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "96A266AD-7853-40D0-8D1B-6ECFF34A76AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB1611DD-8EB1-49FE-8995-C9D853F812F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F75B7137-657E-4230-BEDA-D8EA2824138B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C27222F-3FA6-4F9A-A017-37B77E536CFF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.5:beta:*:*:*:*:*:*",
              "matchCriteriaId": "8E3057C0-8AF2-48CE-A60B-EDA138E36BC1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.5.1:beta:*:*:*:*:*:*",
              "matchCriteriaId": "CF50FF14-C17D-4043-BD33-F25BE29F583C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.5.2:beta:*:*:*:*:*:*",
              "matchCriteriaId": "4514843A-41E3-4318-BBF0-8304E51F62F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.5.3:beta:*:*:*:*:*:*",
              "matchCriteriaId": "3493784D-992A-461B-944F-D1067E43FC0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.5.4:beta:*:*:*:*:*:*",
              "matchCriteriaId": "0F7EECAF-5F40-480D-9532-9970EEBFBD71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "90F4BAE5-9A6F-4757-B413-9024FF4C9832",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6379BE78-7EFA-4D61-A97D-D336C6F30E00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E70F0D2-1D7C-4B65-B5FC-8DA2CD73E26F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7085354-F91A-4594-9E7A-5F823F8BF189",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C942C4C-2162-4C36-89BC-18F56E81280A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "7337CDB5-4E3F-41B6-A502-F86FCBA81F72",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.6.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "6866F9A2-3986-4F63-8DBA-23E4B59A0C11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.6.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC04F70A-4CB2-486F-BA7B-514065BC00AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.6.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "A293369B-4B44-4210-8D39-407536513897",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.6.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A42EBE3-FEF9-4158-ADD6-063ED75F6683",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C4A2B75-0B3B-46EC-BA80-A528DEF58DAB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B9506E6-3011-430A-B099-AFBF0CE4830B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "13C94196-4CC6-4827-944A-197F748A48E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B6DB768-148D-4067-9202-42B9C16F3DFF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "A24470D7-B73D-4253-AED2-4BE8C015D965",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD5EC94A-383D-45A5-A1BC-5F14D54FD588",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B024F97A-00AA-449D-8726-03D9E6B89541",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CEF7DE3-7A87-4283-A7DF-FD57823C8F47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D4332A9-1D31-41BB-B374-369C583639E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.3:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "D659F67E-74CD-438C-99BE-BC0B91027D2B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.3:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "2875B4AE-D445-4902-8D73-A0274FAD20D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.3:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "92FF443D-EE65-4223-9CC7-AB120D72A260",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF5BE8CC-AC6B-4F9F-9717-26931F524092",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "3EBAE908-9F0C-4840-BFF4-625710758E2A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.4:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "58687670-217C-461F-A2C1-272442331290",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.4:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "CB9EB46D-5333-4BE1-B7EA-704F34EFC871",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.4:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "C696B16B-093A-4C1E-8ECF-8AEA74DC05D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.5:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "D186E4E3-03BE-4D3E-8ED8-43D796B19A7F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Zabbix before 1.8.6 allows remote attackers to obtain sensitive information via an invalid srcfld2 parameter to popup.php, which reveals the installation path in an error message."
    },
    {
      "lang": "es",
      "value": "Zabbix antes de la versi\u00f3n v1.8.6 permite a atacantes remotos obtener informaci\u00f3n sensible a trav\u00e9s de un par\u00e1metro \u0027srcfld2\u0027 inv\u00e1lido  para popup.php, lo que revela la ruta de instalaci\u00f3n en un mensaje de error."
    }
  ],
  "id": "CVE-2011-3264",
  "lastModified": "2024-11-21T01:30:08.280",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-08-19T21:55:02.790",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.zabbix.com/rn1.8.6.php"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69377"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://support.zabbix.com/browse/ZBX-3840"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.zabbix.com/rn1.8.6.php"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69377"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://support.zabbix.com/browse/ZBX-3840"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-200"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2011-12-02 18:55
Modified
2024-11-21 01:32
Severity ?
Summary
SQL injection vulnerability in popup.php in Zabbix 1.8.3 and 1.8.4, and possibly other versions before 1.8.9, allows remote attackers to execute arbitrary SQL commands via the only_hostid parameter.
Impacted products
Vendor Product Version
zabbix zabbix 1.8.3
zabbix zabbix 1.8.4



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D4332A9-1D31-41BB-B374-369C583639E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF5BE8CC-AC6B-4F9F-9717-26931F524092",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "SQL injection vulnerability in popup.php in Zabbix 1.8.3 and 1.8.4, and possibly other versions before 1.8.9, allows remote attackers to execute arbitrary SQL commands via the only_hostid parameter."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de inyecci\u00f3n SQL en popup.php en Zabbix v1.8.3 y v1.8.4, y posiblemente otras versiones anteriores a v1.8.9, permite a atacantes remotos inyectar comandos SQL de su elecci\u00f3n a trav\u00e9s del par\u00e1metro only_hostid"
    }
  ],
  "id": "CVE-2011-4674",
  "lastModified": "2024-11-21T01:32:45.043",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-12-02T18:55:02.967",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.exploit-db.com/exploits/18155"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/50803"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71479"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "https://support.zabbix.com/browse/ZBX-4385"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.exploit-db.com/exploits/18155"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/50803"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71479"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "https://support.zabbix.com/browse/ZBX-4385"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-89"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-01-13 16:15
Modified
2024-11-21 06:48
Summary
In the case of instances where the SAML SSO authentication is enabled (non-default), session data can be modified by a malicious actor, because a user login stored in the session was not verified. Malicious unauthenticated actor may exploit this issue to escalate privileges and gain admin access to Zabbix Frontend. To perform the attack, SAML authentication is required to be enabled and the actor has to know the username of Zabbix user (or use the guest account, which is disabled by default).
References
Impacted products
Vendor Product Version
zabbix zabbix *
zabbix zabbix 6.0.0



{
  "cisaActionDue": "2022-03-08",
  "cisaExploitAdd": "2022-02-22",
  "cisaRequiredAction": "Apply updates per vendor instructions.",
  "cisaVulnerabilityName": "Zabbix Frontend Authentication Bypass Vulnerability",
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "19429F9A-8623-4BA9-984B-4982418C21CD",
              "versionEndIncluding": "5.4.8",
              "versionStartIncluding": "5.4.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:6.0.0:alpha1:*:*:*:*:*:*",
              "matchCriteriaId": "0DC67B03-AF43-45C9-8EAC-D60DA5887712",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "In the case of instances where the SAML SSO authentication is enabled (non-default), session data can be modified by a malicious actor, because a user login stored in the session was not verified. Malicious unauthenticated actor may exploit this issue to escalate privileges and gain admin access to Zabbix Frontend. To perform the attack, SAML authentication is required to be enabled and the actor has to know the username of Zabbix user (or use the guest account, which is disabled by default)."
    },
    {
      "lang": "es",
      "value": "En el caso de las instancias en las que la autenticaci\u00f3n SAML SSO est\u00e1 habilitada (no por defecto), los datos de la sesi\u00f3n pueden ser modificados por un actor malicioso, ya que un login de usuario almacenado en la sesi\u00f3n no fue verificado. Un actor malicioso no autenticado puede explotar este problema para escalar privilegios y conseguir acceso de administrador a Zabbix Frontend. Para llevar a cabo el ataque, es requerido que la autenticaci\u00f3n SAML est\u00e9 habilitada y que el actor conozca el nombre de usuario de Zabbix (o que use la cuenta de invitado, que est\u00e1 deshabilitada por defecto)"
    }
  ],
  "id": "CVE-2022-23131",
  "lastModified": "2024-11-21T06:48:03.847",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "HIGH",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.1,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 4.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 9.1,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.2,
        "source": "security@zabbix.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-01-13T16:15:08.053",
  "references": [
    {
      "source": "security@zabbix.com",
      "tags": [
        "Issue Tracking",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://support.zabbix.com/browse/ZBX-20350"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://support.zabbix.com/browse/ZBX-20350"
    }
  ],
  "sourceIdentifier": "security@zabbix.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-290"
        }
      ],
      "source": "security@zabbix.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-290"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2019-10-09 14:15
Modified
2024-11-21 04:32
Severity ?
Summary
An issue was discovered in zabbix.php?action=dashboard.view&dashboardid=1 in Zabbix through 4.4. An attacker can bypass the login page and access the dashboard page, and then create a Dashboard, Report, Screen, or Map without any Username/Password (i.e., anonymously). All created elements (Dashboard/Report/Screen/Map) are accessible by other users and by an admin.
Impacted products
Vendor Product Version
zabbix zabbix *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "646DDD09-8E56-430F-A261-4254514B7FA1",
              "versionEndIncluding": "4.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "An issue was discovered in zabbix.php?action=dashboard.view\u0026dashboardid=1 in Zabbix through 4.4. An attacker can bypass the login page and access the dashboard page, and then create a Dashboard, Report, Screen, or Map without any Username/Password (i.e., anonymously). All created elements (Dashboard/Report/Screen/Map) are accessible by other users and by an admin."
    },
    {
      "lang": "es",
      "value": "Se detect\u00f3 un problema en zabbix.php?action=dashboard.view\u0026amp;dashboardid=1 en Zabbix versiones hasta 4.4. Un atacante puede omitir la p\u00e1gina login y acceder a la p\u00e1gina dashboard, y luego crear un Dashboard, Report, Screen, o Map sin ning\u00fan Nombre de Usuario/Contrase\u00f1a (es decir, de forma an\u00f3nima). Todos los elementos creados (Dashboard/Report/Screen/Map) son accesibles por otros usuarios y por un administrador."
    }
  ],
  "id": "CVE-2019-17382",
  "lastModified": "2024-11-21T04:32:13.523",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 6.4,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 4.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 9.1,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.2,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-10-09T14:15:12.817",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00027.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://www.exploit-db.com/exploits/47467"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00027.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://www.exploit-db.com/exploits/47467"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-639"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2017-05-24 14:29
Modified
2024-11-21 03:24
Summary
An exploitable code execution vulnerability exists in the trapper command functionality of Zabbix Server 2.4.X. A specially crafted set of packets can cause a command injection resulting in remote code execution. An attacker can make requests from an active Zabbix Proxy to trigger this vulnerability.
Impacted products
Vendor Product Version
zabbix zabbix 2.4.0
zabbix zabbix 2.4.0
zabbix zabbix 2.4.0
zabbix zabbix 2.4.0
zabbix zabbix 2.4.1
zabbix zabbix 2.4.1
zabbix zabbix 2.4.1
zabbix zabbix 2.4.2
zabbix zabbix 2.4.2
zabbix zabbix 2.4.3
zabbix zabbix 2.4.3
zabbix zabbix 2.4.4
zabbix zabbix 2.4.4
zabbix zabbix 2.4.5
zabbix zabbix 2.4.5
zabbix zabbix 2.4.6
zabbix zabbix 2.4.6
zabbix zabbix 2.4.7
zabbix zabbix 2.4.7
zabbix zabbix 2.4.8
zabbix zabbix 2.4.8
zabbix zabbix 2.4.9
zabbix zabbix 2.4.9



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B847CEDA-6C3E-44DC-952B-9F92EF2E060A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.4.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "379C720C-1F28-487D-8AF8-873E916B18DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.4.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "10D1EA2C-35CC-4E35-BA5C-B0BC9D3BEEEB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.4.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "1A799E7F-C2FB-4F2C-A8C0-6254DAF8C625",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E036381E-C3B3-4E13-9FB3-1CAF15D900DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.4.1:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "66CF407E-71E0-4163-B4E7-346BF6164183",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.4.1:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "B81CDC64-CB3F-4939-BAC1-591F92D69D88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9080E8A-E1E6-46CB-B766-D8E4B68C4B08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.4.2:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "074D6347-699F-4FEB-969C-CC02751B17D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C32BD321-01C3-4910-9058-A5582A27A6D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.4.3:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "DEA0EC11-C95B-42E5-B5D0-6D938D7F909B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "85ACEED4-E5FD-42D2-BDF3-96B46EE2B9D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.4.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "BF7D63B5-8660-4B23-89EA-009EF560F95F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "B73B67B9-7184-4E7E-AA3D-52CD8A7A0CEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.4.5:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "9C2A84A1-06C7-4300-BEA6-39C4E7468665",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "59B2EB47-2255-4B56-85A5-2B6261EA93AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.4.6:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "55C1F15D-DF51-447D-87AD-C2DA4F118E32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE8C066D-3290-4073-AF74-C13ED3C733DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.4.7:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "A610E4AB-BA66-4059-B9C4-D13C4B54804A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.4.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "44D7778B-738C-42B4-81D7-DFB5456D8909",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.4.8:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "7C8623D3-5A16-45E7-8F26-6F1B7DAC51A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.4.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2E5EA48-E8E3-4214-9D23-25AB677FE96B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.4.9:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "556EE336-9968-48A6-9B1B-064ABF39D95A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "An exploitable code execution vulnerability exists in the trapper command functionality of Zabbix Server 2.4.X. A specially crafted set of packets can cause a command injection resulting in remote code execution. An attacker can make requests from an active Zabbix Proxy to trigger this vulnerability."
    },
    {
      "lang": "es",
      "value": "Se presenta una vulnerabilidad de ejecuci\u00f3n de c\u00f3digo explotable en la funcionalidad trapper command de Zabbix Server versiones 2.4.X. Un conjunto de paquetes especialmente dise\u00f1ado puede causar una inyecci\u00f3n de comando resultando en la ejecuci\u00f3n de c\u00f3digo remota. Un atacante puede realizar peticiones desde un Proxy Zabbix activo para desencadenar esta vulnerabilidad."
    }
  ],
  "id": "CVE-2017-2824",
  "lastModified": "2024-11-21T03:24:13.443",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.1,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 2.2,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2017-05-24T14:29:00.707",
  "references": [
    {
      "source": "talos-cna@cisco.com",
      "url": "http://www.debian.org/security/2017/dsa-3937"
    },
    {
      "source": "talos-cna@cisco.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/98083"
    },
    {
      "source": "talos-cna@cisco.com",
      "tags": [
        "Exploit",
        "Mitigation",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2017-0325"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2017/dsa-3937"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/98083"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Mitigation",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2017-0325"
    }
  ],
  "sourceIdentifier": "talos-cna@cisco.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-78"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2009-12-31 18:30
Modified
2024-11-21 01:09
Severity ?
Summary
The NET_TCP_LISTEN function in net.c in Zabbix Agent before 1.6.7, when running on FreeBSD or Solaris, allows remote attackers to bypass the EnableRemoteCommands setting and execute arbitrary commands via shell metacharacters in the argument to net.tcp.listen. NOTE: this attack is limited to attacks from trusted IP addresses.
Impacted products
Vendor Product Version
zabbix zabbix *
zabbix zabbix 1.1.2
zabbix zabbix 1.1.3
zabbix zabbix 1.1.4
zabbix zabbix 1.1.5
zabbix zabbix 1.4.2
zabbix zabbix 1.4.3
zabbix zabbix 1.4.4
zabbix zabbix 1.4.6
freebsd freebsd *
sun solaris *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "44AC67DF-D478-4D13-939C-B3659CEC41F1",
              "versionEndIncluding": "1.6.6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0FB47B1-330E-4ED4-A4AF-993DC613B782",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA7AA37E-2E1A-471D-95AE-83A2CABF1DF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "DFABFF16-FD5E-4FCF-BDF8-AE8D654CEAD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "03E211F0-2F61-4503-AE89-0F750C2848B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "55BC3D41-DB27-4509-8908-0A7F0A19206E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "96A266AD-7853-40D0-8D1B-6ECFF34A76AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB1611DD-8EB1-49FE-8995-C9D853F812F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C27222F-3FA6-4F9A-A017-37B77E536CFF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9EC02F3-3905-460D-8949-3B26394215CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:sun:solaris:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "469B74F2-4B89-42B8-8638-731E92D463B9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The NET_TCP_LISTEN function in net.c in Zabbix Agent before 1.6.7, when running on FreeBSD or Solaris, allows remote attackers to bypass the EnableRemoteCommands setting and execute arbitrary commands via shell metacharacters in the argument to net.tcp.listen.  NOTE: this attack is limited to attacks from trusted IP addresses."
    },
    {
      "lang": "es",
      "value": "La funci\u00f3n NET_TCP_LISTEN en net.c en Zabbix Agent versiones anteriores a v1.6.7, cuando se ejecuta en FreeBSD o Solaris, permite a atacantes remotos eludir la asignaci\u00f3n de EnableRemoteCommands y ejecutar comandos de su elecci\u00f3n mediante metacaracteres del interprete de comandos en el argumento de net.tcp.listen. NOTA: este ataque est\u00e1 limitado a ser realizado desde direcciones IP de confianza."
    }
  ],
  "id": "CVE-2009-4502",
  "lastModified": "2024-11-21T01:09:47.750",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 9.3,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2009-12-31T18:30:01.797",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/37740"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/508439"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/3514"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "https://support.zabbix.com/browse/ZBX-1032"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/37740"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/508439"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/3514"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "https://support.zabbix.com/browse/ZBX-1032"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-264"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-08-12 13:38
Modified
2024-12-10 19:21
Summary
Zabbix allows to configure SMS notifications. AT command injection occurs on "Zabbix Server" because there is no validation of "Number" field on Web nor on Zabbix server side. Attacker can run test of SMS providing specially crafted phone number and execute additional AT commands on modem.
Impacted products
Vendor Product Version
zabbix zabbix *
zabbix zabbix *
zabbix zabbix *
zabbix zabbix 7.0.0
zabbix zabbix 7.0.0
zabbix zabbix 7.0.0
zabbix zabbix 7.0.0
zabbix zabbix 7.0.0
zabbix zabbix 7.0.0
zabbix zabbix 7.0.0
zabbix zabbix 7.0.0
zabbix zabbix 7.0.0
zabbix zabbix 7.0.0
zabbix zabbix 7.0.0
zabbix zabbix 7.0.0
zabbix zabbix 7.0.0
zabbix zabbix 7.0.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5950D0D-9DFF-4B36-9AAF-43CBCEFE7101",
              "versionEndIncluding": "5.0.42",
              "versionStartIncluding": "5.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1D26F5C-A94F-4273-81D7-7DDF7541C3E7",
              "versionEndIncluding": "6.0.30",
              "versionStartIncluding": "6.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0DA6900-EB3E-4867-BD97-243686EECADD",
              "versionEndIncluding": "6.4.15",
              "versionStartIncluding": "6.4.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:alpha1:*:*:*:*:*:*",
              "matchCriteriaId": "93EB5757-7F98-4428-9616-C30A647A6612",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:alpha2:*:*:*:*:*:*",
              "matchCriteriaId": "DA00BDB5-433F-44E5-87AC-DA01C64B5DB3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:alpha3:*:*:*:*:*:*",
              "matchCriteriaId": "98C46C92-9D86-45CD-88FE-DFBB5502BB88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:alpha4:*:*:*:*:*:*",
              "matchCriteriaId": "B568E6DD-A6D1-4402-BB40-7DA2596A5BC8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:alpha5:*:*:*:*:*:*",
              "matchCriteriaId": "B9C3673B-8459-4C63-8E90-724D1D42A8BB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:alpha6:*:*:*:*:*:*",
              "matchCriteriaId": "7C9F6957-7526-4852-A579-DE556DBFAA97",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:alpha7:*:*:*:*:*:*",
              "matchCriteriaId": "81A7A191-93DE-4C5D-963E-E8890FF7AACA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:alpha8:*:*:*:*:*:*",
              "matchCriteriaId": "AEE202D5-3C88-43A5-9328-FC78D0B9B8CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:alpha9:*:*:*:*:*:*",
              "matchCriteriaId": "F88BFB75-7951-47D5-941F-3839E9E31FFA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "8216247E-C160-4D2C-906E-9D8CD731B5C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "06548219-0DC3-4B5B-85D1-B1EE0FA30CD2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "4D23985B-2F4D-41F6-B9D6-7B184FC7E447",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "97964B9B-6A5E-4547-8886-E81B0849A876",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "40992B5F-0D83-4D5C-9188-E84C369FF92F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Zabbix allows to configure SMS notifications. AT command injection occurs on \"Zabbix Server\" because there is no validation of \"Number\" field on Web nor on Zabbix server side. Attacker can run test of SMS providing specially crafted phone number and execute additional AT commands on modem."
    },
    {
      "lang": "es",
      "value": "Zabbix permite configurar notificaciones por SMS. La inyecci\u00f3n del comando AT ocurre en el \"Servidor Zabbix\" porque no hay validaci\u00f3n del campo \"N\u00famero\" en la Web ni en el lado del servidor Zabbix. El atacante puede ejecutar una prueba de SMS proporcionando un n\u00famero de tel\u00e9fono especialmente manipulado y ejecutar comandos AT adicionales en el m\u00f3dem."
    }
  ],
  "id": "CVE-2024-22122",
  "lastModified": "2024-12-10T19:21:09.207",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 3.0,
          "baseSeverity": "LOW",
          "confidentialityImpact": "NONE",
          "integrityImpact": "LOW",
          "privilegesRequired": "HIGH",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.3,
        "impactScore": 1.4,
        "source": "security@zabbix.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.1,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.3,
        "impactScore": 6.0,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-08-12T13:38:16.310",
  "references": [
    {
      "source": "security@zabbix.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://support.zabbix.com/browse/ZBX-25012"
    }
  ],
  "sourceIdentifier": "security@zabbix.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-77"
        }
      ],
      "source": "security@zabbix.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-77"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-08-12 13:38
Modified
2024-12-10 16:19
Summary
A non-admin user can change or remove important features within the Zabbix Agent application, thus impacting the integrity and availability of the application.
Impacted products
Vendor Product Version
zabbix zabbix *
zabbix zabbix *
zabbix zabbix *
zabbix zabbix 7.0.0
zabbix zabbix 7.0.0
zabbix zabbix 7.0.0
zabbix zabbix 7.0.0
zabbix zabbix 7.0.0
zabbix zabbix 7.0.0
zabbix zabbix 7.0.0
zabbix zabbix 7.0.0
zabbix zabbix 7.0.0
zabbix zabbix 7.0.0
zabbix zabbix 7.0.0
zabbix zabbix 7.0.0
zabbix zabbix 7.0.0
zabbix zabbix 7.0.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5950D0D-9DFF-4B36-9AAF-43CBCEFE7101",
              "versionEndIncluding": "5.0.42",
              "versionStartIncluding": "5.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1D26F5C-A94F-4273-81D7-7DDF7541C3E7",
              "versionEndIncluding": "6.0.30",
              "versionStartIncluding": "6.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0DA6900-EB3E-4867-BD97-243686EECADD",
              "versionEndIncluding": "6.4.15",
              "versionStartIncluding": "6.4.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:alpha1:*:*:*:*:*:*",
              "matchCriteriaId": "93EB5757-7F98-4428-9616-C30A647A6612",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:alpha2:*:*:*:*:*:*",
              "matchCriteriaId": "DA00BDB5-433F-44E5-87AC-DA01C64B5DB3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:alpha3:*:*:*:*:*:*",
              "matchCriteriaId": "98C46C92-9D86-45CD-88FE-DFBB5502BB88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:alpha4:*:*:*:*:*:*",
              "matchCriteriaId": "B568E6DD-A6D1-4402-BB40-7DA2596A5BC8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:alpha5:*:*:*:*:*:*",
              "matchCriteriaId": "B9C3673B-8459-4C63-8E90-724D1D42A8BB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:alpha6:*:*:*:*:*:*",
              "matchCriteriaId": "7C9F6957-7526-4852-A579-DE556DBFAA97",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:alpha7:*:*:*:*:*:*",
              "matchCriteriaId": "81A7A191-93DE-4C5D-963E-E8890FF7AACA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:alpha8:*:*:*:*:*:*",
              "matchCriteriaId": "AEE202D5-3C88-43A5-9328-FC78D0B9B8CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:alpha9:*:*:*:*:*:*",
              "matchCriteriaId": "F88BFB75-7951-47D5-941F-3839E9E31FFA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "8216247E-C160-4D2C-906E-9D8CD731B5C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "06548219-0DC3-4B5B-85D1-B1EE0FA30CD2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "4D23985B-2F4D-41F6-B9D6-7B184FC7E447",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "97964B9B-6A5E-4547-8886-E81B0849A876",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "40992B5F-0D83-4D5C-9188-E84C369FF92F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A non-admin user can change or remove important features within the Zabbix Agent application, thus impacting the integrity and availability of the application."
    },
    {
      "lang": "es",
      "value": "Un usuario que no sea administrador puede cambiar o eliminar funciones importantes dentro de la aplicaci\u00f3n Zabbix Agent, lo que afectar\u00e1 la integridad y disponibilidad de la aplicaci\u00f3n."
    }
  ],
  "id": "CVE-2024-22121",
  "lastModified": "2024-12-10T16:19:19.810",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "LOW",
          "baseScore": 6.1,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 4.2,
        "source": "security@zabbix.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "LOW",
          "baseScore": 6.1,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 4.2,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-08-12T13:38:16.070",
  "references": [
    {
      "source": "security@zabbix.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://support.zabbix.com/browse/ZBX-25011"
    }
  ],
  "sourceIdentifier": "security@zabbix.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-281"
        }
      ],
      "source": "security@zabbix.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-281"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2012-08-15 20:55
Modified
2024-11-21 01:40
Severity ?
Summary
SQL injection vulnerability in frontends/php/popup_bitem.php in Zabbix 1.8.15rc1 and earlier, and 2.x before 2.0.2rc1, allows remote attackers to execute arbitrary SQL commands via the itemid parameter.
References
secalert@redhat.comhttp://git.zabbixzone.com/zabbix2.0/.git/commitdiff/333a3a5542ba8a2c901c24b7bf5440f41f1f4f54Exploit, Patch
secalert@redhat.comhttp://osvdb.org/84127
secalert@redhat.comhttp://secunia.com/advisories/49809Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/50475
secalert@redhat.comhttp://www.debian.org/security/2012/dsa-2539
secalert@redhat.comhttp://www.exploit-db.com/exploits/20087Exploit
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2012/07/27/6
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2012/07/28/3
secalert@redhat.comhttp://www.securityfocus.com/bid/54661Exploit
secalert@redhat.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/77195
secalert@redhat.comhttps://support.zabbix.com/browse/ZBX-5348
af854a3a-2127-422b-91ae-364da2661108http://git.zabbixzone.com/zabbix2.0/.git/commitdiff/333a3a5542ba8a2c901c24b7bf5440f41f1f4f54Exploit, Patch
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/84127
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/49809Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/50475
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2012/dsa-2539
af854a3a-2127-422b-91ae-364da2661108http://www.exploit-db.com/exploits/20087Exploit
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2012/07/27/6
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2012/07/28/3
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/54661Exploit
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/77195
af854a3a-2127-422b-91ae-364da2661108https://support.zabbix.com/browse/ZBX-5348
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:*:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "E259179F-B39F-4D00-A1D1-3BF19FEC30B8",
              "versionEndIncluding": "1.8.15",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E916BD0-BA65-4895-B6A1-1F30E1178BEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1:beta10:*:*:*:*:*:*",
              "matchCriteriaId": "1B3EBE7F-36B9-4D00-B2CF-E933F2A7D578",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1:beta11:*:*:*:*:*:*",
              "matchCriteriaId": "472C48A5-7E2E-440D-A92C-D7F180CD630C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1:beta12:*:*:*:*:*:*",
              "matchCriteriaId": "02A06CE1-FE5B-46C5-8E1A-3EEF0E1B0D4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "00A0CA98-C23B-4042-A55F-9ED6F3A2DB5E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "481DB798-D0F7-48D2-9A07-2785FF31E613",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "A0EC0649-B10E-4557-8D67-FAAAF4AB04B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1:beta5:*:*:*:*:*:*",
              "matchCriteriaId": "ED71C8A8-14FD-4183-99AA-D9359E8DCF32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1:beta6:*:*:*:*:*:*",
              "matchCriteriaId": "16FF6B60-5D7F-4288-9CAF-1FD96DF8D318",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1:beta7:*:*:*:*:*:*",
              "matchCriteriaId": "CFA20306-A682-42AD-A8E9-A623D06476E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1:beta8:*:*:*:*:*:*",
              "matchCriteriaId": "2EA9F77B-7F7D-43C8-97EA-0985A2E275CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1:beta9:*:*:*:*:*:*",
              "matchCriteriaId": "9DA4C658-BF18-484C-9A72-EDC79E55BBF8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0FDE68D0-CF1B-4063-B3DD-850EFF17B4F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0FB47B1-330E-4ED4-A4AF-993DC613B782",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA7AA37E-2E1A-471D-95AE-83A2CABF1DF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "DFABFF16-FD5E-4FCF-BDF8-AE8D654CEAD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "03E211F0-2F61-4503-AE89-0F750C2848B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "652DC200-54ED-4354-A80C-62253CC42210",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "C581C36A-70EE-4E06-9A4C-7CDF99C0E80A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.3:beta:*:*:*:*:*:*",
              "matchCriteriaId": "A660D65E-D5C9-4D33-ABC2-E803644D0666",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.3.1:beta:*:*:*:*:*:*",
              "matchCriteriaId": "8080D8E8-738D-4EBE-B5A3-6F8819617890",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.3.2:beta:*:*:*:*:*:*",
              "matchCriteriaId": "DBC71B56-59CA-4189-BAF0-AA511FF5B944",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.3.3:beta:*:*:*:*:*:*",
              "matchCriteriaId": "13620EBC-D721-47C9-B054-8C243E300773",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.3.4:beta:*:*:*:*:*:*",
              "matchCriteriaId": "72BEAE7A-97FA-4A9E-8F3E-082F3D73597F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.3.5:beta:*:*:*:*:*:*",
              "matchCriteriaId": "CA18F8F3-33FD-4FD0-B739-23B279ABCB32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.3.6:beta:*:*:*:*:*:*",
              "matchCriteriaId": "DA7D5B83-1D9A-4E7D-9F8B-391ED384C1B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.3.7:beta:*:*:*:*:*:*",
              "matchCriteriaId": "76957BA1-20EB-4CD9-8F6F-6B742DE4B7A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.3.8:beta:*:*:*:*:*:*",
              "matchCriteriaId": "09CB3919-850F-420C-B148-7434DF8F4237",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "55BC3D41-DB27-4509-8908-0A7F0A19206E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "96A266AD-7853-40D0-8D1B-6ECFF34A76AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB1611DD-8EB1-49FE-8995-C9D853F812F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F75B7137-657E-4230-BEDA-D8EA2824138B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C27222F-3FA6-4F9A-A017-37B77E536CFF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.5:beta:*:*:*:*:*:*",
              "matchCriteriaId": "8E3057C0-8AF2-48CE-A60B-EDA138E36BC1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.5.1:beta:*:*:*:*:*:*",
              "matchCriteriaId": "CF50FF14-C17D-4043-BD33-F25BE29F583C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.5.2:beta:*:*:*:*:*:*",
              "matchCriteriaId": "4514843A-41E3-4318-BBF0-8304E51F62F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.5.3:beta:*:*:*:*:*:*",
              "matchCriteriaId": "3493784D-992A-461B-944F-D1067E43FC0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.5.4:beta:*:*:*:*:*:*",
              "matchCriteriaId": "0F7EECAF-5F40-480D-9532-9970EEBFBD71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "90F4BAE5-9A6F-4757-B413-9024FF4C9832",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6379BE78-7EFA-4D61-A97D-D336C6F30E00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E70F0D2-1D7C-4B65-B5FC-8DA2CD73E26F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7085354-F91A-4594-9E7A-5F823F8BF189",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C942C4C-2162-4C36-89BC-18F56E81280A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "7337CDB5-4E3F-41B6-A502-F86FCBA81F72",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.6.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "6866F9A2-3986-4F63-8DBA-23E4B59A0C11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.6.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC04F70A-4CB2-486F-BA7B-514065BC00AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.6.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "A293369B-4B44-4210-8D39-407536513897",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.6.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A42EBE3-FEF9-4158-ADD6-063ED75F6683",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C4A2B75-0B3B-46EC-BA80-A528DEF58DAB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B9506E6-3011-430A-B099-AFBF0CE4830B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "13C94196-4CC6-4827-944A-197F748A48E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B6DB768-148D-4067-9202-42B9C16F3DFF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "A24470D7-B73D-4253-AED2-4BE8C015D965",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD5EC94A-383D-45A5-A1BC-5F14D54FD588",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B024F97A-00AA-449D-8726-03D9E6B89541",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CEF7DE3-7A87-4283-A7DF-FD57823C8F47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.3:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "D659F67E-74CD-438C-99BE-BC0B91027D2B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.3:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "2875B4AE-D445-4902-8D73-A0274FAD20D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.3:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "92FF443D-EE65-4223-9CC7-AB120D72A260",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A13691AD-76EE-461B-A5A8-C8433AC907CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "FD58979B-18BA-4B41-9C22-90547142834B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "22F76D62-B906-4E1A-9409-15FB797CCB8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "F9283820-AD7D-4131-BD51-7FF9B16F0EDC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.0:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "FC29F910-EBD9-4BB5-B1D3-754F6273135F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.0:rc5:*:*:*:*:*:*",
              "matchCriteriaId": "5AF8633B-C79E-4628-ACEF-12A9B0850655",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.0:rc6:*:*:*:*:*:*",
              "matchCriteriaId": "6567C7EB-90A1-467D-95A5-B0EDC3167A69",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7F5CFFB-7492-4E87-8B85-2EB99CE2A9EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.1:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "66E16901-F3BB-4D6A-8ECD-D94091236BEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.1:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "B6AA88B4-E0BD-4BD5-8003-50EA33FEAEA7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "SQL injection vulnerability in frontends/php/popup_bitem.php in Zabbix 1.8.15rc1 and earlier, and 2.x before 2.0.2rc1, allows remote attackers to execute arbitrary SQL commands via the itemid parameter."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de inyecci\u00f3n SQL en interfaces/php/popup_bitem.php en Zabbix v1.8.15rc1 y anteriores, y v2.x antes de v2.0.2rc1, permite a atacantes remotos ejecutar comandos SQL de su elecci\u00f3n a trav\u00e9s del par\u00e1metro itemid.\r\n"
    }
  ],
  "id": "CVE-2012-3435",
  "lastModified": "2024-11-21T01:40:52.363",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-08-15T20:55:03.070",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://git.zabbixzone.com/zabbix2.0/.git/commitdiff/333a3a5542ba8a2c901c24b7bf5440f41f1f4f54"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://osvdb.org/84127"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/49809"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/50475"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.debian.org/security/2012/dsa-2539"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.exploit-db.com/exploits/20087"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.openwall.com/lists/oss-security/2012/07/27/6"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.openwall.com/lists/oss-security/2012/07/28/3"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/54661"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77195"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://support.zabbix.com/browse/ZBX-5348"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://git.zabbixzone.com/zabbix2.0/.git/commitdiff/333a3a5542ba8a2c901c24b7bf5440f41f1f4f54"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/84127"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/49809"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/50475"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2012/dsa-2539"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.exploit-db.com/exploits/20087"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2012/07/27/6"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2012/07/28/3"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/54661"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77195"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://support.zabbix.com/browse/ZBX-5348"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-89"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2011-08-19 21:55
Modified
2024-11-21 01:30
Severity ?
Summary
zabbix_agentd in Zabbix before 1.8.6 and 1.9.x before 1.9.4 allows context-dependent attackers to cause a denial of service (CPU consumption) by executing the vfs.file.cksum command for a special device, as demonstrated by the /dev/urandom device.
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D78293D-800A-497D-86ED-A32181AB6F60",
              "versionEndIncluding": "1.8.5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E916BD0-BA65-4895-B6A1-1F30E1178BEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1:beta10:*:*:*:*:*:*",
              "matchCriteriaId": "1B3EBE7F-36B9-4D00-B2CF-E933F2A7D578",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1:beta11:*:*:*:*:*:*",
              "matchCriteriaId": "472C48A5-7E2E-440D-A92C-D7F180CD630C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1:beta12:*:*:*:*:*:*",
              "matchCriteriaId": "02A06CE1-FE5B-46C5-8E1A-3EEF0E1B0D4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "00A0CA98-C23B-4042-A55F-9ED6F3A2DB5E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "481DB798-D0F7-48D2-9A07-2785FF31E613",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "A0EC0649-B10E-4557-8D67-FAAAF4AB04B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1:beta5:*:*:*:*:*:*",
              "matchCriteriaId": "ED71C8A8-14FD-4183-99AA-D9359E8DCF32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1:beta6:*:*:*:*:*:*",
              "matchCriteriaId": "16FF6B60-5D7F-4288-9CAF-1FD96DF8D318",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1:beta7:*:*:*:*:*:*",
              "matchCriteriaId": "CFA20306-A682-42AD-A8E9-A623D06476E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1:beta8:*:*:*:*:*:*",
              "matchCriteriaId": "2EA9F77B-7F7D-43C8-97EA-0985A2E275CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1:beta9:*:*:*:*:*:*",
              "matchCriteriaId": "9DA4C658-BF18-484C-9A72-EDC79E55BBF8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0FDE68D0-CF1B-4063-B3DD-850EFF17B4F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0FB47B1-330E-4ED4-A4AF-993DC613B782",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA7AA37E-2E1A-471D-95AE-83A2CABF1DF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "DFABFF16-FD5E-4FCF-BDF8-AE8D654CEAD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "03E211F0-2F61-4503-AE89-0F750C2848B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "652DC200-54ED-4354-A80C-62253CC42210",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "C581C36A-70EE-4E06-9A4C-7CDF99C0E80A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.3:beta:*:*:*:*:*:*",
              "matchCriteriaId": "A660D65E-D5C9-4D33-ABC2-E803644D0666",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.3.1:beta:*:*:*:*:*:*",
              "matchCriteriaId": "8080D8E8-738D-4EBE-B5A3-6F8819617890",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.3.2:beta:*:*:*:*:*:*",
              "matchCriteriaId": "DBC71B56-59CA-4189-BAF0-AA511FF5B944",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.3.3:beta:*:*:*:*:*:*",
              "matchCriteriaId": "13620EBC-D721-47C9-B054-8C243E300773",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.3.4:beta:*:*:*:*:*:*",
              "matchCriteriaId": "72BEAE7A-97FA-4A9E-8F3E-082F3D73597F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.3.5:beta:*:*:*:*:*:*",
              "matchCriteriaId": "CA18F8F3-33FD-4FD0-B739-23B279ABCB32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.3.6:beta:*:*:*:*:*:*",
              "matchCriteriaId": "DA7D5B83-1D9A-4E7D-9F8B-391ED384C1B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.3.7:beta:*:*:*:*:*:*",
              "matchCriteriaId": "76957BA1-20EB-4CD9-8F6F-6B742DE4B7A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.3.8:beta:*:*:*:*:*:*",
              "matchCriteriaId": "09CB3919-850F-420C-B148-7434DF8F4237",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "55BC3D41-DB27-4509-8908-0A7F0A19206E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "96A266AD-7853-40D0-8D1B-6ECFF34A76AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB1611DD-8EB1-49FE-8995-C9D853F812F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F75B7137-657E-4230-BEDA-D8EA2824138B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C27222F-3FA6-4F9A-A017-37B77E536CFF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.5:beta:*:*:*:*:*:*",
              "matchCriteriaId": "8E3057C0-8AF2-48CE-A60B-EDA138E36BC1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.5.1:beta:*:*:*:*:*:*",
              "matchCriteriaId": "CF50FF14-C17D-4043-BD33-F25BE29F583C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.5.2:beta:*:*:*:*:*:*",
              "matchCriteriaId": "4514843A-41E3-4318-BBF0-8304E51F62F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.5.3:beta:*:*:*:*:*:*",
              "matchCriteriaId": "3493784D-992A-461B-944F-D1067E43FC0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.5.4:beta:*:*:*:*:*:*",
              "matchCriteriaId": "0F7EECAF-5F40-480D-9532-9970EEBFBD71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "90F4BAE5-9A6F-4757-B413-9024FF4C9832",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6379BE78-7EFA-4D61-A97D-D336C6F30E00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E70F0D2-1D7C-4B65-B5FC-8DA2CD73E26F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7085354-F91A-4594-9E7A-5F823F8BF189",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C942C4C-2162-4C36-89BC-18F56E81280A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "7337CDB5-4E3F-41B6-A502-F86FCBA81F72",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.6.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "6866F9A2-3986-4F63-8DBA-23E4B59A0C11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.6.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC04F70A-4CB2-486F-BA7B-514065BC00AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.6.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "A293369B-4B44-4210-8D39-407536513897",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.6.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A42EBE3-FEF9-4158-ADD6-063ED75F6683",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C4A2B75-0B3B-46EC-BA80-A528DEF58DAB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B9506E6-3011-430A-B099-AFBF0CE4830B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "13C94196-4CC6-4827-944A-197F748A48E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B6DB768-148D-4067-9202-42B9C16F3DFF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "A24470D7-B73D-4253-AED2-4BE8C015D965",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD5EC94A-383D-45A5-A1BC-5F14D54FD588",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B024F97A-00AA-449D-8726-03D9E6B89541",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CEF7DE3-7A87-4283-A7DF-FD57823C8F47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D4332A9-1D31-41BB-B374-369C583639E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.3:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "D659F67E-74CD-438C-99BE-BC0B91027D2B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.3:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "2875B4AE-D445-4902-8D73-A0274FAD20D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.3:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "92FF443D-EE65-4223-9CC7-AB120D72A260",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF5BE8CC-AC6B-4F9F-9717-26931F524092",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "3EBAE908-9F0C-4840-BFF4-625710758E2A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.4:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "58687670-217C-461F-A2C1-272442331290",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.4:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "CB9EB46D-5333-4BE1-B7EA-704F34EFC871",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.4:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "C696B16B-093A-4C1E-8ECF-8AEA74DC05D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.5:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "D186E4E3-03BE-4D3E-8ED8-43D796B19A7F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.9.0:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "41490CA0-8DB5-404A-A8D6-09347B9DE4C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.9.1:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "89679BF0-22D3-491B-80EF-FBB7D9441F63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.9.2:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "C075AE6C-3CAB-4E4C-AB00-F4D63C55190A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.9.3:alpha:*:*:*:*:*:*",
              "matchCriteriaId": "7A4B67CC-F273-4964-8989-8485B2FFF6D7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "zabbix_agentd in Zabbix before 1.8.6 and 1.9.x before 1.9.4 allows context-dependent attackers to cause a denial of service (CPU consumption) by executing the vfs.file.cksum command for a special device, as demonstrated by the /dev/urandom device."
    },
    {
      "lang": "es",
      "value": "zabbix_agentd en Zabbix antes de las versiones v1.8.6 y v1.9.x antes de v1.9.4 permite provocar una denegaci\u00f3n de servicio (por consumo de CPU) a atacantes (dependiendo del contexto) mediante la ejecuci\u00f3n de la orden vfs.file.cksum de un dispositivo especial, por ejemplo el dispositivo /dev/urandom."
    }
  ],
  "id": "CVE-2011-3263",
  "lastModified": "2024-11-21T01:30:08.103",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-08-19T21:55:02.757",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.zabbix.com/rn1.8.6.php"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69378"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "https://support.zabbix.com/browse/ZBX-3794"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.zabbix.com/rn1.8.6.php"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69378"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "https://support.zabbix.com/browse/ZBX-3794"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-399"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2006-12-21 21:28
Modified
2024-11-21 00:23
Severity ?
Summary
Multiple buffer overflows in zabbix before 20061006 allow attackers to cause a denial of service (application crash) and possibly execute arbitrary code via long strings to the (1) zabbix_log and (2) zabbix_syslog functions.
Impacted products
Vendor Product Version
zabbix zabbix 1.1.2



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0FB47B1-330E-4ED4-A4AF-993DC613B782",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple buffer overflows in zabbix before 20061006 allow attackers to cause a denial of service (application crash) and possibly execute arbitrary code via long strings to the (1) zabbix_log and (2) zabbix_syslog functions."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples desbordamientos de b\u00fafer en zabbix versiones anteriores a 20061006, permite a atacantes provocar una denegaci\u00f3n de servicio     (ca\u00edda de aplicaci\u00f3n) y posiblemente ejecutar c\u00f3digo de su elecci\u00f3n mediante cadenas largas en las funciones (1) zabbix_log y (2) zabbix_syslog."
    }
  ],
  "id": "CVE-2006-6693",
  "lastModified": "2024-11-21T00:23:25.393",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": true,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2006-12-21T21:28:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi/zabbix.security.patch?bug=391388%3Bmsg=5%3Batt=1"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=391388"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/22313"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/20416"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2006/3959"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi/zabbix.security.patch?bug=391388%3Bmsg=5%3Batt=1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=391388"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/22313"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/20416"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/3959"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-08-12 13:38
Modified
2024-12-10 16:15
Summary
Uncontrolled resource consumption refers to a software vulnerability where a attacker or system uses excessive resources, such as CPU, memory, or network bandwidth, without proper limitations or controls. This can cause a denial-of-service (DoS) attack or degrade the performance of the affected system.
Impacted products
Vendor Product Version
zabbix zabbix 7.0.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "24103B6D-6CB0-4F86-BA59-426E24F9F72A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Uncontrolled resource consumption refers to a software vulnerability where a attacker or system uses excessive resources, such as CPU, memory, or network bandwidth, without proper limitations or controls. This can cause a denial-of-service (DoS) attack or degrade the performance of the affected system."
    },
    {
      "lang": "es",
      "value": "El consumo incontrolado de recursos se refiere a una vulnerabilidad de software en la que un atacante o un sistema utiliza recursos excesivos, como CPU, memoria o ancho de banda de red, sin las limitaciones o controles adecuados. Esto puede provocar un ataque de denegaci\u00f3n de servicio (DoS) o degradar el rendimiento del sistema afectado."
    }
  ],
  "id": "CVE-2024-36462",
  "lastModified": "2024-12-10T16:15:37.193",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "security@zabbix.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-08-12T13:38:22.400",
  "references": [
    {
      "source": "security@zabbix.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://support.zabbix.com/browse/ZBX-25019"
    }
  ],
  "sourceIdentifier": "security@zabbix.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-770"
        }
      ],
      "source": "security@zabbix.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-770"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2007-01-31 21:28
Modified
2024-11-21 00:26
Severity ?
Summary
Buffer overflow in ZABBIX before 1.1.5 has unknown impact and attack vectors related to "SNMP IP addresses."
Impacted products
Vendor Product Version
zabbix zabbix *
zabbix zabbix 1.1.2
zabbix zabbix 1.1.3



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C014718-7ABA-403A-A5C7-8DDCC45A7AD4",
              "versionEndIncluding": "1.1.4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0FB47B1-330E-4ED4-A4AF-993DC613B782",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA7AA37E-2E1A-471D-95AE-83A2CABF1DF5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Buffer overflow in ZABBIX before 1.1.5 has unknown impact and attack vectors related to \"SNMP IP addresses.\""
    },
    {
      "lang": "es",
      "value": "Desbordamiento de b\u00fafer en el ZABBIX en versiones anteriores a la 1.1.5 tiene un impacto desconocido y vectores de ataque relacionados con \"SNMP IP addresses\"."
    }
  ],
  "id": "CVE-2007-0640",
  "lastModified": "2024-11-21T00:26:22.653",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2007-01-31T21:28:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/33081"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/24020"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/22321"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2007/0416"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.zabbix.com/rn1.1.5.php"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32038"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/33081"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/24020"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/22321"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2007/0416"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.zabbix.com/rn1.1.5.php"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/32038"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-01-13 16:15
Modified
2024-11-21 06:48
Summary
After the initial setup process, some steps of setup.php file are reachable not only by super-administrators, but by unauthenticated users as well. Malicious actor can pass step checks and potentially change the configuration of Zabbix Frontend.
Impacted products



{
  "cisaActionDue": "2022-03-08",
  "cisaExploitAdd": "2022-02-22",
  "cisaRequiredAction": "Apply updates per vendor instructions.",
  "cisaVulnerabilityName": "Zabbix Frontend Improper Access Control Vulnerability",
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "19429F9A-8623-4BA9-984B-4982418C21CD",
              "versionEndIncluding": "5.4.8",
              "versionStartIncluding": "5.4.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:6.0.0:alpha1:*:*:*:*:*:*",
              "matchCriteriaId": "0DC67B03-AF43-45C9-8EAC-D60DA5887712",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:6.0.0:alpha2:*:*:*:*:*:*",
              "matchCriteriaId": "9C483257-D279-4A20-8451-1C2D34AF8C7D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:6.0.0:alpha3:*:*:*:*:*:*",
              "matchCriteriaId": "F9B37226-5339-4B5E-B515-BBC5D95A122D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:6.0.0:alpha4:*:*:*:*:*:*",
              "matchCriteriaId": "69B35CCA-9F00-4FED-B2F6-3A561369AF44",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:6.0.0:alpha5:*:*:*:*:*:*",
              "matchCriteriaId": "4270E53E-563E-4B60-9C19-5E8E78635B86",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:6.0.0:alpha6:*:*:*:*:*:*",
              "matchCriteriaId": "E7BCC855-4C6A-4E00-BA2A-3CAD738DF49D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:6.0.0:alpha7:*:*:*:*:*:*",
              "matchCriteriaId": "E5EE65D8-BD54-491F-8B61-A58D57C2D1CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:6.0.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "F78A52BB-9834-4D0C-A25C-52D46A4229CA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
              "matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
              "matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "After the initial setup process, some steps of setup.php file are reachable not only by super-administrators, but by unauthenticated users as well. Malicious actor can pass step checks and potentially change the configuration of Zabbix Frontend."
    },
    {
      "lang": "es",
      "value": "Despu\u00e9s del proceso de configuraci\u00f3n inicial, algunos pasos del archivo setup.php son accesibles no s\u00f3lo para los superadministradores, sino tambi\u00e9n para los usuarios no autenticados. Un actor malicioso puede pasar las comprobaciones de los pasos y potencialmente cambiar la configuraci\u00f3n de Zabbix Frontend"
    }
  ],
  "id": "CVE-2022-23134",
  "lastModified": "2024-11-21T06:48:04.340",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 3.7,
          "baseSeverity": "LOW",
          "confidentialityImpact": "NONE",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.2,
        "impactScore": 1.4,
        "source": "security@zabbix.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 1.4,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-01-13T16:15:08.227",
  "references": [
    {
      "source": "security@zabbix.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2022/02/msg00008.html"
    },
    {
      "source": "security@zabbix.com",
      "tags": [
        "Release Notes"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6SZYHXINBKCY42ITFSNCYE7KCSF33VRA/"
    },
    {
      "source": "security@zabbix.com",
      "tags": [
        "Release Notes"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VB6W556GVXOKUYTASTDGL3AI7S3SJHX7/"
    },
    {
      "source": "security@zabbix.com",
      "tags": [
        "Issue Tracking",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://support.zabbix.com/browse/ZBX-20384"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2022/02/msg00008.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6SZYHXINBKCY42ITFSNCYE7KCSF33VRA/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes"
      ],
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VB6W556GVXOKUYTASTDGL3AI7S3SJHX7/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://support.zabbix.com/browse/ZBX-20384"
    }
  ],
  "sourceIdentifier": "security@zabbix.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-284"
        }
      ],
      "source": "security@zabbix.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-287"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-10-12 07:15
Modified
2024-11-21 08:03
Summary
Memory pointer is in a property of the Ducktape object. This leads to multiple vulnerabilities related to direct memory access and manipulation.
Impacted products
Vendor Product Version
zabbix zabbix *
zabbix zabbix *
zabbix zabbix *
zabbix zabbix 7.0.0
zabbix zabbix 7.0.0
zabbix zabbix 7.0.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CAED9EA-BFA1-4BCF-8323-97AD46AC28C3",
              "versionEndIncluding": "5.0.36",
              "versionStartIncluding": "5.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "531CCCBF-46AD-4988-8A9D-ED4FD5208C71",
              "versionEndIncluding": "6.0.20",
              "versionStartIncluding": "6.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "868F271E-2595-4D01-BF53-46460F98891A",
              "versionEndIncluding": "6.4.5",
              "versionStartIncluding": "6.4.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:alpha1:*:*:*:*:*:*",
              "matchCriteriaId": "93EB5757-7F98-4428-9616-C30A647A6612",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:alpha2:*:*:*:*:*:*",
              "matchCriteriaId": "DA00BDB5-433F-44E5-87AC-DA01C64B5DB3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:alpha3:*:*:*:*:*:*",
              "matchCriteriaId": "98C46C92-9D86-45CD-88FE-DFBB5502BB88",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Memory pointer is in a property of the Ducktape object. This leads to multiple vulnerabilities related to direct memory access and manipulation."
    },
    {
      "lang": "es",
      "value": "El puntero de memoria est\u00e1 en una propiedad del objeto Ducktape. Esto conduce a m\u00faltiples vulnerabilidades relacionadas con el acceso directo y la manipulaci\u00f3n de la memoria."
    }
  ],
  "id": "CVE-2023-32724",
  "lastModified": "2024-11-21T08:03:55.080",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.1,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.1,
        "impactScore": 5.3,
        "source": "security@zabbix.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-10-12T07:15:10.713",
  "references": [
    {
      "source": "security@zabbix.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://support.zabbix.com/browse/ZBX-23391"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://support.zabbix.com/browse/ZBX-23391"
    }
  ],
  "sourceIdentifier": "security@zabbix.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-732"
        }
      ],
      "source": "security@zabbix.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-732"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-07-13 09:15
Modified
2024-11-21 07:57
Summary
JavaScript preprocessing, webhooks and global scripts can cause uncontrolled CPU, memory, and disk I/O utilization. Preprocessing/webhook/global script configuration and testing are only available to Administrative roles (Admin and Superadmin). Administrative privileges should be typically granted to users who need to perform tasks that require more control over the system. The security risk is limited because not all users have this level of access.
Impacted products
Vendor Product Version
zabbix zabbix *
zabbix zabbix *
zabbix zabbix *
zabbix zabbix 6.4.0
zabbix zabbix 6.4.0
zabbix zabbix 6.4.0
zabbix zabbix 6.4.0
zabbix zabbix 6.4.0
zabbix zabbix 6.4.0
zabbix zabbix 6.4.0
zabbix zabbix 6.4.0
zabbix zabbix 6.4.0
zabbix zabbix 6.4.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "351A035B-69D9-4AB1-A16E-D4EB07EE46BD",
              "versionEndIncluding": "5.0.31",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8481638-B840-4ACA-B42F-5DD7D0E3CE90",
              "versionEndIncluding": "6.0.13",
              "versionStartIncluding": "6.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B79D5429-153F-4555-8880-940DBA1F661E",
              "versionEndIncluding": "6.4.4",
              "versionStartIncluding": "6.4.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:6.4.0:alpha1:*:*:*:*:*:*",
              "matchCriteriaId": "F8EEB422-9B08-4BB9-A1DD-1F391B93031B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:6.4.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "D2DBFD04-80FA-496C-8A4D-36008777FCE3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:6.4.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "409DEB61-6951-48FE-8BA8-32AFE432C114",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:6.4.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "E596AE82-54AD-4689-A59C-E4E906439731",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:6.4.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "AD9D1FC3-9AD5-4281-82DD-46957ECD4EEF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:6.4.0:beta5:*:*:*:*:*:*",
              "matchCriteriaId": "81B14635-6FD0-4E9D-BCCD-3F88A3337B3A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:6.4.0:beta6:*:*:*:*:*:*",
              "matchCriteriaId": "425BB43B-4557-4D6F-9748-D0E6146A47E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:6.4.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "495EB7AA-D9AD-43C0-A04E-66013AF2DBC0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:6.4.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "1FCEBEB2-AD19-4259-9BAC-D96E55384193",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:6.4.0:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "E8290F5B-E1F0-4081-B365-CB1A7F2A5DA3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "JavaScript preprocessing, webhooks and global scripts can cause uncontrolled CPU, memory, and disk I/O utilization. Preprocessing/webhook/global script configuration and testing are only available to Administrative roles (Admin and Superadmin). Administrative privileges should be typically granted to users who need to perform tasks that require more control over the system. The security risk is limited because not all users have this level of access. "
    }
  ],
  "id": "CVE-2023-29449",
  "lastModified": "2024-11-21T07:57:04.727",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 5.9,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.2,
        "impactScore": 3.6,
        "source": "security@zabbix.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 4.9,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.2,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-07-13T09:15:09.263",
  "references": [
    {
      "source": "security@zabbix.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://support.zabbix.com/browse/ZBX-22589"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://support.zabbix.com/browse/ZBX-22589"
    }
  ],
  "sourceIdentifier": "security@zabbix.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-400"
        }
      ],
      "source": "security@zabbix.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-770"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2014-05-08 14:29
Modified
2024-11-21 02:04
Severity ?
Summary
The Frontend in Zabbix before 1.8.20rc2, 2.0.x before 2.0.11rc2, and 2.2.x before 2.2.2rc1 allows remote "Zabbix Admin" users to modify the media of arbitrary users via unspecified vectors.
Impacted products
Vendor Product Version
zabbix zabbix *
zabbix zabbix 1.8
zabbix zabbix 1.8.1
zabbix zabbix 1.8.2
zabbix zabbix 1.8.3
zabbix zabbix 1.8.3
zabbix zabbix 1.8.3
zabbix zabbix 1.8.15
zabbix zabbix 1.8.16
zabbix zabbix 1.8.18
zabbix zabbix 2.0.0
zabbix zabbix 2.0.0
zabbix zabbix 2.0.0
zabbix zabbix 2.0.0
zabbix zabbix 2.0.0
zabbix zabbix 2.0.0
zabbix zabbix 2.0.0
zabbix zabbix 2.0.1
zabbix zabbix 2.0.1
zabbix zabbix 2.0.1
zabbix zabbix 2.0.2
zabbix zabbix 2.0.2
zabbix zabbix 2.0.2
zabbix zabbix 2.0.3
zabbix zabbix 2.0.3
zabbix zabbix 2.0.3
zabbix zabbix 2.0.4
zabbix zabbix 2.0.4
zabbix zabbix 2.0.5
zabbix zabbix 2.0.5
zabbix zabbix 2.0.6
zabbix zabbix 2.0.6
zabbix zabbix 2.0.7
zabbix zabbix 2.0.8
zabbix zabbix 2.0.8
zabbix zabbix 2.0.9
zabbix zabbix 2.0.9
zabbix zabbix 2.0.10
zabbix zabbix 2.2.0
zabbix zabbix 2.2.0
zabbix zabbix 2.2.0
zabbix zabbix 2.2.1
zabbix zabbix 2.2.1
zabbix zabbix 2.2.1
fedoraproject fedora 19
fedoraproject fedora 20



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "79A05906-9760-4A6B-B914-0173D740B2B7",
              "versionEndIncluding": "1.8.19",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD5EC94A-383D-45A5-A1BC-5F14D54FD588",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B024F97A-00AA-449D-8726-03D9E6B89541",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CEF7DE3-7A87-4283-A7DF-FD57823C8F47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.3:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "D659F67E-74CD-438C-99BE-BC0B91027D2B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.3:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "2875B4AE-D445-4902-8D73-A0274FAD20D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.3:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "92FF443D-EE65-4223-9CC7-AB120D72A260",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.15:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "046656DC-D3F3-4F24-8159-9EA18DFD257D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "C79E3195-A556-41E0-AF0F-7D23075B8BC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "7480E2E8-041B-4A44-90D9-DAC7E59DA059",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A13691AD-76EE-461B-A5A8-C8433AC907CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "FD58979B-18BA-4B41-9C22-90547142834B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "22F76D62-B906-4E1A-9409-15FB797CCB8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "F9283820-AD7D-4131-BD51-7FF9B16F0EDC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.0:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "FC29F910-EBD9-4BB5-B1D3-754F6273135F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.0:rc5:*:*:*:*:*:*",
              "matchCriteriaId": "5AF8633B-C79E-4628-ACEF-12A9B0850655",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.0:rc6:*:*:*:*:*:*",
              "matchCriteriaId": "6567C7EB-90A1-467D-95A5-B0EDC3167A69",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7F5CFFB-7492-4E87-8B85-2EB99CE2A9EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.1:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "66E16901-F3BB-4D6A-8ECD-D94091236BEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.1:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "B6AA88B4-E0BD-4BD5-8003-50EA33FEAEA7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "29ACE6F0-E3B4-4B9D-A40A-47B66BA81FA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.2:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "052A7F4A-AFE3-454B-9714-A42CD225D329",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.2:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "E3F85FD0-B81B-486B-8D4C-CB845A430407",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E538292A-0573-4F6E-8504-F86863AE1D04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.3:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B56DAE34-7F6B-4534-9CF9-263C0D7A930B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.3:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "60AB2230-B919-43B3-92AD-64C030237BB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "8213C387-7A54-4C86-AB6C-DF72AA17EFD6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "3031E393-3CB3-4CF9-ACF9-23890BF5D46D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "20104F5A-C278-4426-AF62-FF652C242CBA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.5:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "4A77078F-631E-4080-9085-322074E987AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "C31B0F7D-E0A5-4EB8-BEE6-963905C734A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.6:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B876B000-8A30-4901-8D6F-BDC75060F967",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.7:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "C7D41E34-857E-4BBD-B805-BC45C7741044",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.8:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "F47AC1BD-A197-4A88-96B6-C8ADB716CCD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.8:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "BEF5441F-EC1C-49AE-B1E1-05AEEDD04C8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.9:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "01DB695E-5A7D-4BFC-BB8D-6E7887CAB4D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.9:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "48CEC187-84F5-4AAF-B0D3-194CD6ABA028",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.10:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "7236D1CF-6FB5-47DC-8DFA-269724638BBB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.2.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "C8E20742-98CE-41DE-AEE7-28B2D85FE7D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.2.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "5A6FE3AA-7415-4369-B84F-876C64FA229C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.2.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "8622E203-BDB5-456A-A3FC-B04051A7DCDA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D0E08EE-2948-4DB4-ACB3-649B8A268AF8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.2.1:-:*:*:*:*:*:*",
              "matchCriteriaId": "C69CF03C-D881-45B9-B70C-007D6237C2DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.2.1:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "3DA71C34-E5B9-433F-BC55-87B7FFA6879D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*",
              "matchCriteriaId": "5991814D-CA77-4C25-90D2-DB542B17E0AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF47C9F0-D8DA-4B55-89EB-9B2C9383ADB9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The Frontend in Zabbix before 1.8.20rc2, 2.0.x before 2.0.11rc2, and 2.2.x before 2.2.2rc1 allows remote \"Zabbix Admin\" users to modify the media of arbitrary users via unspecified vectors."
    },
    {
      "lang": "es",
      "value": "Frontend en Zabbix anterior a 1.8.20rc2, 2.0.x anterior a 2.0.11rc2 y 2.2.x anterior a 2.2.2rc1 permite a usuarios remotos \u0027de administraci\u00f3n de Zabbix\u0027 modificar los medios de usuarios arbitrarios a trav\u00e9s de vectores no especificados."
    }
  ],
  "id": "CVE-2014-1685",
  "lastModified": "2024-11-21T02:04:49.647",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.5,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 4.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-05-08T14:29:14.283",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-May/132376.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-May/132377.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://support.zabbix.com/browse/ZBX-7693"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-May/132376.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-May/132377.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://support.zabbix.com/browse/ZBX-7693"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2019-02-17 16:29
Modified
2024-11-21 02:44
Summary
Zabbix before 2.2.21rc1, 3.x before 3.0.13rc1, 3.1.x and 3.2.x before 3.2.10rc1, and 3.3.x and 3.4.x before 3.4.4rc1 allows open redirect via the request parameter.
Impacted products
Vendor Product Version
zabbix zabbix *
zabbix zabbix *
zabbix zabbix *
zabbix zabbix *
debian debian_linux 8.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F53CA972-9A68-4605-954C-8FAB1958E174",
              "versionEndIncluding": "2.2.20",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "596734F2-A682-4518-AD8D-1E105B2728E2",
              "versionEndIncluding": "3.0.12",
              "versionStartIncluding": "3.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "69CA289A-8EBB-4B0D-BF8F-293EE076D689",
              "versionEndIncluding": "3.2.9",
              "versionStartIncluding": "3.1.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3CCAF85-00CD-4C07-8242-D59889388E5E",
              "versionEndIncluding": "3.4.3",
              "versionStartIncluding": "3.3.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Zabbix before 2.2.21rc1, 3.x before 3.0.13rc1, 3.1.x and 3.2.x before 3.2.10rc1, and 3.3.x and 3.4.x before 3.4.4rc1 allows open redirect via the request parameter."
    },
    {
      "lang": "es",
      "value": "Zabbix, en versiones anteriores a la 2.2.21rc1, versiones 3.x anteriores a la 3.0.13rc1, versiones 3.1.x y versiones 3.2.x anteriores a la 3.2.10rc1, y en versiones 3.3.x y 3.4.x anteriores a la 3.4.4rc1, permite la redirecci\u00f3n abierta mediante el par\u00e1metro request."
    }
  ],
  "id": "CVE-2016-10742",
  "lastModified": "2024-11-21T02:44:38.650",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 4.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.1,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.0"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 2.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-02-17T16:29:00.240",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00010.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00039.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Vendor Advisory"
      ],
      "url": "https://support.zabbix.com/browse/ZBX-10272"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://support.zabbix.com/browse/ZBX-13133"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00010.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.debian.org/debian-lts-announce/2020/11/msg00039.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Vendor Advisory"
      ],
      "url": "https://support.zabbix.com/browse/ZBX-10272"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://support.zabbix.com/browse/ZBX-13133"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-601"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-10-12 07:15
Modified
2024-11-21 08:03
Summary
A stored XSS has been found in the Zabbix web application in the Maps element if a URL field is set with spaces before URL.
Impacted products
Vendor Product Version
zabbix zabbix *
zabbix zabbix *
zabbix zabbix *
zabbix zabbix *
zabbix zabbix 7.0.0
zabbix zabbix 7.0.0
zabbix zabbix 7.0.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "81B6A997-4187-4D90-98D8-CF4F1186FB0C",
              "versionEndIncluding": "4.0.47",
              "versionStartIncluding": "4.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CAED9EA-BFA1-4BCF-8323-97AD46AC28C3",
              "versionEndIncluding": "5.0.36",
              "versionStartIncluding": "5.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "531CCCBF-46AD-4988-8A9D-ED4FD5208C71",
              "versionEndIncluding": "6.0.20",
              "versionStartIncluding": "6.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "868F271E-2595-4D01-BF53-46460F98891A",
              "versionEndIncluding": "6.4.5",
              "versionStartIncluding": "6.4.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:alpha1:*:*:*:*:*:*",
              "matchCriteriaId": "93EB5757-7F98-4428-9616-C30A647A6612",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:alpha2:*:*:*:*:*:*",
              "matchCriteriaId": "DA00BDB5-433F-44E5-87AC-DA01C64B5DB3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:alpha3:*:*:*:*:*:*",
              "matchCriteriaId": "98C46C92-9D86-45CD-88FE-DFBB5502BB88",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A stored XSS has been found in the Zabbix web application in the Maps element if a URL field is set with spaces before URL."
    },
    {
      "lang": "es",
      "value": "Se ha encontrado Cross-Site Scripting (XSS) almacenado en la aplicaci\u00f3n web Zabbix en el elemento Maps si un campo URL est\u00e1 configurado con espacios antes de la URL."
    }
  ],
  "id": "CVE-2023-32721",
  "lastModified": "2024-11-21T08:03:54.690",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 7.6,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "LOW",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:H/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.3,
        "impactScore": 4.7,
        "source": "security@zabbix.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.3,
        "impactScore": 2.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-10-12T07:15:09.677",
  "references": [
    {
      "source": "security@zabbix.com",
      "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00012.html"
    },
    {
      "source": "security@zabbix.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://support.zabbix.com/browse/ZBX-23389"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00012.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://support.zabbix.com/browse/ZBX-23389"
    }
  ],
  "sourceIdentifier": "security@zabbix.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "security@zabbix.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-09-14 11:15
Modified
2024-11-21 07:21
Summary
An unauthenticated user can create a link with reflected Javascript code inside the backurl parameter and send it to other authenticated users in order to create a fake account with predefined login, password and role in Zabbix Frontend.
Impacted products
Vendor Product Version
zabbix zabbix *
zabbix zabbix 6.2.0
fedoraproject fedora 37



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "877472C3-BBAA-4340-A6A3-B1C90ED44D92",
              "versionEndIncluding": "6.0.6",
              "versionStartIncluding": "6.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:6.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B31ED9A4-0CD9-45C0-82EC-9223488EDAE2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
              "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "An unauthenticated user can create a link with reflected Javascript code inside the backurl parameter and send it to other authenticated users in order to create a fake account with predefined login, password and role in Zabbix Frontend."
    },
    {
      "lang": "es",
      "value": "Un usuario no autenticado puede crear un enlace con c\u00f3digo Javascript reflejado dentro del par\u00e1metro backurl y enviarlo a otros usuarios autenticados para crear una cuenta falsa con login, contrase\u00f1a y rol predefinidos en Zabbix Frontend"
    }
  ],
  "id": "CVE-2022-40626",
  "lastModified": "2024-11-21T07:21:44.230",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 4.8,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "LOW",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 0.5,
        "impactScore": 4.2,
        "source": "security@zabbix.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.1,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 2.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-09-14T11:15:53.473",
  "references": [
    {
      "source": "security@zabbix.com",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SPU4RCRYVNVM3SS523UQXE63ATCTEX5G/"
    },
    {
      "source": "security@zabbix.com",
      "tags": [
        "Issue Tracking",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://support.zabbix.com/browse/ZBX-21350"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SPU4RCRYVNVM3SS523UQXE63ATCTEX5G/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://support.zabbix.com/browse/ZBX-21350"
    }
  ],
  "sourceIdentifier": "security@zabbix.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "security@zabbix.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-02-07 15:15
Modified
2024-11-21 01:54
Summary
Zabbix 2.0.9 has an Arbitrary Command Execution Vulnerability
Impacted products
Vendor Product Version
zabbix zabbix 2.0.9



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.9:-:*:*:*:*:*:*",
              "matchCriteriaId": "96DC1998-AC2E-4AD1-AF11-3F8B0F4F203B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Zabbix 2.0.9 has an Arbitrary Command Execution Vulnerability"
    },
    {
      "lang": "es",
      "value": "Zabbix versi\u00f3n 2.0.9, presenta una Vulnerabilidad de Ejecuci\u00f3n de Comandos Arbitraria."
    }
  ],
  "id": "CVE-2013-3628",
  "lastModified": "2024-11-21T01:54:00.930",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-02-07T15:15:10.477",
  "references": [
    {
      "source": "cret@cert.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.exploit-db.com/exploits/29321"
    },
    {
      "source": "cret@cert.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/63453"
    },
    {
      "source": "cret@cert.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://community.rapid7.com/community/metasploit/blog/2013/10/30/seven-foss-disclosures-part-one"
    },
    {
      "source": "cret@cert.org",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://community.rapid7.com/community/metasploit/blog/2013/10/30/seven-tricks-and-treats"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.exploit-db.com/exploits/29321"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/63453"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://community.rapid7.com/community/metasploit/blog/2013/10/30/seven-foss-disclosures-part-one"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://community.rapid7.com/community/metasploit/blog/2013/10/30/seven-tricks-and-treats"
    }
  ],
  "sourceIdentifier": "cret@cert.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-74"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-10-12 07:15
Modified
2024-11-21 08:03
Summary
Request to LDAP is sent before user permissions are checked.
Impacted products
Vendor Product Version
zabbix zabbix *
zabbix zabbix *
zabbix zabbix 4.0.19
zabbix zabbix 4.4.7
zabbix zabbix 5.0.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3F90B06-C5E5-4A17-8712-677CB8F23A56",
              "versionEndExcluding": "4.0.19",
              "versionStartIncluding": "4.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "67089C6F-1FB9-4F56-B0E1-3C61A26E6511",
              "versionEndExcluding": "4.4.7",
              "versionStartIncluding": "4.4.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:4.0.19:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "5EBFE946-4EA3-4709-80C5-3F19AC6E6FC1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:4.4.7:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "6B7EC65B-FDE3-479E-B3D2-8CBB408DE38C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:5.0.0:alpha3:*:*:*:*:*:*",
              "matchCriteriaId": "2934AECC-D265-4986-BEC2-ADC43626B3B0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Request to LDAP is sent before user permissions are checked."
    },
    {
      "lang": "es",
      "value": "La solicitud a LDAP se env\u00eda antes de que se verifiquen los permisos del usuario."
    }
  ],
  "id": "CVE-2023-32723",
  "lastModified": "2024-11-21T08:03:54.943",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 8.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "LOW",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:H/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.1,
        "impactScore": 4.7,
        "source": "security@zabbix.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 9.1,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.2,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-10-12T07:15:10.620",
  "references": [
    {
      "source": "security@zabbix.com",
      "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00012.html"
    },
    {
      "source": "security@zabbix.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://support.zabbix.com/browse/ZBX-23230"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.debian.org/debian-lts-announce/2024/01/msg00012.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://support.zabbix.com/browse/ZBX-23230"
    }
  ],
  "sourceIdentifier": "security@zabbix.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-732"
        }
      ],
      "source": "security@zabbix.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-732"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2011-12-29 22:55
Modified
2024-11-21 01:32
Severity ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in Zabbix before 1.8.10 allow remote attackers to inject arbitrary web script or HTML via the gname parameter (aka host groups name) to (1) hostgroups.php and (2) usergrps.php, the update action to (3) hosts.php and (4) scripts.php, and (5) maintenance.php.
Impacted products
Vendor Product Version
zabbix zabbix *
zabbix zabbix 1.1
zabbix zabbix 1.1
zabbix zabbix 1.1
zabbix zabbix 1.1
zabbix zabbix 1.1
zabbix zabbix 1.1
zabbix zabbix 1.1
zabbix zabbix 1.1
zabbix zabbix 1.1
zabbix zabbix 1.1
zabbix zabbix 1.1
zabbix zabbix 1.1
zabbix zabbix 1.1.1
zabbix zabbix 1.1.2
zabbix zabbix 1.1.3
zabbix zabbix 1.1.4
zabbix zabbix 1.1.5
zabbix zabbix 1.1.6
zabbix zabbix 1.1.7
zabbix zabbix 1.3
zabbix zabbix 1.3.1
zabbix zabbix 1.3.2
zabbix zabbix 1.3.3
zabbix zabbix 1.3.4
zabbix zabbix 1.3.5
zabbix zabbix 1.3.6
zabbix zabbix 1.3.7
zabbix zabbix 1.3.8
zabbix zabbix 1.4
zabbix zabbix 1.4.1
zabbix zabbix 1.4.2
zabbix zabbix 1.4.3
zabbix zabbix 1.4.4
zabbix zabbix 1.4.5
zabbix zabbix 1.4.6
zabbix zabbix 1.5
zabbix zabbix 1.5.1
zabbix zabbix 1.5.2
zabbix zabbix 1.5.3
zabbix zabbix 1.5.4
zabbix zabbix 1.6
zabbix zabbix 1.6.1
zabbix zabbix 1.6.2
zabbix zabbix 1.6.3
zabbix zabbix 1.6.4
zabbix zabbix 1.6.5
zabbix zabbix 1.6.6
zabbix zabbix 1.6.7
zabbix zabbix 1.6.8
zabbix zabbix 1.6.9
zabbix zabbix 1.7
zabbix zabbix 1.7.1
zabbix zabbix 1.7.2
zabbix zabbix 1.7.3
zabbix zabbix 1.7.4
zabbix zabbix 1.8
zabbix zabbix 1.8.1
zabbix zabbix 1.8.2
zabbix zabbix 1.8.3
zabbix zabbix 1.8.3
zabbix zabbix 1.8.3
zabbix zabbix 1.8.3
zabbix zabbix 1.8.3
zabbix zabbix 1.8.4
zabbix zabbix 1.8.4
zabbix zabbix 1.8.4
zabbix zabbix 1.8.4
zabbix zabbix 1.8.4
zabbix zabbix 1.8.5
zabbix zabbix 1.8.5
zabbix zabbix 1.8.6
zabbix zabbix 1.8.6
zabbix zabbix 1.8.6
zabbix zabbix 1.8.7
zabbix zabbix 1.8.7
zabbix zabbix 1.8.8
zabbix zabbix 1.8.8
zabbix zabbix 1.8.8
zabbix zabbix 1.8.8
zabbix zabbix 1.8.9
zabbix zabbix 1.8.9
zabbix zabbix 1.8.9
zabbix zabbix 1.8.10



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:*:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "98F513D1-35B0-402E-A099-BC983218F66B",
              "versionEndIncluding": "1.8.10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E916BD0-BA65-4895-B6A1-1F30E1178BEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1:beta10:*:*:*:*:*:*",
              "matchCriteriaId": "1B3EBE7F-36B9-4D00-B2CF-E933F2A7D578",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1:beta11:*:*:*:*:*:*",
              "matchCriteriaId": "472C48A5-7E2E-440D-A92C-D7F180CD630C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1:beta12:*:*:*:*:*:*",
              "matchCriteriaId": "02A06CE1-FE5B-46C5-8E1A-3EEF0E1B0D4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "00A0CA98-C23B-4042-A55F-9ED6F3A2DB5E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "481DB798-D0F7-48D2-9A07-2785FF31E613",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "A0EC0649-B10E-4557-8D67-FAAAF4AB04B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1:beta5:*:*:*:*:*:*",
              "matchCriteriaId": "ED71C8A8-14FD-4183-99AA-D9359E8DCF32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1:beta6:*:*:*:*:*:*",
              "matchCriteriaId": "16FF6B60-5D7F-4288-9CAF-1FD96DF8D318",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1:beta7:*:*:*:*:*:*",
              "matchCriteriaId": "CFA20306-A682-42AD-A8E9-A623D06476E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1:beta8:*:*:*:*:*:*",
              "matchCriteriaId": "2EA9F77B-7F7D-43C8-97EA-0985A2E275CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1:beta9:*:*:*:*:*:*",
              "matchCriteriaId": "9DA4C658-BF18-484C-9A72-EDC79E55BBF8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0FDE68D0-CF1B-4063-B3DD-850EFF17B4F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0FB47B1-330E-4ED4-A4AF-993DC613B782",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA7AA37E-2E1A-471D-95AE-83A2CABF1DF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "DFABFF16-FD5E-4FCF-BDF8-AE8D654CEAD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "03E211F0-2F61-4503-AE89-0F750C2848B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "652DC200-54ED-4354-A80C-62253CC42210",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "C581C36A-70EE-4E06-9A4C-7CDF99C0E80A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.3:beta:*:*:*:*:*:*",
              "matchCriteriaId": "A660D65E-D5C9-4D33-ABC2-E803644D0666",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.3.1:beta:*:*:*:*:*:*",
              "matchCriteriaId": "8080D8E8-738D-4EBE-B5A3-6F8819617890",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.3.2:beta:*:*:*:*:*:*",
              "matchCriteriaId": "DBC71B56-59CA-4189-BAF0-AA511FF5B944",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.3.3:beta:*:*:*:*:*:*",
              "matchCriteriaId": "13620EBC-D721-47C9-B054-8C243E300773",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.3.4:beta:*:*:*:*:*:*",
              "matchCriteriaId": "72BEAE7A-97FA-4A9E-8F3E-082F3D73597F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.3.5:beta:*:*:*:*:*:*",
              "matchCriteriaId": "CA18F8F3-33FD-4FD0-B739-23B279ABCB32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.3.6:beta:*:*:*:*:*:*",
              "matchCriteriaId": "DA7D5B83-1D9A-4E7D-9F8B-391ED384C1B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.3.7:beta:*:*:*:*:*:*",
              "matchCriteriaId": "76957BA1-20EB-4CD9-8F6F-6B742DE4B7A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.3.8:beta:*:*:*:*:*:*",
              "matchCriteriaId": "09CB3919-850F-420C-B148-7434DF8F4237",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "15AEEB13-EE99-47A6-8DB2-AF63C6C355EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "23022292-9EFC-4E1A-BC0E-1CBB63B41D61",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "55BC3D41-DB27-4509-8908-0A7F0A19206E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "96A266AD-7853-40D0-8D1B-6ECFF34A76AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB1611DD-8EB1-49FE-8995-C9D853F812F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F75B7137-657E-4230-BEDA-D8EA2824138B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C27222F-3FA6-4F9A-A017-37B77E536CFF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.5:beta:*:*:*:*:*:*",
              "matchCriteriaId": "8E3057C0-8AF2-48CE-A60B-EDA138E36BC1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.5.1:beta:*:*:*:*:*:*",
              "matchCriteriaId": "CF50FF14-C17D-4043-BD33-F25BE29F583C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.5.2:beta:*:*:*:*:*:*",
              "matchCriteriaId": "4514843A-41E3-4318-BBF0-8304E51F62F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.5.3:beta:*:*:*:*:*:*",
              "matchCriteriaId": "3493784D-992A-461B-944F-D1067E43FC0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.5.4:beta:*:*:*:*:*:*",
              "matchCriteriaId": "0F7EECAF-5F40-480D-9532-9970EEBFBD71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "90F4BAE5-9A6F-4757-B413-9024FF4C9832",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6379BE78-7EFA-4D61-A97D-D336C6F30E00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E70F0D2-1D7C-4B65-B5FC-8DA2CD73E26F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7085354-F91A-4594-9E7A-5F823F8BF189",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C942C4C-2162-4C36-89BC-18F56E81280A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "7337CDB5-4E3F-41B6-A502-F86FCBA81F72",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.6.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "6866F9A2-3986-4F63-8DBA-23E4B59A0C11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.6.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC04F70A-4CB2-486F-BA7B-514065BC00AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.6.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "A293369B-4B44-4210-8D39-407536513897",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.6.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A42EBE3-FEF9-4158-ADD6-063ED75F6683",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C4A2B75-0B3B-46EC-BA80-A528DEF58DAB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B9506E6-3011-430A-B099-AFBF0CE4830B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "13C94196-4CC6-4827-944A-197F748A48E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B6DB768-148D-4067-9202-42B9C16F3DFF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "A24470D7-B73D-4253-AED2-4BE8C015D965",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD5EC94A-383D-45A5-A1BC-5F14D54FD588",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B024F97A-00AA-449D-8726-03D9E6B89541",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CEF7DE3-7A87-4283-A7DF-FD57823C8F47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D4332A9-1D31-41BB-B374-369C583639E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.3:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "D659F67E-74CD-438C-99BE-BC0B91027D2B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.3:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "2875B4AE-D445-4902-8D73-A0274FAD20D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.3:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "92FF443D-EE65-4223-9CC7-AB120D72A260",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.3:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "44D74D1B-BABF-4BB4-8B3C-7B603E423EF2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF5BE8CC-AC6B-4F9F-9717-26931F524092",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "3EBAE908-9F0C-4840-BFF4-625710758E2A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.4:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "58687670-217C-461F-A2C1-272442331290",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.4:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "CB9EB46D-5333-4BE1-B7EA-704F34EFC871",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.4:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "C696B16B-093A-4C1E-8ECF-8AEA74DC05D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "31ED07A1-8964-4B11-86D3-066380AC1D68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.5:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "D186E4E3-03BE-4D3E-8ED8-43D796B19A7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "26CEC79F-7007-42DB-8AA1-6688DC778E29",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.6:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "50129C05-C83D-4365-89C0-CE20010FB90F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.6:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "1314641E-BA80-4B1D-A669-3DBBF93112D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "FFA1AC45-209D-4374-B74F-9117C102C8FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.7:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "CE78EAD3-E1B1-4690-BCCA-F49EB4D598F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "71FE763F-54F0-419C-BC21-D7405D0E941A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.8:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "F6C805FD-0458-40FE-AE45-F3844EAE4658",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.8:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "A27634BF-9E87-4FF7-A129-7ED9BD844BA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.8:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "14A5BC77-5FD4-4392-B54E-12DC607F10D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "49C4A6C7-57E2-4BA6-A4A2-38104AAF70A8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.9:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "111FB9CA-89F7-477C-8C6C-A1730A90046C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.9:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "2CE771A3-854F-4A5E-B392-0E7C8B7F8B64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.10:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "861E5C67-95F7-4142-8AED-E5B7E2AB4483",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple cross-site scripting (XSS) vulnerabilities in Zabbix before 1.8.10 allow remote attackers to inject arbitrary web script or HTML via the gname parameter (aka host groups name) to (1) hostgroups.php and (2) usergrps.php, the update action to (3) hosts.php and (4) scripts.php, and (5) maintenance.php."
    },
    {
      "lang": "es",
      "value": "Varias vulnerabilidades de ejecuci\u00f3n de comandos en sitios cruzados (XSS) en Zabbix anterior a v1.8.10 permite a atacantes remotos inyectar secuencias de comandos web o HTML a trav\u00e9s del par\u00e1metro gname (host conocido como nombre de los grupos) a (1) hostgroups.php y usergrps.php (2), la acci\u00f3n de actualizaci\u00f3n de (3) hosts.php y (4) scripts.php y maintenance.php (5)."
    }
  ],
  "id": "CVE-2011-4615",
  "lastModified": "2024-11-21T01:32:40.070",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2011-12-29T22:55:01.140",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-January/071660.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-January/071687.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://osvdb.org/77771"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/47216"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/bid/51093"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.zabbix.com/rn1.8.10.php"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71855"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://support.zabbix.com/browse/ZBX-4015"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-January/071660.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-January/071687.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/77771"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/47216"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/51093"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.zabbix.com/rn1.8.10.php"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71855"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://support.zabbix.com/browse/ZBX-4015"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2011-12-29 22:55
Modified
2024-11-21 01:33
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in ZABBIX before 1.8.10 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors related to the profiler.
Impacted products
Vendor Product Version
zabbix zabbix *
zabbix zabbix 1.1
zabbix zabbix 1.1
zabbix zabbix 1.1
zabbix zabbix 1.1
zabbix zabbix 1.1
zabbix zabbix 1.1
zabbix zabbix 1.1
zabbix zabbix 1.1
zabbix zabbix 1.1
zabbix zabbix 1.1
zabbix zabbix 1.1
zabbix zabbix 1.1
zabbix zabbix 1.1.1
zabbix zabbix 1.1.2
zabbix zabbix 1.1.3
zabbix zabbix 1.1.4
zabbix zabbix 1.1.5
zabbix zabbix 1.1.6
zabbix zabbix 1.1.7
zabbix zabbix 1.3
zabbix zabbix 1.3.1
zabbix zabbix 1.3.2
zabbix zabbix 1.3.3
zabbix zabbix 1.3.4
zabbix zabbix 1.3.5
zabbix zabbix 1.3.6
zabbix zabbix 1.3.7
zabbix zabbix 1.3.8
zabbix zabbix 1.4
zabbix zabbix 1.4.1
zabbix zabbix 1.4.2
zabbix zabbix 1.4.3
zabbix zabbix 1.4.4
zabbix zabbix 1.4.5
zabbix zabbix 1.4.6
zabbix zabbix 1.5
zabbix zabbix 1.5.1
zabbix zabbix 1.5.2
zabbix zabbix 1.5.3
zabbix zabbix 1.5.4
zabbix zabbix 1.6
zabbix zabbix 1.6.1
zabbix zabbix 1.6.2
zabbix zabbix 1.6.3
zabbix zabbix 1.6.4
zabbix zabbix 1.6.5
zabbix zabbix 1.6.6
zabbix zabbix 1.6.7
zabbix zabbix 1.6.8
zabbix zabbix 1.6.9
zabbix zabbix 1.7
zabbix zabbix 1.7.1
zabbix zabbix 1.7.2
zabbix zabbix 1.7.3
zabbix zabbix 1.7.4
zabbix zabbix 1.8
zabbix zabbix 1.8.1
zabbix zabbix 1.8.2
zabbix zabbix 1.8.3
zabbix zabbix 1.8.3
zabbix zabbix 1.8.3
zabbix zabbix 1.8.3
zabbix zabbix 1.8.3
zabbix zabbix 1.8.4
zabbix zabbix 1.8.4
zabbix zabbix 1.8.4
zabbix zabbix 1.8.4
zabbix zabbix 1.8.4
zabbix zabbix 1.8.5
zabbix zabbix 1.8.5
zabbix zabbix 1.8.6
zabbix zabbix 1.8.6
zabbix zabbix 1.8.6
zabbix zabbix 1.8.7
zabbix zabbix 1.8.7
zabbix zabbix 1.8.8
zabbix zabbix 1.8.8
zabbix zabbix 1.8.8
zabbix zabbix 1.8.8
zabbix zabbix 1.8.9
zabbix zabbix 1.8.9
zabbix zabbix 1.8.9
zabbix zabbix 1.8.10



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:*:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "98F513D1-35B0-402E-A099-BC983218F66B",
              "versionEndIncluding": "1.8.10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E916BD0-BA65-4895-B6A1-1F30E1178BEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1:beta10:*:*:*:*:*:*",
              "matchCriteriaId": "1B3EBE7F-36B9-4D00-B2CF-E933F2A7D578",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1:beta11:*:*:*:*:*:*",
              "matchCriteriaId": "472C48A5-7E2E-440D-A92C-D7F180CD630C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1:beta12:*:*:*:*:*:*",
              "matchCriteriaId": "02A06CE1-FE5B-46C5-8E1A-3EEF0E1B0D4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "00A0CA98-C23B-4042-A55F-9ED6F3A2DB5E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "481DB798-D0F7-48D2-9A07-2785FF31E613",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "A0EC0649-B10E-4557-8D67-FAAAF4AB04B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1:beta5:*:*:*:*:*:*",
              "matchCriteriaId": "ED71C8A8-14FD-4183-99AA-D9359E8DCF32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1:beta6:*:*:*:*:*:*",
              "matchCriteriaId": "16FF6B60-5D7F-4288-9CAF-1FD96DF8D318",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1:beta7:*:*:*:*:*:*",
              "matchCriteriaId": "CFA20306-A682-42AD-A8E9-A623D06476E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1:beta8:*:*:*:*:*:*",
              "matchCriteriaId": "2EA9F77B-7F7D-43C8-97EA-0985A2E275CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1:beta9:*:*:*:*:*:*",
              "matchCriteriaId": "9DA4C658-BF18-484C-9A72-EDC79E55BBF8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0FDE68D0-CF1B-4063-B3DD-850EFF17B4F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0FB47B1-330E-4ED4-A4AF-993DC613B782",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA7AA37E-2E1A-471D-95AE-83A2CABF1DF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "DFABFF16-FD5E-4FCF-BDF8-AE8D654CEAD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "03E211F0-2F61-4503-AE89-0F750C2848B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "652DC200-54ED-4354-A80C-62253CC42210",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "C581C36A-70EE-4E06-9A4C-7CDF99C0E80A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.3:beta:*:*:*:*:*:*",
              "matchCriteriaId": "A660D65E-D5C9-4D33-ABC2-E803644D0666",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.3.1:beta:*:*:*:*:*:*",
              "matchCriteriaId": "8080D8E8-738D-4EBE-B5A3-6F8819617890",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.3.2:beta:*:*:*:*:*:*",
              "matchCriteriaId": "DBC71B56-59CA-4189-BAF0-AA511FF5B944",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.3.3:beta:*:*:*:*:*:*",
              "matchCriteriaId": "13620EBC-D721-47C9-B054-8C243E300773",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.3.4:beta:*:*:*:*:*:*",
              "matchCriteriaId": "72BEAE7A-97FA-4A9E-8F3E-082F3D73597F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.3.5:beta:*:*:*:*:*:*",
              "matchCriteriaId": "CA18F8F3-33FD-4FD0-B739-23B279ABCB32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.3.6:beta:*:*:*:*:*:*",
              "matchCriteriaId": "DA7D5B83-1D9A-4E7D-9F8B-391ED384C1B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.3.7:beta:*:*:*:*:*:*",
              "matchCriteriaId": "76957BA1-20EB-4CD9-8F6F-6B742DE4B7A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.3.8:beta:*:*:*:*:*:*",
              "matchCriteriaId": "09CB3919-850F-420C-B148-7434DF8F4237",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "15AEEB13-EE99-47A6-8DB2-AF63C6C355EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "23022292-9EFC-4E1A-BC0E-1CBB63B41D61",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "55BC3D41-DB27-4509-8908-0A7F0A19206E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "96A266AD-7853-40D0-8D1B-6ECFF34A76AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB1611DD-8EB1-49FE-8995-C9D853F812F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F75B7137-657E-4230-BEDA-D8EA2824138B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C27222F-3FA6-4F9A-A017-37B77E536CFF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.5:beta:*:*:*:*:*:*",
              "matchCriteriaId": "8E3057C0-8AF2-48CE-A60B-EDA138E36BC1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.5.1:beta:*:*:*:*:*:*",
              "matchCriteriaId": "CF50FF14-C17D-4043-BD33-F25BE29F583C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.5.2:beta:*:*:*:*:*:*",
              "matchCriteriaId": "4514843A-41E3-4318-BBF0-8304E51F62F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.5.3:beta:*:*:*:*:*:*",
              "matchCriteriaId": "3493784D-992A-461B-944F-D1067E43FC0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.5.4:beta:*:*:*:*:*:*",
              "matchCriteriaId": "0F7EECAF-5F40-480D-9532-9970EEBFBD71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "90F4BAE5-9A6F-4757-B413-9024FF4C9832",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6379BE78-7EFA-4D61-A97D-D336C6F30E00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E70F0D2-1D7C-4B65-B5FC-8DA2CD73E26F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7085354-F91A-4594-9E7A-5F823F8BF189",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C942C4C-2162-4C36-89BC-18F56E81280A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "7337CDB5-4E3F-41B6-A502-F86FCBA81F72",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.6.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "6866F9A2-3986-4F63-8DBA-23E4B59A0C11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.6.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC04F70A-4CB2-486F-BA7B-514065BC00AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.6.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "A293369B-4B44-4210-8D39-407536513897",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.6.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A42EBE3-FEF9-4158-ADD6-063ED75F6683",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C4A2B75-0B3B-46EC-BA80-A528DEF58DAB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B9506E6-3011-430A-B099-AFBF0CE4830B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "13C94196-4CC6-4827-944A-197F748A48E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B6DB768-148D-4067-9202-42B9C16F3DFF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "A24470D7-B73D-4253-AED2-4BE8C015D965",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD5EC94A-383D-45A5-A1BC-5F14D54FD588",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B024F97A-00AA-449D-8726-03D9E6B89541",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CEF7DE3-7A87-4283-A7DF-FD57823C8F47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D4332A9-1D31-41BB-B374-369C583639E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.3:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "D659F67E-74CD-438C-99BE-BC0B91027D2B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.3:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "2875B4AE-D445-4902-8D73-A0274FAD20D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.3:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "92FF443D-EE65-4223-9CC7-AB120D72A260",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.3:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "44D74D1B-BABF-4BB4-8B3C-7B603E423EF2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF5BE8CC-AC6B-4F9F-9717-26931F524092",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "3EBAE908-9F0C-4840-BFF4-625710758E2A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.4:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "58687670-217C-461F-A2C1-272442331290",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.4:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "CB9EB46D-5333-4BE1-B7EA-704F34EFC871",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.4:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "C696B16B-093A-4C1E-8ECF-8AEA74DC05D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "31ED07A1-8964-4B11-86D3-066380AC1D68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.5:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "D186E4E3-03BE-4D3E-8ED8-43D796B19A7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "26CEC79F-7007-42DB-8AA1-6688DC778E29",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.6:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "50129C05-C83D-4365-89C0-CE20010FB90F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.6:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "1314641E-BA80-4B1D-A669-3DBBF93112D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "FFA1AC45-209D-4374-B74F-9117C102C8FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.7:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "CE78EAD3-E1B1-4690-BCCA-F49EB4D598F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "71FE763F-54F0-419C-BC21-D7405D0E941A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.8:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "F6C805FD-0458-40FE-AE45-F3844EAE4658",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.8:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "A27634BF-9E87-4FF7-A129-7ED9BD844BA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.8:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "14A5BC77-5FD4-4392-B54E-12DC607F10D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "49C4A6C7-57E2-4BA6-A4A2-38104AAF70A8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.9:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "111FB9CA-89F7-477C-8C6C-A1730A90046C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.9:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "2CE771A3-854F-4A5E-B392-0E7C8B7F8B64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.10:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "861E5C67-95F7-4142-8AED-E5B7E2AB4483",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site scripting (XSS) vulnerability in ZABBIX before 1.8.10 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors related to the profiler."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de ejecuci\u00f3n de secuencias de comandos en sitios cruzados (XSS) en Zabbix anterior a v1.8.10 permite a atacantes remotos inyectar secuencias de comandos web o HTML a trav\u00e9s de vectores no especificados relacionados con el perfilador."
    }
  ],
  "id": "CVE-2011-5027",
  "lastModified": "2024-11-21T01:33:27.120",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2011-12-29T22:55:01.203",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-January/071660.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-January/071687.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/77772"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/47216"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/51093"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.zabbix.com/rn1.8.10.php"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://support.zabbix.com/browse/ZBX-4015"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-January/071660.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-January/071687.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/77772"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/47216"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/51093"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.zabbix.com/rn1.8.10.php"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://support.zabbix.com/browse/ZBX-4015"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-08-12 13:38
Modified
2024-12-04 15:21
Summary
An administrator with restricted permissions can exploit the script execution functionality within the Monitoring Hosts section. The lack of default escaping for script parameters enabled this user ability to execute arbitrary code via the Ping script, thereby compromising infrastructure.
Impacted products
Vendor Product Version
zabbix zabbix *
zabbix zabbix 7.0.0
zabbix zabbix 7.0.0
zabbix zabbix 7.0.0
zabbix zabbix 7.0.0
zabbix zabbix 7.0.0
zabbix zabbix 7.0.0
zabbix zabbix 7.0.0
zabbix zabbix 7.0.0
zabbix zabbix 7.0.0
zabbix zabbix 7.0.0
zabbix zabbix 7.0.0
zabbix zabbix 7.0.0
zabbix zabbix 7.0.0
zabbix zabbix 7.0.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6048A1B-69B0-40A5-8E50-00DECE750C58",
              "versionEndIncluding": "6.4.15",
              "versionStartIncluding": "6.4.9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:alpha1:*:*:*:*:*:*",
              "matchCriteriaId": "93EB5757-7F98-4428-9616-C30A647A6612",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:alpha2:*:*:*:*:*:*",
              "matchCriteriaId": "DA00BDB5-433F-44E5-87AC-DA01C64B5DB3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:alpha3:*:*:*:*:*:*",
              "matchCriteriaId": "98C46C92-9D86-45CD-88FE-DFBB5502BB88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:alpha4:*:*:*:*:*:*",
              "matchCriteriaId": "B568E6DD-A6D1-4402-BB40-7DA2596A5BC8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:alpha5:*:*:*:*:*:*",
              "matchCriteriaId": "B9C3673B-8459-4C63-8E90-724D1D42A8BB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:alpha6:*:*:*:*:*:*",
              "matchCriteriaId": "7C9F6957-7526-4852-A579-DE556DBFAA97",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:alpha7:*:*:*:*:*:*",
              "matchCriteriaId": "81A7A191-93DE-4C5D-963E-E8890FF7AACA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:alpha8:*:*:*:*:*:*",
              "matchCriteriaId": "AEE202D5-3C88-43A5-9328-FC78D0B9B8CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:alpha9:*:*:*:*:*:*",
              "matchCriteriaId": "F88BFB75-7951-47D5-941F-3839E9E31FFA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "8216247E-C160-4D2C-906E-9D8CD731B5C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "06548219-0DC3-4B5B-85D1-B1EE0FA30CD2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "4D23985B-2F4D-41F6-B9D6-7B184FC7E447",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "97964B9B-6A5E-4547-8886-E81B0849A876",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "40992B5F-0D83-4D5C-9188-E84C369FF92F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "An administrator with restricted permissions can exploit the script execution functionality within the Monitoring Hosts section. The lack of default escaping for script parameters enabled this user ability to execute arbitrary code via the Ping script, thereby compromising infrastructure."
    },
    {
      "lang": "es",
      "value": "Un administrador con permisos restringidos puede aprovechar la funcionalidad de ejecuci\u00f3n de scripts dentro de la secci\u00f3n Monitoreo de hosts. La falta de un escape predeterminado para los par\u00e1metros del script permiti\u00f3 a este usuario ejecutar c\u00f3digo arbitrario a trav\u00e9s del script Ping, comprometiendo as\u00ed la infraestructura."
    }
  ],
  "id": "CVE-2024-22116",
  "lastModified": "2024-12-04T15:21:51.983",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.9,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.1,
        "impactScore": 6.0,
        "source": "security@zabbix.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.2,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.2,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-08-12T13:38:15.863",
  "references": [
    {
      "source": "security@zabbix.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://support.zabbix.com/browse/ZBX-25016"
    }
  ],
  "sourceIdentifier": "security@zabbix.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-94"
        }
      ],
      "source": "security@zabbix.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-94"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2014-01-29 18:55
Modified
2024-11-21 01:45
Severity ?
Summary
libs/zbxmedia/eztexting.c in Zabbix 1.8.x before 1.8.18rc1, 2.0.x before 2.0.8rc1, and 2.1.x before 2.1.2 does not properly set the CURLOPT_SSL_VERIFYHOST option for libcurl, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate.
Impacted products
Vendor Product Version
zabbix zabbix 1.8.1
zabbix zabbix 1.8.10
zabbix zabbix 1.8.10
zabbix zabbix 1.8.15
zabbix zabbix 1.8.16
zabbix zabbix 2.0.0
zabbix zabbix 2.0.0
zabbix zabbix 2.0.0
zabbix zabbix 2.0.0
zabbix zabbix 2.0.0
zabbix zabbix 2.0.0
zabbix zabbix 2.0.0
zabbix zabbix 2.0.1
zabbix zabbix 2.0.1
zabbix zabbix 2.0.1
zabbix zabbix 2.0.2
zabbix zabbix 2.0.3
zabbix zabbix 2.0.4
zabbix zabbix 2.0.5
zabbix zabbix 2.0.6
zabbix zabbix 2.1.0
zabbix zabbix 2.1.1



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B024F97A-00AA-449D-8726-03D9E6B89541",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.10:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "861E5C67-95F7-4142-8AED-E5B7E2AB4483",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.10:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "F9AD5AE0-E455-4FDB-9340-C8D4664DDE13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.15:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "046656DC-D3F3-4F24-8159-9EA18DFD257D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "C79E3195-A556-41E0-AF0F-7D23075B8BC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A13691AD-76EE-461B-A5A8-C8433AC907CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "FD58979B-18BA-4B41-9C22-90547142834B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "22F76D62-B906-4E1A-9409-15FB797CCB8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "F9283820-AD7D-4131-BD51-7FF9B16F0EDC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.0:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "FC29F910-EBD9-4BB5-B1D3-754F6273135F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.0:rc5:*:*:*:*:*:*",
              "matchCriteriaId": "5AF8633B-C79E-4628-ACEF-12A9B0850655",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.0:rc6:*:*:*:*:*:*",
              "matchCriteriaId": "6567C7EB-90A1-467D-95A5-B0EDC3167A69",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7F5CFFB-7492-4E87-8B85-2EB99CE2A9EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.1:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "66E16901-F3BB-4D6A-8ECD-D94091236BEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.1:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "B6AA88B4-E0BD-4BD5-8003-50EA33FEAEA7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "29ACE6F0-E3B4-4B9D-A40A-47B66BA81FA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E538292A-0573-4F6E-8504-F86863AE1D04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "8213C387-7A54-4C86-AB6C-DF72AA17EFD6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "20104F5A-C278-4426-AF62-FF652C242CBA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "C31B0F7D-E0A5-4EB8-BEE6-963905C734A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "5773D740-433E-4794-9ECD-3EB7AECA8F8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "44061759-8931-4EF1-BF73-0E8E11739AB5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "libs/zbxmedia/eztexting.c in Zabbix 1.8.x before 1.8.18rc1, 2.0.x before 2.0.8rc1, and 2.1.x before 2.1.2 does not properly set the CURLOPT_SSL_VERIFYHOST option for libcurl, which allows man-in-the-middle attackers to spoof SSL servers via an arbitrary valid certificate."
    },
    {
      "lang": "es",
      "value": "libs/zbxmedia/eztexting.c en Zabbix 1.8.x anterior 1.8.18rc1, 2.0.x anterior a 2.0.8rc1, y 2.1.x anterior a 2.1.2 no fija adecuadamente la opci\u00f3n CURLOPT_SSL_VERIFYHOST para libcurl, lo que permite a atacantes man-in-the-middle falsificar servidores SSL a trav\u00e9s de un certificado v\u00e1lido arbitrario."
    }
  ],
  "id": "CVE-2012-6086",
  "lastModified": "2024-11-21T01:45:47.530",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2014-01-29T18:55:26.293",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Issue Tracking"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2013/01/03/1"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/57103"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://support.zabbix.com/browse/ZBX-5924"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2013/01/03/1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/57103"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://support.zabbix.com/browse/ZBX-5924"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-310"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2010-04-06 16:30
Modified
2024-11-21 01:14
Severity ?
Summary
SQL injection vulnerability in the user.authenticate method in the API in Zabbix 1.8 before 1.8.2 allows remote attackers to execute arbitrary SQL commands via the user parameter in JSON data to api_jsonrpc.php.
Impacted products
Vendor Product Version
zabbix zabbix 1.8
zabbix zabbix 1.8.1



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD5EC94A-383D-45A5-A1BC-5F14D54FD588",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B024F97A-00AA-449D-8726-03D9E6B89541",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "SQL injection vulnerability in the user.authenticate method in the API in Zabbix 1.8 before 1.8.2 allows remote attackers to execute arbitrary SQL commands via the user parameter in JSON data to api_jsonrpc.php."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de inyecci\u00f3n SQL en el m\u00e9todo user.authenticate en la API en Zabbix desde v1.8 anteriores a 1.8.2 permite a atacantes remotos ejecutar comandos SQL arbitrarios a trav\u00e9s del par\u00e1metro \"user\" en los datos JSON a api_jsonrpc.php."
    }
  ],
  "id": "CVE-2010-1277",
  "lastModified": "2024-11-21T01:14:02.163",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2010-04-06T16:30:00.937",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-04/0001.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://legalhackers.com/advisories/zabbix181api-sql.txt"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://legalhackers.com/poc/zabbix181api.pl-poc"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/39119"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/63456"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/510480/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/39148"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2010/0799"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.zabbix.com/rn1.8.2.php"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-04/0001.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://legalhackers.com/advisories/zabbix181api-sql.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://legalhackers.com/poc/zabbix181api.pl-poc"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/39119"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/63456"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/510480/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/39148"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2010/0799"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.zabbix.com/rn1.8.2.php"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-89"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-07-13 10:15
Modified
2024-11-21 07:57
Summary
Currently, geomap configuration (Administration -> General -> Geographical maps) allows using HTML in the field “Attribution text” when selected “Other” Tile provider.
Impacted products
Vendor Product Version
zabbix zabbix *
zabbix zabbix 6.4.0
zabbix zabbix 6.4.0
zabbix zabbix 6.4.0
zabbix zabbix 6.4.0
zabbix zabbix 6.4.0
zabbix zabbix 6.4.1
zabbix zabbix 6.4.1
zabbix zabbix 6.4.1



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "699CBC86-9B31-4201-84CC-3B52025A8C6E",
              "versionEndIncluding": "6.0.17",
              "versionStartIncluding": "6.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:6.4.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "FD685FA5-4339-4AEA-9BA0-A5ADBA5B0893",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:6.4.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "E5435CF6-B28B-454F-8738-572CE7BD5F3C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:6.4.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "495EB7AA-D9AD-43C0-A04E-66013AF2DBC0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:6.4.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "1FCEBEB2-AD19-4259-9BAC-D96E55384193",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:6.4.0:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "E8290F5B-E1F0-4081-B365-CB1A7F2A5DA3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:6.4.1:-:*:*:*:*:*:*",
              "matchCriteriaId": "7226BF8C-B38B-4A9B-8360-354528E1B0B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:6.4.1:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "75FFFD36-61D4-48E3-8AA2-1A6F255E3131",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:6.4.1:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "4ADD7BFE-1606-44E5-BE89-91893B886F91",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "\nCurrently, geomap configuration (Administration -\u003e General -\u003e Geographical maps) allows using HTML in the field \u201cAttribution text\u201d when selected \u201cOther\u201d Tile provider.\n\n"
    }
  ],
  "id": "CVE-2023-29452",
  "lastModified": "2024-11-21T07:57:05.110",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "LOW",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L",
          "version": "3.1"
        },
        "exploitabilityScore": 2.1,
        "impactScore": 3.4,
        "source": "security@zabbix.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.3,
        "impactScore": 2.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-07-13T10:15:09.247",
  "references": [
    {
      "source": "security@zabbix.com",
      "tags": [
        "Issue Tracking",
        "Vendor Advisory"
      ],
      "url": "https://support.zabbix.com/browse/ZBX-22981"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Vendor Advisory"
      ],
      "url": "https://support.zabbix.com/browse/ZBX-22981"
    }
  ],
  "sourceIdentifier": "security@zabbix.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "security@zabbix.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-07-17 03:15
Modified
2024-11-21 05:06
Summary
Zabbix before 3.0.32rc1, 4.x before 4.0.22rc1, 4.1.x through 4.4.x before 4.4.10rc1, and 5.x before 5.0.2rc1 allows stored XSS in the URL Widget.
References
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2020-10/msg00007.htmlMailing List, Third Party Advisory
cve@mitre.orghttps://lists.debian.org/debian-lts-announce/2020/08/msg00007.htmlMailing List, Third Party Advisory
cve@mitre.orghttps://lists.debian.org/debian-lts-announce/2021/04/msg00018.htmlMailing List, Third Party Advisory
cve@mitre.orghttps://lists.debian.org/debian-lts-announce/2023/04/msg00013.html
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2ZHHIUYIVA5GZYLKW6A5G6HRELPOBZFE/
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TIRIMOXH6GSBAANDCB3ANLJK4CRLWRXT/
cve@mitre.orghttps://support.zabbix.com/browse/ZBX-18057Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00007.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2020/08/msg00007.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2021/04/msg00018.htmlMailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2023/04/msg00013.html
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2ZHHIUYIVA5GZYLKW6A5G6HRELPOBZFE/
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TIRIMOXH6GSBAANDCB3ANLJK4CRLWRXT/
af854a3a-2127-422b-91ae-364da2661108https://support.zabbix.com/browse/ZBX-18057Patch, Vendor Advisory
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "14F030BB-4C18-44AC-8D00-75A7698E8E21",
              "versionEndIncluding": "3.0.31",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8E2372F-DA44-49AF-8F3D-46FDA165E67B",
              "versionEndIncluding": "4.0.21",
              "versionStartIncluding": "4.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "55B5B412-AB7D-4ABC-996B-8A8A45FE2C82",
              "versionEndIncluding": "4.4.9",
              "versionStartIncluding": "4.4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5B22FF1-0777-43BC-9EC3-C8687203AA24",
              "versionEndIncluding": "5.0.1",
              "versionStartIncluding": "5.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:3.0.32:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "4959BD7B-361C-4FB9-A825-1BC674631898",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:4.0.22:-:*:*:*:*:*:*",
              "matchCriteriaId": "82480E14-CEB4-419F-BF7F-B9CC97B9CDCB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:4.0.22:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "06AA643C-F980-4ACC-8EEB-0B35F498379A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:4.4.10:-:*:*:*:*:*:*",
              "matchCriteriaId": "0CADAAB0-18C6-40B2-9B6C-CDB181BB40E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:4.4.10:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "3C96E39F-9885-4CFC-A218-AD53B23B6392",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:5.0.2:-:*:*:*:*:*:*",
              "matchCriteriaId": "A0A4A0B9-F022-4C6E-B5DD-D311EC2AF995",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:5.0.2:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "EFCB4139-5BF6-4A5E-B333-BF1300F328A2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*",
              "matchCriteriaId": "80F0FA5D-8D3B-4C0E-81E2-87998286AF33",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
              "matchCriteriaId": "36D96259-24BD-44E2-96D9-78CE1D41F956",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:opensuse:backports:sle-15:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "C84D9410-31B7-421A-AD99-8ED2E45A9BC6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:opensuse:backports:sle-15:sp2:*:*:*:*:*:*",
              "matchCriteriaId": "2B7A2D58-B706-41B4-AC99-D51E317AA2D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "B009C22E-30A4-4288-BCF6-C3E81DEAF45A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Zabbix before 3.0.32rc1, 4.x before 4.0.22rc1, 4.1.x through 4.4.x before 4.4.10rc1, and 5.x before 5.0.2rc1 allows stored XSS in the URL Widget."
    },
    {
      "lang": "es",
      "value": "Zabbix versiones anteriores a 3.0.32rc1, versiones 4.x anteriores a 4.0.22rc1, versiones 4.1.x hasta 4.4.x anteriores a 4.4.10rc1 y versiones 5.x anteriores a 5.0.2rc1, permite un ataque de tipo XSS almacenado en el widget URL"
    }
  ],
  "id": "CVE-2020-15803",
  "lastModified": "2024-11-21T05:06:12.923",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.1,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 2.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-07-17T03:15:11.437",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00007.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00007.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00018.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00013.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2ZHHIUYIVA5GZYLKW6A5G6HRELPOBZFE/"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TIRIMOXH6GSBAANDCB3ANLJK4CRLWRXT/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://support.zabbix.com/browse/ZBX-18057"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00007.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2020/08/msg00007.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00018.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00013.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2ZHHIUYIVA5GZYLKW6A5G6HRELPOBZFE/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TIRIMOXH6GSBAANDCB3ANLJK4CRLWRXT/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://support.zabbix.com/browse/ZBX-18057"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-08-12 13:38
Modified
2024-12-10 16:14
Summary
The front-end audit log allows viewing of unprotected plaintext passwords, where the passwords are displayed in plain text.
Impacted products
Vendor Product Version
zabbix zabbix *
zabbix zabbix *
zabbix zabbix *
zabbix zabbix 7.0.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5950D0D-9DFF-4B36-9AAF-43CBCEFE7101",
              "versionEndIncluding": "5.0.42",
              "versionStartIncluding": "5.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1D26F5C-A94F-4273-81D7-7DDF7541C3E7",
              "versionEndIncluding": "6.0.30",
              "versionStartIncluding": "6.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0DA6900-EB3E-4867-BD97-243686EECADD",
              "versionEndIncluding": "6.4.15",
              "versionStartIncluding": "6.4.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "24103B6D-6CB0-4F86-BA59-426E24F9F72A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The front-end audit log allows viewing of unprotected plaintext passwords, where the passwords are displayed in plain text."
    },
    {
      "lang": "es",
      "value": "El registro de auditor\u00eda de front-end permite ver contrase\u00f1as de texto plano no protegidas, donde las contrase\u00f1as se muestran en texto plano."
    }
  ],
  "id": "CVE-2024-36460",
  "lastModified": "2024-12-10T16:14:57.453",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 8.1,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.2,
        "source": "security@zabbix.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 8.1,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.2,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-08-12T13:38:21.960",
  "references": [
    {
      "source": "security@zabbix.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://support.zabbix.com/browse/ZBX-25017"
    }
  ],
  "sourceIdentifier": "security@zabbix.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-256"
        }
      ],
      "source": "security@zabbix.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-522"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2015-01-02 20:59
Modified
2024-11-21 02:20
Severity ?
Summary
Multiple SQL injection vulnerabilities in chart_bar.php in the frontend in Zabbix before 1.8.22, 2.0.x before 2.0.14, and 2.2.x before 2.2.8 allow remote attackers to execute arbitrary SQL commands via the (1) itemid or (2) periods parameter.
Impacted products
Vendor Product Version
zabbix zabbix *
zabbix zabbix 2.0.1
zabbix zabbix 2.0.1
zabbix zabbix 2.0.1
zabbix zabbix 2.0.2
zabbix zabbix 2.0.2
zabbix zabbix 2.0.2
zabbix zabbix 2.0.3
zabbix zabbix 2.0.3
zabbix zabbix 2.0.3
zabbix zabbix 2.0.4
zabbix zabbix 2.0.4
zabbix zabbix 2.0.5
zabbix zabbix 2.0.5
zabbix zabbix 2.0.6
zabbix zabbix 2.0.6
zabbix zabbix 2.0.7
zabbix zabbix 2.0.8
zabbix zabbix 2.0.8
zabbix zabbix 2.0.8
zabbix zabbix 2.0.9
zabbix zabbix 2.0.9
zabbix zabbix 2.0.10
zabbix zabbix 2.0.10
zabbix zabbix 2.0.11
zabbix zabbix 2.0.11
zabbix zabbix 2.0.11
zabbix zabbix 2.0.12
zabbix zabbix 2.0.12
zabbix zabbix 2.0.12
zabbix zabbix 2.0.12
zabbix zabbix 2.0.13
zabbix zabbix 2.0.13
zabbix zabbix 2.2.0
zabbix zabbix 2.2.0
zabbix zabbix 2.2.0
zabbix zabbix 2.2.1
zabbix zabbix 2.2.1
zabbix zabbix 2.2.2
zabbix zabbix 2.2.2
zabbix zabbix 2.2.2
zabbix zabbix 2.2.2
zabbix zabbix 2.2.3
zabbix zabbix 2.2.3
zabbix zabbix 2.2.3
zabbix zabbix 2.2.4
zabbix zabbix 2.2.4
zabbix zabbix 2.2.4
zabbix zabbix 2.2.4
zabbix zabbix 2.2.4
zabbix zabbix 2.2.5
zabbix zabbix 2.2.5
zabbix zabbix 2.2.6
zabbix zabbix 2.2.6
zabbix zabbix 2.2.7
zabbix zabbix 2.2.7
zabbix zabbix 2.2.7



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F794D381-6261-4AC7-B5D7-18A55D2C876B",
              "versionEndIncluding": "1.8.21",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7F5CFFB-7492-4E87-8B85-2EB99CE2A9EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.1:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "66E16901-F3BB-4D6A-8ECD-D94091236BEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.1:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "B6AA88B4-E0BD-4BD5-8003-50EA33FEAEA7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "29ACE6F0-E3B4-4B9D-A40A-47B66BA81FA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.2:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "052A7F4A-AFE3-454B-9714-A42CD225D329",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.2:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "E3F85FD0-B81B-486B-8D4C-CB845A430407",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E538292A-0573-4F6E-8504-F86863AE1D04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.3:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B56DAE34-7F6B-4534-9CF9-263C0D7A930B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.3:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "60AB2230-B919-43B3-92AD-64C030237BB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "8213C387-7A54-4C86-AB6C-DF72AA17EFD6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "3031E393-3CB3-4CF9-ACF9-23890BF5D46D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "20104F5A-C278-4426-AF62-FF652C242CBA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.5:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "4A77078F-631E-4080-9085-322074E987AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "C31B0F7D-E0A5-4EB8-BEE6-963905C734A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.6:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B876B000-8A30-4901-8D6F-BDC75060F967",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.7:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "C7D41E34-857E-4BBD-B805-BC45C7741044",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "C814F99F-93DF-410C-B0F8-4370F9950515",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.8:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "F47AC1BD-A197-4A88-96B6-C8ADB716CCD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.8:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "BEF5441F-EC1C-49AE-B1E1-05AEEDD04C8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.9:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "01DB695E-5A7D-4BFC-BB8D-6E7887CAB4D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.9:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "48CEC187-84F5-4AAF-B0D3-194CD6ABA028",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "7822FDCC-B05B-4716-B75B-20C8C8286CE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.10:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "7236D1CF-6FB5-47DC-8DFA-269724638BBB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "65E9EC9B-C075-442C-8EB7-F1FFE877A05D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.11:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "FA925CA0-7CDE-4C0A-94FC-E60447D2A83A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.11:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "B3B0F041-E392-47CC-BEB2-0899CD8D070A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5A4EFC4-BF36-4564-9F0D-2E228C994F53",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.12:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "6D301058-9C30-4D24-81FD-D785B9B3982F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.12:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "1A90A85B-31E6-4E28-8BCA-57A085D3B10E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.12:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "FCEC0133-F503-4717-9C75-1BC07C82330C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "73516842-638E-4E42-A5DA-4E1511186B05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.13:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "1D309305-78E4-427C-B3C3-40D9C97931E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "325AF70A-3CAA-4CBA-8AA8-10604371EC48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.2.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "5A6FE3AA-7415-4369-B84F-876C64FA229C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.2.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "8622E203-BDB5-456A-A3FC-B04051A7DCDA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D0E08EE-2948-4DB4-ACB3-649B8A268AF8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.2.1:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "3DA71C34-E5B9-433F-BC55-87B7FFA6879D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "74B24B35-404C-482C-8B9D-175035851F5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.2.2:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "D104929C-43B1-4F39-89AB-536D375DF9CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.2.2:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "BB09E1DD-7DC3-4EE5-B61B-D9F6C8E98769",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.2.2:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "6C3638B3-3796-4BA2-9258-CDAF979936E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "55E66537-F350-434F-BBCC-67D348260EB8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.2.3:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "639C3B3E-CFDC-4199-9B92-B83D2235F488",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.2.3:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "D50EDEF5-271C-4444-870B-B80614879254",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E369F7E-7BA8-4A13-A1AD-D270D6525F8F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.2.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "35C0232F-675C-4957-ADEB-8CAB45EE6477",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.2.4:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "13319B5E-A62A-47ED-BF8F-8CA1F8EC7169",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.2.4:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "8165C960-46FD-4B9D-A724-2986B6E86C0C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.2.4:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "7DED1336-2889-4638-A705-5ABF3CE10DA5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D7D00BD-DB3A-4423-B69A-A4F9D0DD6424",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.2.5:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "C881794A-1A36-43FA-A828-35380E07D3F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "D071ECA5-0D7D-4244-8E89-64E321C14EFE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.2.6:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B3022775-92E0-4B63-BF3E-2DFEFC949AA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "78AC01B9-47EE-4D55-8836-B483014B3101",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.2.7:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "D1D36BC7-EB57-4C73-B712-FAB497FFA28A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.2.7:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "2B44D39C-CDBA-443B-AC9E-99F5CFAF4282",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple SQL injection vulnerabilities in chart_bar.php in the frontend in Zabbix before 1.8.22, 2.0.x before 2.0.14, and 2.2.x before 2.2.8 allow remote attackers to execute arbitrary SQL commands via the (1) itemid or (2) periods parameter."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples vulnerabilidades de inyecci\u00f3n SQL en chart_bar.php en el frontend en Zabbix anterior a 1.8.22, 2.0.x anterior a 2.0.14, y 2.2.x anterior a 2.2.8 permiten a atacantes remotos ejecutar comandos SQL arbitrarios a trav\u00e9s del par\u00e1metro (1) itemid o (2) periods."
    }
  ],
  "id": "CVE-2014-9450",
  "lastModified": "2024-11-21T02:20:55.137",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2015-01-02T20:59:09.710",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/61554"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.zabbix.com/rn1.8.22.php"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.zabbix.com/rn2.0.14.php"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.zabbix.com/rn2.2.8.php"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://support.zabbix.com/browse/ZBX-8582"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/61554"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.zabbix.com/rn1.8.22.php"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.zabbix.com/rn2.0.14.php"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.zabbix.com/rn2.2.8.php"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://support.zabbix.com/browse/ZBX-8582"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-89"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-12-05 20:15
Modified
2024-11-21 07:26
Summary
A Firewall Rule which allows all incoming TCP connections to all programs from any source and to all ports is created in Windows Firewall after Zabbix agent installation (MSI)
Impacted products
Vendor Product Version
microsoft windows_firewall -
zabbix zabbix *
zabbix zabbix *
zabbix zabbix 6.0.12
zabbix zabbix 6.2.6



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:microsoft:windows_firewall:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE181B91-1359-4EB8-AB0C-CA1E328CD17B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD9C2674-6094-4E7B-9687-2C1C2EE3723F",
              "versionEndExcluding": "6.0.12",
              "versionStartIncluding": "6.0.10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "01D2C148-527F-4C2D-B82A-95811DB1756F",
              "versionEndExcluding": "6.2.6",
              "versionStartIncluding": "6.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:6.0.12:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "C163CC6F-602E-404E-8155-14DFAC35781E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:6.2.6:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "550C55C9-BF75-4B88-8ACF-470FFC2F20C0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A Firewall Rule which allows all incoming TCP connections to all programs from any source and to all ports is created in Windows Firewall after Zabbix agent installation (MSI)"
    },
    {
      "lang": "es",
      "value": "Una regla de firewall que permite todas las conexiones TCP entrantes a todos los programas desde cualquier fuente y a todos los puertos se crea en el Firewall de Windows despu\u00e9s de la instalaci\u00f3n del agente Zabbix (MSI)."
    }
  ],
  "id": "CVE-2022-43516",
  "lastModified": "2024-11-21T07:26:41.040",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "NETWORK",
          "availabilityImpact": "LOW",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L",
          "version": "3.1"
        },
        "exploitabilityScore": 2.2,
        "impactScore": 3.7,
        "source": "security@zabbix.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-12-05T20:15:10.887",
  "references": [
    {
      "source": "security@zabbix.com",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://support.zabbix.com/browse/ZBX-22002"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://support.zabbix.com/browse/ZBX-22002"
    }
  ],
  "sourceIdentifier": "security@zabbix.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-16"
        }
      ],
      "source": "security@zabbix.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2014-05-08 14:29
Modified
2024-11-21 02:04
Severity ?
Summary
The API in Zabbix before 1.8.20rc1, 2.0.x before 2.0.11rc1, and 2.2.x before 2.2.2rc1 allows remote authenticated users to spoof arbitrary users via the user name in a user.login request.
Impacted products
Vendor Product Version
zabbix zabbix *
zabbix zabbix 1.8
zabbix zabbix 1.8.1
zabbix zabbix 1.8.2
zabbix zabbix 1.8.3
zabbix zabbix 1.8.3
zabbix zabbix 1.8.3
zabbix zabbix 1.8.15
zabbix zabbix 1.8.16
zabbix zabbix 1.8.18
zabbix zabbix 2.0.0
zabbix zabbix 2.0.0
zabbix zabbix 2.0.0
zabbix zabbix 2.0.0
zabbix zabbix 2.0.0
zabbix zabbix 2.0.0
zabbix zabbix 2.0.0
zabbix zabbix 2.0.1
zabbix zabbix 2.0.1
zabbix zabbix 2.0.1
zabbix zabbix 2.0.2
zabbix zabbix 2.0.2
zabbix zabbix 2.0.2
zabbix zabbix 2.0.3
zabbix zabbix 2.0.3
zabbix zabbix 2.0.3
zabbix zabbix 2.0.4
zabbix zabbix 2.0.4
zabbix zabbix 2.0.5
zabbix zabbix 2.0.5
zabbix zabbix 2.0.6
zabbix zabbix 2.0.6
zabbix zabbix 2.0.7
zabbix zabbix 2.0.8
zabbix zabbix 2.0.8
zabbix zabbix 2.0.9
zabbix zabbix 2.0.9
zabbix zabbix 2.0.10
zabbix zabbix 2.2.0
zabbix zabbix 2.2.0
zabbix zabbix 2.2.0
zabbix zabbix 2.2.1
zabbix zabbix 2.2.1
zabbix zabbix 2.2.1
fedoraproject fedora 19
fedoraproject fedora 20



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "79A05906-9760-4A6B-B914-0173D740B2B7",
              "versionEndIncluding": "1.8.19",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD5EC94A-383D-45A5-A1BC-5F14D54FD588",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B024F97A-00AA-449D-8726-03D9E6B89541",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CEF7DE3-7A87-4283-A7DF-FD57823C8F47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.3:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "D659F67E-74CD-438C-99BE-BC0B91027D2B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.3:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "2875B4AE-D445-4902-8D73-A0274FAD20D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.3:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "92FF443D-EE65-4223-9CC7-AB120D72A260",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.15:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "046656DC-D3F3-4F24-8159-9EA18DFD257D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "C79E3195-A556-41E0-AF0F-7D23075B8BC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "7480E2E8-041B-4A44-90D9-DAC7E59DA059",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A13691AD-76EE-461B-A5A8-C8433AC907CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "FD58979B-18BA-4B41-9C22-90547142834B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "22F76D62-B906-4E1A-9409-15FB797CCB8D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "F9283820-AD7D-4131-BD51-7FF9B16F0EDC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.0:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "FC29F910-EBD9-4BB5-B1D3-754F6273135F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.0:rc5:*:*:*:*:*:*",
              "matchCriteriaId": "5AF8633B-C79E-4628-ACEF-12A9B0850655",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.0:rc6:*:*:*:*:*:*",
              "matchCriteriaId": "6567C7EB-90A1-467D-95A5-B0EDC3167A69",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7F5CFFB-7492-4E87-8B85-2EB99CE2A9EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.1:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "66E16901-F3BB-4D6A-8ECD-D94091236BEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.1:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "B6AA88B4-E0BD-4BD5-8003-50EA33FEAEA7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "29ACE6F0-E3B4-4B9D-A40A-47B66BA81FA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.2:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "052A7F4A-AFE3-454B-9714-A42CD225D329",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.2:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "E3F85FD0-B81B-486B-8D4C-CB845A430407",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E538292A-0573-4F6E-8504-F86863AE1D04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.3:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B56DAE34-7F6B-4534-9CF9-263C0D7A930B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.3:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "60AB2230-B919-43B3-92AD-64C030237BB2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "8213C387-7A54-4C86-AB6C-DF72AA17EFD6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "3031E393-3CB3-4CF9-ACF9-23890BF5D46D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "20104F5A-C278-4426-AF62-FF652C242CBA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.5:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "4A77078F-631E-4080-9085-322074E987AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "C31B0F7D-E0A5-4EB8-BEE6-963905C734A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.6:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B876B000-8A30-4901-8D6F-BDC75060F967",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.7:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "C7D41E34-857E-4BBD-B805-BC45C7741044",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.8:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "F47AC1BD-A197-4A88-96B6-C8ADB716CCD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.8:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "BEF5441F-EC1C-49AE-B1E1-05AEEDD04C8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.9:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "01DB695E-5A7D-4BFC-BB8D-6E7887CAB4D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.9:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "48CEC187-84F5-4AAF-B0D3-194CD6ABA028",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.10:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "7236D1CF-6FB5-47DC-8DFA-269724638BBB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.2.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "C8E20742-98CE-41DE-AEE7-28B2D85FE7D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.2.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "5A6FE3AA-7415-4369-B84F-876C64FA229C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.2.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "8622E203-BDB5-456A-A3FC-B04051A7DCDA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D0E08EE-2948-4DB4-ACB3-649B8A268AF8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.2.1:-:*:*:*:*:*:*",
              "matchCriteriaId": "C69CF03C-D881-45B9-B70C-007D6237C2DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.2.1:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "3DA71C34-E5B9-433F-BC55-87B7FFA6879D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*",
              "matchCriteriaId": "5991814D-CA77-4C25-90D2-DB542B17E0AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF47C9F0-D8DA-4B55-89EB-9B2C9383ADB9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The API in Zabbix before 1.8.20rc1, 2.0.x before 2.0.11rc1, and 2.2.x before 2.2.2rc1 allows remote authenticated users to spoof arbitrary users via the user name in a user.login request."
    },
    {
      "lang": "es",
      "value": "La API en Zabbix anterior a 1.8.20rc1, 2.0.x anterior a 2.0.11rc1 y 2.2.x anterior a 2.2.2rc1 permite a usuarios remotos autenticados falsificar usuarios arbitrarios a trav\u00e9s del nombre de usuario en una solicitud user.login."
    }
  ],
  "id": "CVE-2014-1682",
  "lastModified": "2024-11-21T02:04:49.167",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "NONE",
          "baseScore": 4.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-05-08T14:29:14.220",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-May/132376.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-May/132377.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/65402"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://support.zabbix.com/browse/ZBX-7703"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-May/132376.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-May/132377.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/65402"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://support.zabbix.com/browse/ZBX-7703"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-287"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2018-02-01 17:29
Modified
2024-11-21 02:07
Severity ?
Summary
XML external entity (XXE) vulnerability in Zabbix 1.8.x before 1.8.21rc1, 2.0.x before 2.0.13rc1, 2.2.x before 2.2.5rc1, and 2.3.x before 2.3.2 allows remote attackers to read arbitrary files or potentially execute arbitrary code via a crafted DTD in an XML request.
References
cve@mitre.orghttp://lists.fedoraproject.org/pipermail/package-announce/2014-June/134885.htmlThird Party Advisory
cve@mitre.orghttp://lists.fedoraproject.org/pipermail/package-announce/2014-June/134909.htmlThird Party Advisory
cve@mitre.orghttp://seclists.org/fulldisclosure/2014/Jun/87Mailing List, Third Party Advisory
cve@mitre.orghttp://www.securityfocus.com/bid/68075Third Party Advisory, VDB Entry
cve@mitre.orghttps://bugzilla.redhat.com/show_bug.cgi?id=1110496Issue Tracking, Third Party Advisory
cve@mitre.orghttps://support.zabbix.com/browse/ZBX-8151Exploit, Patch, Vendor Advisory
cve@mitre.orghttps://web.archive.org/web/20140622034155/http://www.pnigos.com:80/?p=273Exploit, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134885.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134909.htmlThird Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://seclists.org/fulldisclosure/2014/Jun/87Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/68075Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=1110496Issue Tracking, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://support.zabbix.com/browse/ZBX-8151Exploit, Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://web.archive.org/web/20140622034155/http://www.pnigos.com:80/?p=273Exploit, Third Party Advisory
Impacted products
Vendor Product Version
zabbix zabbix 1.8
zabbix zabbix 1.8.1
zabbix zabbix 1.8.2
zabbix zabbix 1.8.3
zabbix zabbix 1.8.4
zabbix zabbix 1.8.5
zabbix zabbix 1.8.6
zabbix zabbix 1.8.7
zabbix zabbix 1.8.8
zabbix zabbix 1.8.9
zabbix zabbix 1.8.10
zabbix zabbix 1.8.11
zabbix zabbix 1.8.12
zabbix zabbix 1.8.13
zabbix zabbix 1.8.14
zabbix zabbix 1.8.15
zabbix zabbix 1.8.16
zabbix zabbix 1.8.17
zabbix zabbix 1.8.18
zabbix zabbix 1.8.19
zabbix zabbix 1.8.20
zabbix zabbix 2.0.0
zabbix zabbix 2.0.1
zabbix zabbix 2.0.2
zabbix zabbix 2.0.3
zabbix zabbix 2.0.4
zabbix zabbix 2.0.5
zabbix zabbix 2.0.6
zabbix zabbix 2.0.7
zabbix zabbix 2.0.8
zabbix zabbix 2.0.9
zabbix zabbix 2.0.10
zabbix zabbix 2.0.11
zabbix zabbix 2.0.12
zabbix zabbix 2.2.0
zabbix zabbix 2.2.1
zabbix zabbix 2.2.2
zabbix zabbix 2.2.3
zabbix zabbix 2.2.4
zabbix zabbix 2.3.0
zabbix zabbix 2.3.1
fedoraproject fedora 19
fedoraproject fedora 20



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD5EC94A-383D-45A5-A1BC-5F14D54FD588",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B024F97A-00AA-449D-8726-03D9E6B89541",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CEF7DE3-7A87-4283-A7DF-FD57823C8F47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D4332A9-1D31-41BB-B374-369C583639E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF5BE8CC-AC6B-4F9F-9717-26931F524092",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "31ED07A1-8964-4B11-86D3-066380AC1D68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "26CEC79F-7007-42DB-8AA1-6688DC778E29",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "FFA1AC45-209D-4374-B74F-9117C102C8FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "71FE763F-54F0-419C-BC21-D7405D0E941A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "49C4A6C7-57E2-4BA6-A4A2-38104AAF70A8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CB90768-701E-422A-AB56-96F2E032E11C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE049360-8CDA-4B55-8317-0C66E28D67A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9A15D8B-F01E-43E6-B878-6639DC1E87A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDCC20CF-3FE4-4157-AA4D-D2400CE17B6A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "E7F23C63-E589-4F86-9695-AD31BCE7ACAF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "1DB43122-15A6-4E76-852B-732E7111EBF3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "C79E3195-A556-41E0-AF0F-7D23075B8BC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "50F4E7B1-B47A-49F3-BA8A-F3B268FEEECA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.18:*:*:*:*:*:*:*",
              "matchCriteriaId": "7480E2E8-041B-4A44-90D9-DAC7E59DA059",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.19:*:*:*:*:*:*:*",
              "matchCriteriaId": "C7CBCA78-6B99-41F6-AE42-4CCCA07FA277",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F13AC45-73FB-4C6B-A802-E26C82FFA1E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A13691AD-76EE-461B-A5A8-C8433AC907CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7F5CFFB-7492-4E87-8B85-2EB99CE2A9EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "29ACE6F0-E3B4-4B9D-A40A-47B66BA81FA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E538292A-0573-4F6E-8504-F86863AE1D04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "8213C387-7A54-4C86-AB6C-DF72AA17EFD6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "20104F5A-C278-4426-AF62-FF652C242CBA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "C31B0F7D-E0A5-4EB8-BEE6-963905C734A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "292B7BEC-B201-4415-8730-2424EF00B419",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "C814F99F-93DF-410C-B0F8-4370F9950515",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "24B48111-3352-4F57-AD16-2DC04BA76735",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "7822FDCC-B05B-4716-B75B-20C8C8286CE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "65E9EC9B-C075-442C-8EB7-F1FFE877A05D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5A4EFC4-BF36-4564-9F0D-2E228C994F53",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "325AF70A-3CAA-4CBA-8AA8-10604371EC48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D0E08EE-2948-4DB4-ACB3-649B8A268AF8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "74B24B35-404C-482C-8B9D-175035851F5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "55E66537-F350-434F-BBCC-67D348260EB8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E369F7E-7BA8-4A13-A1AD-D270D6525F8F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "46AF9FCC-7512-48CD-BBAF-6F1A6F03CBF2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9DC2C39-7A33-4C82-9956-0458BCFECE2D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:19:*:*:*:*:*:*:*",
              "matchCriteriaId": "5991814D-CA77-4C25-90D2-DB542B17E0AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF47C9F0-D8DA-4B55-89EB-9B2C9383ADB9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "XML external entity (XXE) vulnerability in Zabbix 1.8.x before 1.8.21rc1, 2.0.x before 2.0.13rc1, 2.2.x before 2.2.5rc1, and 2.3.x before 2.3.2 allows remote attackers to read arbitrary files or potentially execute arbitrary code via a crafted DTD in an XML request."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad XEE (XML External Entity) en Zabbix 1.8.x anteriores a 1.8.21rc1, 2.0.x anteriores a 2.0.13rc1, 2.2.x anteriores a 2.2.5rc1 y 2.3.x anteriores a 2.3.2 permite que los atacantes remotos lean archivos arbitrarios o puedan ejecutar c\u00f3digo arbitrario mediante un DTD manipulado en una petici\u00f3n XML."
    }
  ],
  "id": "CVE-2014-3005",
  "lastModified": "2024-11-21T02:07:18.917",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2018-02-01T17:29:00.463",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134885.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134909.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://seclists.org/fulldisclosure/2014/Jun/87"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/68075"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1110496"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://support.zabbix.com/browse/ZBX-8151"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://web.archive.org/web/20140622034155/http://www.pnigos.com:80/?p=273"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134885.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134909.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://seclists.org/fulldisclosure/2014/Jun/87"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/68075"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1110496"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://support.zabbix.com/browse/ZBX-8151"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://web.archive.org/web/20140622034155/http://www.pnigos.com:80/?p=273"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-611"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2009-12-31 18:30
Modified
2024-11-21 01:09
Severity ?
Summary
The zbx_get_next_field function in libs/zbxcommon/str.c in Zabbix Server before 1.6.8 allows remote attackers to cause a denial of service (crash) via a request that lacks expected separators, which triggers a NULL pointer dereference, as demonstrated using the Command keyword.
Impacted products
Vendor Product Version
zabbix zabbix *
zabbix zabbix 1.1.2
zabbix zabbix 1.1.3
zabbix zabbix 1.1.4
zabbix zabbix 1.1.5
zabbix zabbix 1.4.2
zabbix zabbix 1.4.3
zabbix zabbix 1.4.4
zabbix zabbix 1.4.6
zabbix zabbix 1.6.6



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "52E13E4C-E1AE-4B50-92C8-EDD8E0374E39",
              "versionEndIncluding": "1.6.7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0FB47B1-330E-4ED4-A4AF-993DC613B782",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA7AA37E-2E1A-471D-95AE-83A2CABF1DF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "DFABFF16-FD5E-4FCF-BDF8-AE8D654CEAD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "03E211F0-2F61-4503-AE89-0F750C2848B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "55BC3D41-DB27-4509-8908-0A7F0A19206E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "96A266AD-7853-40D0-8D1B-6ECFF34A76AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB1611DD-8EB1-49FE-8995-C9D853F812F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C27222F-3FA6-4F9A-A017-37B77E536CFF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.6.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "6866F9A2-3986-4F63-8DBA-23E4B59A0C11",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The zbx_get_next_field function in libs/zbxcommon/str.c in Zabbix Server before 1.6.8 allows remote attackers to cause a denial of service (crash) via a request that lacks expected separators, which triggers a NULL pointer dereference, as demonstrated using the Command keyword."
    },
    {
      "lang": "es",
      "value": "La funci\u00f3n zbx_get_next_field de libs/zbxcommon/str.c de Zabbix Server anterior a v1.6.8 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda) a trav\u00e9s de una solicitud que carece de los separadores esperados; esto lanza una referencia a puntero nulo (NULL), como se ha demostrado al utilizar la palabra clave Command."
    }
  ],
  "id": "CVE-2009-4501",
  "lastModified": "2024-11-21T01:09:47.623",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2009-12-31T18:30:01.767",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/37740"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/archive/1/508436/30/60/threaded"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/3514"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://support.zabbix.com/browse/ZBX-1355"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/37740"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/archive/1/508436/30/60/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/3514"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://support.zabbix.com/browse/ZBX-1355"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2008-03-17 17:44
Modified
2024-11-21 00:44
Severity ?
Summary
zabbix_agentd in ZABBIX 1.4.4 allows remote attackers to cause a denial of service (CPU and connection consumption) via multiple vfs.file.cksum commands with a special device node such as /dev/urandom or /dev/zero.
Impacted products
Vendor Product Version
zabbix zabbix 1.1.2
zabbix zabbix 1.1.3
zabbix zabbix 1.1.4
zabbix zabbix 1.1.5
zabbix zabbix 1.4.2
zabbix zabbix 1.4.3



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0FB47B1-330E-4ED4-A4AF-993DC613B782",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA7AA37E-2E1A-471D-95AE-83A2CABF1DF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "DFABFF16-FD5E-4FCF-BDF8-AE8D654CEAD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "03E211F0-2F61-4503-AE89-0F750C2848B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "55BC3D41-DB27-4509-8908-0A7F0A19206E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "96A266AD-7853-40D0-8D1B-6ECFF34A76AA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "zabbix_agentd in ZABBIX 1.4.4 allows remote attackers to cause a denial of service (CPU and connection consumption) via multiple vfs.file.cksum commands with a special device node such as /dev/urandom or /dev/zero."
    },
    {
      "lang": "es",
      "value": "zabbix_agentd en ZABBIX 1.4.4, permite a atacantes remotos causar una Denegaci\u00f3n de Servicio (Consumo de CPU y conexi\u00f3n) a trav\u00e9s de m\u00faltiples comandos vfs.file.cksum con un nodo de dispositivo como  /dev/urandom o /dev/zero."
    }
  ],
  "id": "CVE-2008-1353",
  "lastModified": "2024-11-21T00:44:20.957",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2008-03-17T17:44:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/29383"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securityreason.com/securityalert/3747"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/489506/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/28244"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2008/0878"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41196"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/29383"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securityreason.com/securityalert/3747"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/489506/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/28244"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/0878"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41196"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2009-12-31 18:30
Modified
2024-11-21 01:09
Severity ?
Summary
The process_trap function in trapper/trapper.c in Zabbix Server before 1.6.6 allows remote attackers to cause a denial of service (crash) via a crafted request with data that lacks an expected : (colon) separator, which triggers a NULL pointer dereference.
Impacted products
Vendor Product Version
zabbix zabbix *
zabbix zabbix 1.1.2
zabbix zabbix 1.1.3
zabbix zabbix 1.1.4
zabbix zabbix 1.1.5
zabbix zabbix 1.4.2
zabbix zabbix 1.4.3
zabbix zabbix 1.4.4



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "46869ED6-7197-46E4-AC1B-02859034BD07",
              "versionEndIncluding": "1.4.6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0FB47B1-330E-4ED4-A4AF-993DC613B782",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA7AA37E-2E1A-471D-95AE-83A2CABF1DF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "DFABFF16-FD5E-4FCF-BDF8-AE8D654CEAD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "03E211F0-2F61-4503-AE89-0F750C2848B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "55BC3D41-DB27-4509-8908-0A7F0A19206E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "96A266AD-7853-40D0-8D1B-6ECFF34A76AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB1611DD-8EB1-49FE-8995-C9D853F812F3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The process_trap function in trapper/trapper.c in Zabbix Server before 1.6.6 allows remote attackers to cause a denial of service (crash) via a crafted request with data that lacks an expected : (colon) separator, which triggers a NULL pointer dereference."
    },
    {
      "lang": "es",
      "value": "La funci\u00f3n process_trap en trapper/trapper.c en Zabbix Server anteriores a v1.6.6 permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda) a trav\u00e9s de una petici\u00f3n manipulada con datos de carece del separador esperado (:), lo que provoca una desreferenciaci\u00f3n a puntero NULL.\r\n"
    }
  ],
  "id": "CVE-2009-4500",
  "lastModified": "2024-11-21T01:09:47.493",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2009-12-31T18:30:01.750",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/37740"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/508436/30/60/threaded"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/3514"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://support.zabbix.com/browse/ZBX-993"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/37740"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/508436/30/60/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/3514"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://support.zabbix.com/browse/ZBX-993"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2013-12-19 04:24
Modified
2024-11-21 01:59
Severity ?
Summary
Zabbix before 1.8.19rc1, 2.0 before 2.0.10rc1, and 2.2 before 2.2.1rc1 allows remote Zabbix servers and proxies to execute arbitrary commands via a newline in a flexible user parameter.
Impacted products
Vendor Product Version
zabbix zabbix *
zabbix zabbix 2.0.0
zabbix zabbix 2.2.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4A2C172-3BFA-4FB3-8A5E-558B29381374",
              "versionEndIncluding": "1.8.18",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A13691AD-76EE-461B-A5A8-C8433AC907CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "325AF70A-3CAA-4CBA-8AA8-10604371EC48",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Zabbix before 1.8.19rc1, 2.0 before 2.0.10rc1, and 2.2 before 2.2.1rc1 allows remote Zabbix servers and proxies to execute arbitrary commands via a newline in a flexible user parameter."
    },
    {
      "lang": "es",
      "value": "Zabbix anteriores a 1.8.19rc1, 2.0 anteriores a 2.0.10rc1 y 2.2 anteriores a 2.2.1rc1 permite a servidores y proxies Zabbix remotos ejectar comandos de forma arbitraria a trav\u00e9s de una newline con unos par\u00e1metros de usuarios flexibles."
    }
  ],
  "id": "CVE-2013-6824",
  "lastModified": "2024-11-21T01:59:46.857",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2013-12-19T04:24:57.197",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://security.gentoo.org/glsa/glsa-201401-26.xml"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.zabbix.com/rn1.8.19rc1.php"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.zabbix.com/rn2.0.10rc1.php"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.zabbix.com/rn2.2.1rc1.php"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "https://support.zabbix.com/browse/ZBX-7479"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-201401-26.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.zabbix.com/rn1.8.19rc1.php"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.zabbix.com/rn2.0.10rc1.php"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.zabbix.com/rn2.2.1rc1.php"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "https://support.zabbix.com/browse/ZBX-7479"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-94"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2010-08-05 13:23
Modified
2024-11-21 01:17
Severity ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in the formatQuery function in frontends/php/include/classes/class.curl.php in Zabbix before 1.8.3rc1 allow remote attackers to inject arbitrary web script or HTML via the (1) filter_set, (2) show_details, (3) filter_rst, or (4) txt_select parameters to the triggers page (tr_status.php). NOTE: some of these details are obtained from third party information.
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "50547A96-EDA3-484E-8D6D-DE4C481ADECE",
              "versionEndIncluding": "1.8.2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E916BD0-BA65-4895-B6A1-1F30E1178BEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1:beta10:*:*:*:*:*:*",
              "matchCriteriaId": "1B3EBE7F-36B9-4D00-B2CF-E933F2A7D578",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1:beta11:*:*:*:*:*:*",
              "matchCriteriaId": "472C48A5-7E2E-440D-A92C-D7F180CD630C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1:beta12:*:*:*:*:*:*",
              "matchCriteriaId": "02A06CE1-FE5B-46C5-8E1A-3EEF0E1B0D4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "00A0CA98-C23B-4042-A55F-9ED6F3A2DB5E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "481DB798-D0F7-48D2-9A07-2785FF31E613",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "A0EC0649-B10E-4557-8D67-FAAAF4AB04B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1:beta5:*:*:*:*:*:*",
              "matchCriteriaId": "ED71C8A8-14FD-4183-99AA-D9359E8DCF32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1:beta6:*:*:*:*:*:*",
              "matchCriteriaId": "16FF6B60-5D7F-4288-9CAF-1FD96DF8D318",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1:beta7:*:*:*:*:*:*",
              "matchCriteriaId": "CFA20306-A682-42AD-A8E9-A623D06476E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1:beta8:*:*:*:*:*:*",
              "matchCriteriaId": "2EA9F77B-7F7D-43C8-97EA-0985A2E275CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1:beta9:*:*:*:*:*:*",
              "matchCriteriaId": "9DA4C658-BF18-484C-9A72-EDC79E55BBF8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0FDE68D0-CF1B-4063-B3DD-850EFF17B4F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0FB47B1-330E-4ED4-A4AF-993DC613B782",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA7AA37E-2E1A-471D-95AE-83A2CABF1DF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "DFABFF16-FD5E-4FCF-BDF8-AE8D654CEAD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "03E211F0-2F61-4503-AE89-0F750C2848B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "652DC200-54ED-4354-A80C-62253CC42210",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "C581C36A-70EE-4E06-9A4C-7CDF99C0E80A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.3:beta:*:*:*:*:*:*",
              "matchCriteriaId": "A660D65E-D5C9-4D33-ABC2-E803644D0666",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.3.1:beta:*:*:*:*:*:*",
              "matchCriteriaId": "8080D8E8-738D-4EBE-B5A3-6F8819617890",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.3.2:beta:*:*:*:*:*:*",
              "matchCriteriaId": "DBC71B56-59CA-4189-BAF0-AA511FF5B944",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.3.3:beta:*:*:*:*:*:*",
              "matchCriteriaId": "13620EBC-D721-47C9-B054-8C243E300773",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.3.4:beta:*:*:*:*:*:*",
              "matchCriteriaId": "72BEAE7A-97FA-4A9E-8F3E-082F3D73597F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.3.5:beta:*:*:*:*:*:*",
              "matchCriteriaId": "CA18F8F3-33FD-4FD0-B739-23B279ABCB32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.3.6:beta:*:*:*:*:*:*",
              "matchCriteriaId": "DA7D5B83-1D9A-4E7D-9F8B-391ED384C1B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.3.7:beta:*:*:*:*:*:*",
              "matchCriteriaId": "76957BA1-20EB-4CD9-8F6F-6B742DE4B7A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.3.8:beta:*:*:*:*:*:*",
              "matchCriteriaId": "09CB3919-850F-420C-B148-7434DF8F4237",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "55BC3D41-DB27-4509-8908-0A7F0A19206E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "96A266AD-7853-40D0-8D1B-6ECFF34A76AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB1611DD-8EB1-49FE-8995-C9D853F812F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F75B7137-657E-4230-BEDA-D8EA2824138B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C27222F-3FA6-4F9A-A017-37B77E536CFF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.5:beta:*:*:*:*:*:*",
              "matchCriteriaId": "8E3057C0-8AF2-48CE-A60B-EDA138E36BC1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.5.1:beta:*:*:*:*:*:*",
              "matchCriteriaId": "CF50FF14-C17D-4043-BD33-F25BE29F583C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.5.2:beta:*:*:*:*:*:*",
              "matchCriteriaId": "4514843A-41E3-4318-BBF0-8304E51F62F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.5.3:beta:*:*:*:*:*:*",
              "matchCriteriaId": "3493784D-992A-461B-944F-D1067E43FC0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.5.4:beta:*:*:*:*:*:*",
              "matchCriteriaId": "0F7EECAF-5F40-480D-9532-9970EEBFBD71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "90F4BAE5-9A6F-4757-B413-9024FF4C9832",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6379BE78-7EFA-4D61-A97D-D336C6F30E00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E70F0D2-1D7C-4B65-B5FC-8DA2CD73E26F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7085354-F91A-4594-9E7A-5F823F8BF189",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C942C4C-2162-4C36-89BC-18F56E81280A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "7337CDB5-4E3F-41B6-A502-F86FCBA81F72",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.6.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "6866F9A2-3986-4F63-8DBA-23E4B59A0C11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.6.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC04F70A-4CB2-486F-BA7B-514065BC00AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.6.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "A293369B-4B44-4210-8D39-407536513897",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.6.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A42EBE3-FEF9-4158-ADD6-063ED75F6683",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C4A2B75-0B3B-46EC-BA80-A528DEF58DAB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B9506E6-3011-430A-B099-AFBF0CE4830B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "13C94196-4CC6-4827-944A-197F748A48E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B6DB768-148D-4067-9202-42B9C16F3DFF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "A24470D7-B73D-4253-AED2-4BE8C015D965",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD5EC94A-383D-45A5-A1BC-5F14D54FD588",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B024F97A-00AA-449D-8726-03D9E6B89541",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple cross-site scripting (XSS) vulnerabilities in the formatQuery function in frontends/php/include/classes/class.curl.php in Zabbix before 1.8.3rc1 allow remote attackers to inject arbitrary web script or HTML via the (1) filter_set, (2) show_details, (3) filter_rst, or (4) txt_select parameters to the triggers page (tr_status.php).  NOTE: some of these details are obtained from third party information."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples vulnerabilidades de secuencias de comandos en sitios cruzados (XSS) en la funci\u00f3n formatQuery en frontends/php/include/classes/class.curl.php de Zabbix anterior a v1.8.3rc1 permite a atacantes remotos injectar a su elecci\u00f3n c\u00f3digo web o HTML a trav\u00e9s de los par\u00e1metros (1) filter_set, (2) show_details, (3) filter_rst, o (4) txt_select al lanzar la p\u00e1gina (tr_status.php). NOTA: algunos de estos detalles se han obtenido de informaci\u00f3n de terceros."
    }
  ],
  "id": "CVE-2010-2790",
  "lastModified": "2024-11-21T01:17:22.960",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2010-08-05T13:23:09.680",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/40679"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/bid/42017"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2010/1908"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.zabbix.com/forum/showthread.php?p=68770"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/60772"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://support.zabbix.com/browse/ZBX-2326"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/40679"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/42017"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2010/1908"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.zabbix.com/forum/showthread.php?p=68770"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/60772"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://support.zabbix.com/browse/ZBX-2326"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-08-12 13:38
Modified
2024-12-10 16:15
Summary
Within Zabbix, users have the ability to directly modify memory pointers in the JavaScript engine.
Impacted products
Vendor Product Version
zabbix zabbix *
zabbix zabbix *
zabbix zabbix 7.0.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1D26F5C-A94F-4273-81D7-7DDF7541C3E7",
              "versionEndIncluding": "6.0.30",
              "versionStartIncluding": "6.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0DA6900-EB3E-4867-BD97-243686EECADD",
              "versionEndIncluding": "6.4.15",
              "versionStartIncluding": "6.4.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "24103B6D-6CB0-4F86-BA59-426E24F9F72A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Within Zabbix, users have the ability to directly modify memory pointers in the JavaScript engine."
    },
    {
      "lang": "es",
      "value": "Dentro de Zabbix, los usuarios tienen la capacidad de modificar directamente los punteros de memoria en el motor JavaScript."
    }
  ],
  "id": "CVE-2024-36461",
  "lastModified": "2024-12-10T16:15:23.177",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.1,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.1,
        "impactScore": 5.3,
        "source": "security@zabbix.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-08-12T13:38:22.180",
  "references": [
    {
      "source": "security@zabbix.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://support.zabbix.com/browse/ZBX-25018"
    }
  ],
  "sourceIdentifier": "security@zabbix.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-822"
        }
      ],
      "source": "security@zabbix.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2011-08-19 21:55
Modified
2024-11-21 01:29
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in acknow.php in Zabbix before 1.8.6 allows remote attackers to inject arbitrary web script or HTML via the backurl parameter.
References
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2011-August/063884.html
secalert@redhat.comhttp://lists.fedoraproject.org/pipermail/package-announce/2011-August/063904.html
secalert@redhat.comhttp://secunia.com/advisories/45502Vendor Advisory
secalert@redhat.comhttp://secunia.com/advisories/45677Vendor Advisory
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2011/08/08/2
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2011/08/09/5
secalert@redhat.comhttp://www.securityfocus.com/bid/49016
secalert@redhat.comhttp://www.zabbix.com/rn1.8.6.phpPatch
secalert@redhat.comhttps://bugzilla.redhat.com/show_bug.cgi?id=729162
secalert@redhat.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/69025
secalert@redhat.comhttps://support.zabbix.com/browse/ZBX-3835Exploit
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063884.html
af854a3a-2127-422b-91ae-364da2661108http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063904.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/45502Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/45677Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2011/08/08/2
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2011/08/09/5
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/49016
af854a3a-2127-422b-91ae-364da2661108http://www.zabbix.com/rn1.8.6.phpPatch
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=729162
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/69025
af854a3a-2127-422b-91ae-364da2661108https://support.zabbix.com/browse/ZBX-3835Exploit
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D78293D-800A-497D-86ED-A32181AB6F60",
              "versionEndIncluding": "1.8.5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E916BD0-BA65-4895-B6A1-1F30E1178BEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1:beta10:*:*:*:*:*:*",
              "matchCriteriaId": "1B3EBE7F-36B9-4D00-B2CF-E933F2A7D578",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1:beta11:*:*:*:*:*:*",
              "matchCriteriaId": "472C48A5-7E2E-440D-A92C-D7F180CD630C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1:beta12:*:*:*:*:*:*",
              "matchCriteriaId": "02A06CE1-FE5B-46C5-8E1A-3EEF0E1B0D4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "00A0CA98-C23B-4042-A55F-9ED6F3A2DB5E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "481DB798-D0F7-48D2-9A07-2785FF31E613",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "A0EC0649-B10E-4557-8D67-FAAAF4AB04B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1:beta5:*:*:*:*:*:*",
              "matchCriteriaId": "ED71C8A8-14FD-4183-99AA-D9359E8DCF32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1:beta6:*:*:*:*:*:*",
              "matchCriteriaId": "16FF6B60-5D7F-4288-9CAF-1FD96DF8D318",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1:beta7:*:*:*:*:*:*",
              "matchCriteriaId": "CFA20306-A682-42AD-A8E9-A623D06476E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1:beta8:*:*:*:*:*:*",
              "matchCriteriaId": "2EA9F77B-7F7D-43C8-97EA-0985A2E275CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1:beta9:*:*:*:*:*:*",
              "matchCriteriaId": "9DA4C658-BF18-484C-9A72-EDC79E55BBF8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0FDE68D0-CF1B-4063-B3DD-850EFF17B4F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0FB47B1-330E-4ED4-A4AF-993DC613B782",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA7AA37E-2E1A-471D-95AE-83A2CABF1DF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "DFABFF16-FD5E-4FCF-BDF8-AE8D654CEAD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "03E211F0-2F61-4503-AE89-0F750C2848B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "652DC200-54ED-4354-A80C-62253CC42210",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "C581C36A-70EE-4E06-9A4C-7CDF99C0E80A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.3:beta:*:*:*:*:*:*",
              "matchCriteriaId": "A660D65E-D5C9-4D33-ABC2-E803644D0666",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.3.1:beta:*:*:*:*:*:*",
              "matchCriteriaId": "8080D8E8-738D-4EBE-B5A3-6F8819617890",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.3.2:beta:*:*:*:*:*:*",
              "matchCriteriaId": "DBC71B56-59CA-4189-BAF0-AA511FF5B944",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.3.3:beta:*:*:*:*:*:*",
              "matchCriteriaId": "13620EBC-D721-47C9-B054-8C243E300773",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.3.4:beta:*:*:*:*:*:*",
              "matchCriteriaId": "72BEAE7A-97FA-4A9E-8F3E-082F3D73597F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.3.5:beta:*:*:*:*:*:*",
              "matchCriteriaId": "CA18F8F3-33FD-4FD0-B739-23B279ABCB32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.3.6:beta:*:*:*:*:*:*",
              "matchCriteriaId": "DA7D5B83-1D9A-4E7D-9F8B-391ED384C1B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.3.7:beta:*:*:*:*:*:*",
              "matchCriteriaId": "76957BA1-20EB-4CD9-8F6F-6B742DE4B7A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.3.8:beta:*:*:*:*:*:*",
              "matchCriteriaId": "09CB3919-850F-420C-B148-7434DF8F4237",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "55BC3D41-DB27-4509-8908-0A7F0A19206E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "96A266AD-7853-40D0-8D1B-6ECFF34A76AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB1611DD-8EB1-49FE-8995-C9D853F812F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F75B7137-657E-4230-BEDA-D8EA2824138B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C27222F-3FA6-4F9A-A017-37B77E536CFF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.5:beta:*:*:*:*:*:*",
              "matchCriteriaId": "8E3057C0-8AF2-48CE-A60B-EDA138E36BC1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.5.1:beta:*:*:*:*:*:*",
              "matchCriteriaId": "CF50FF14-C17D-4043-BD33-F25BE29F583C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.5.2:beta:*:*:*:*:*:*",
              "matchCriteriaId": "4514843A-41E3-4318-BBF0-8304E51F62F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.5.3:beta:*:*:*:*:*:*",
              "matchCriteriaId": "3493784D-992A-461B-944F-D1067E43FC0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.5.4:beta:*:*:*:*:*:*",
              "matchCriteriaId": "0F7EECAF-5F40-480D-9532-9970EEBFBD71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "90F4BAE5-9A6F-4757-B413-9024FF4C9832",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6379BE78-7EFA-4D61-A97D-D336C6F30E00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E70F0D2-1D7C-4B65-B5FC-8DA2CD73E26F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7085354-F91A-4594-9E7A-5F823F8BF189",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C942C4C-2162-4C36-89BC-18F56E81280A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "7337CDB5-4E3F-41B6-A502-F86FCBA81F72",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.6.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "6866F9A2-3986-4F63-8DBA-23E4B59A0C11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.6.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC04F70A-4CB2-486F-BA7B-514065BC00AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.6.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "A293369B-4B44-4210-8D39-407536513897",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.6.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A42EBE3-FEF9-4158-ADD6-063ED75F6683",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C4A2B75-0B3B-46EC-BA80-A528DEF58DAB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B9506E6-3011-430A-B099-AFBF0CE4830B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "13C94196-4CC6-4827-944A-197F748A48E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B6DB768-148D-4067-9202-42B9C16F3DFF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "A24470D7-B73D-4253-AED2-4BE8C015D965",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD5EC94A-383D-45A5-A1BC-5F14D54FD588",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B024F97A-00AA-449D-8726-03D9E6B89541",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CEF7DE3-7A87-4283-A7DF-FD57823C8F47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D4332A9-1D31-41BB-B374-369C583639E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.3:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "D659F67E-74CD-438C-99BE-BC0B91027D2B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.3:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "2875B4AE-D445-4902-8D73-A0274FAD20D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.3:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "92FF443D-EE65-4223-9CC7-AB120D72A260",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF5BE8CC-AC6B-4F9F-9717-26931F524092",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "3EBAE908-9F0C-4840-BFF4-625710758E2A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.4:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "58687670-217C-461F-A2C1-272442331290",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.4:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "CB9EB46D-5333-4BE1-B7EA-704F34EFC871",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.4:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "C696B16B-093A-4C1E-8ECF-8AEA74DC05D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.5:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "D186E4E3-03BE-4D3E-8ED8-43D796B19A7F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site scripting (XSS) vulnerability in acknow.php in Zabbix before 1.8.6 allows remote attackers to inject arbitrary web script or HTML via the backurl parameter."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en acknow.php en Zabbix antes de la versi\u00f3n 1.8.6 permite a atacantes remotos inyectar secuencias de comandos web o HTML a trav\u00e9s del par\u00e1metro \u0027backurl\u0027."
    }
  ],
  "id": "CVE-2011-2904",
  "lastModified": "2024-11-21T01:29:14.550",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2011-08-19T21:55:02.697",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063884.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063904.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/45502"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/45677"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.openwall.com/lists/oss-security/2011/08/08/2"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.openwall.com/lists/oss-security/2011/08/09/5"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/bid/49016"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://www.zabbix.com/rn1.8.6.php"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=729162"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69025"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Exploit"
      ],
      "url": "https://support.zabbix.com/browse/ZBX-3835"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063884.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-August/063904.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/45502"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/45677"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2011/08/08/2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2011/08/09/5"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/49016"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.zabbix.com/rn1.8.6.php"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=729162"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69025"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "https://support.zabbix.com/browse/ZBX-3835"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-01-27 16:15
Modified
2024-11-21 06:33
Summary
Zabbix 4.0 LTS, 4.2, 4.4, and 5.0 LTS is vulnerable to Remote Code Execution (RCE). Any user with the "Zabbix Admin" role is able to run custom shell script on the application server in the context of the application user.
Impacted products
Vendor Product Version
zabbix zabbix *
zabbix zabbix *
zabbix zabbix *
zabbix zabbix *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F1A0509-A7E5-4293-8AF2-67969E2FBB10",
              "versionEndIncluding": "4.0.34",
              "versionStartIncluding": "4.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "087F184B-A9B3-444B-A652-DFE696D5A524",
              "versionEndIncluding": "4.2.8",
              "versionStartIncluding": "4.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AD1E90F-0373-49AB-A31B-A8BAC8265C52",
              "versionEndIncluding": "4.4.11",
              "versionStartIncluding": "4.4.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A7A8E72-2FCB-46D4-A79C-A8CF0F1FBC06",
              "versionEndIncluding": "5.0.20",
              "versionStartIncluding": "5.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Zabbix 4.0 LTS, 4.2, 4.4, and 5.0 LTS is vulnerable to Remote Code Execution (RCE). Any user with the \"Zabbix Admin\" role is able to run custom shell script on the application server in the context of the application user."
    },
    {
      "lang": "es",
      "value": "Zabbix versiones 4.0 LTS, 4.2, 4.4 y 5.0 LTS, es vulnerable a una ejecuci\u00f3n de c\u00f3digo remota (RCE). Cualquier usuario con el rol \"Zabbix Admin\" es capaz de ejecutar un script shell personalizado en el servidor de aplicaciones en el contexto del usuario de la aplicaci\u00f3n"
    }
  ],
  "id": "CVE-2021-46088",
  "lastModified": "2024-11-21T06:33:37.607",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.2,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.2,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-01-27T16:15:07.777",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://github.com/paalbra/zabbix-zbxsec-7"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://github.com/paalbra/zabbix-zbxsec-7"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2013-10-01 03:48
Modified
2024-11-21 01:57
Severity ?
Summary
Zabbix 2.0.5 allows remote authenticated users to discover the LDAP bind password by leveraging management-console access and reading the ldap_bind_password value in the HTML source code.
Impacted products
Vendor Product Version
zabbix zabbix 2.0.5



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "20104F5A-C278-4426-AF62-FF652C242CBA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Zabbix 2.0.5 allows remote authenticated users to discover the LDAP bind password by leveraging management-console access and reading the ldap_bind_password value in the HTML source code."
    },
    {
      "lang": "es",
      "value": "Zabbix v2.0.5 permite a usuarios autenticados remotamente descubrir la contrase\u00f1a LDAP bind aprovechando el acceso a la consola de gesti\u00f3n y leyendo el valor ldap_bind_password en el c\u00f3digo fuente HTML."
    }
  ],
  "id": "CVE-2013-5572",
  "lastModified": "2024-11-21T01:57:43.840",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "NONE",
          "baseScore": 3.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 6.8,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2013-10-01T03:48:24.470",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://archives.neohapsis.com/archives/fulldisclosure/2013-09/0149.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-May/132376.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-May/132377.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://archives.neohapsis.com/archives/fulldisclosure/2013-09/0149.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-May/132376.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-May/132377.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-264"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2017-02-17 02:59
Modified
2024-11-21 02:43
Severity ?
Summary
SQL injection vulnerability in Zabbix before 2.2.14 and 3.0 before 3.0.4 allows remote attackers to execute arbitrary SQL commands via the toggle_ids array parameter in latest.php.
Impacted products
Vendor Product Version
zabbix zabbix *
zabbix zabbix 3.0.0
zabbix zabbix 3.0.1
zabbix zabbix 3.0.2
zabbix zabbix 3.0.3



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0491DBDE-417A-480F-9D26-30333914FBD2",
              "versionEndIncluding": "2.2.13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:3.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C35CF109-6E71-4A52-8BC6-AE2F0E397BFA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB23B843-B69C-4DED-A145-A4F4CDA908F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:3.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "70324316-BC45-4C87-9C73-52B1229D0CBD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:3.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB1DABCE-BB84-4CCA-981B-3431D27A2509",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "SQL injection vulnerability in Zabbix before 2.2.14 and 3.0 before 3.0.4 allows remote attackers to execute arbitrary SQL commands via the toggle_ids array parameter in latest.php."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de inyecci\u00f3n SQL en Zabbix en versiones anteriores a 2.2.14 y 3.0 en versiones anteriores a 3.0.4 permite a atacantes remotos ejecutar comandos SQL arbitrarios a trav\u00e9s del par\u00e1metro de array toggle_ids en latest.php."
    }
  ],
  "id": "CVE-2016-10134",
  "lastModified": "2024-11-21T02:43:22.780",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": true,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2017-02-17T02:59:10.623",
  "references": [
    {
      "source": "security@debian.org",
      "url": "http://www.debian.org/security/2017/dsa-3802"
    },
    {
      "source": "security@debian.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2017/01/12/4"
    },
    {
      "source": "security@debian.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2017/01/13/4"
    },
    {
      "source": "security@debian.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/95423"
    },
    {
      "source": "security@debian.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=850936"
    },
    {
      "source": "security@debian.org",
      "url": "https://code610.blogspot.com/2017/10/zbx-11023-quick-autopsy.html"
    },
    {
      "source": "security@debian.org",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://support.zabbix.com/browse/ZBX-11023"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2017/dsa-3802"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2017/01/12/4"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2017/01/13/4"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/95423"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=850936"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://code610.blogspot.com/2017/10/zbx-11023-quick-autopsy.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://support.zabbix.com/browse/ZBX-11023"
    }
  ],
  "sourceIdentifier": "security@debian.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-89"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2018-04-09 20:29
Modified
2024-11-21 03:24
Summary
An information disclosure vulnerability exists in the iConfig proxy request of Zabbix server 2.4.X. A specially crafted iConfig proxy request can cause the Zabbix server to send the configuration information of any Zabbix proxy, resulting in information disclosure. An attacker can make requests from an active Zabbix proxy to trigger this vulnerability.
Impacted products
Vendor Product Version
zabbix zabbix 2.4.0
zabbix zabbix 2.4.0
zabbix zabbix 2.4.0
zabbix zabbix 2.4.0
zabbix zabbix 2.4.1
zabbix zabbix 2.4.1
zabbix zabbix 2.4.1
zabbix zabbix 2.4.2
zabbix zabbix 2.4.2
zabbix zabbix 2.4.3
zabbix zabbix 2.4.3
zabbix zabbix 2.4.4
zabbix zabbix 2.4.4
zabbix zabbix 2.4.5
zabbix zabbix 2.4.5
zabbix zabbix 2.4.6
zabbix zabbix 2.4.6
zabbix zabbix 2.4.7
zabbix zabbix 2.4.7
zabbix zabbix 2.4.8
zabbix zabbix 2.4.8
zabbix zabbix 2.4.9
zabbix zabbix 2.4.9
debian debian_linux 8.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B847CEDA-6C3E-44DC-952B-9F92EF2E060A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.4.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "379C720C-1F28-487D-8AF8-873E916B18DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.4.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "10D1EA2C-35CC-4E35-BA5C-B0BC9D3BEEEB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.4.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "1A799E7F-C2FB-4F2C-A8C0-6254DAF8C625",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E036381E-C3B3-4E13-9FB3-1CAF15D900DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.4.1:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "66CF407E-71E0-4163-B4E7-346BF6164183",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.4.1:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "B81CDC64-CB3F-4939-BAC1-591F92D69D88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9080E8A-E1E6-46CB-B766-D8E4B68C4B08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.4.2:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "074D6347-699F-4FEB-969C-CC02751B17D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C32BD321-01C3-4910-9058-A5582A27A6D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.4.3:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "DEA0EC11-C95B-42E5-B5D0-6D938D7F909B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "85ACEED4-E5FD-42D2-BDF3-96B46EE2B9D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.4.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "BF7D63B5-8660-4B23-89EA-009EF560F95F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "B73B67B9-7184-4E7E-AA3D-52CD8A7A0CEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.4.5:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "9C2A84A1-06C7-4300-BEA6-39C4E7468665",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "59B2EB47-2255-4B56-85A5-2B6261EA93AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.4.6:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "55C1F15D-DF51-447D-87AD-C2DA4F118E32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.4.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE8C066D-3290-4073-AF74-C13ED3C733DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.4.7:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "A610E4AB-BA66-4059-B9C4-D13C4B54804A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.4.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "44D7778B-738C-42B4-81D7-DFB5456D8909",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.4.8:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "7C8623D3-5A16-45E7-8F26-6F1B7DAC51A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.4.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2E5EA48-E8E3-4214-9D23-25AB677FE96B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.4.9:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "556EE336-9968-48A6-9B1B-064ABF39D95A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "An information disclosure vulnerability exists in the iConfig proxy request of Zabbix server 2.4.X. A specially crafted iConfig proxy request can cause the Zabbix server to send the configuration information of any Zabbix proxy, resulting in information disclosure. An attacker can make requests from an active Zabbix proxy to trigger this vulnerability."
    },
    {
      "lang": "es",
      "value": "Existe una vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n en la petici\u00f3n del proxy iConfig en las versiones 2.4.X del servidor Zabbix. Una petici\u00f3n del proxy iConfig especialmente manipulada puede hacer que el servidor Zabbix env\u00ede la informaci\u00f3n de configuraci\u00f3n de cualquier proxy de Zabbix, lo que resulta en una divulgaci\u00f3n de informaci\u00f3n. Un atacante puede realizar peticiones de un proxy Zabbix activo para desencadenar esta vulnerabilidad."
    }
  ],
  "id": "CVE-2017-2826",
  "lastModified": "2024-11-21T03:24:13.680",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 3.7,
          "baseSeverity": "LOW",
          "confidentialityImpact": "LOW",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
          "version": "3.0"
        },
        "exploitabilityScore": 2.2,
        "impactScore": 1.4,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2018-04-09T20:29:00.217",
  "references": [
    {
      "source": "talos-cna@cisco.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00010.html"
    },
    {
      "source": "talos-cna@cisco.com",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2017-0327"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00010.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2017-0327"
    }
  ],
  "sourceIdentifier": "talos-cna@cisco.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-200"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-01-13 16:15
Modified
2024-11-21 06:48
Summary
An authenticated user can create a hosts group from the configuration with XSS payload, which will be available for other users. When XSS is stored by an authenticated malicious actor and other users try to search for groups during new host creation, the XSS payload will fire and the actor can steal session cookies and perform session hijacking to impersonate users or take over their accounts.
Impacted products
Vendor Product Version
zabbix zabbix *
zabbix zabbix *
zabbix zabbix 6.0.0
fedoraproject fedora 34
fedoraproject fedora 35



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5754717-C846-47CA-81C2-D2BA46BED5AD",
              "versionEndIncluding": "5.0.18",
              "versionStartIncluding": "5.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "19429F9A-8623-4BA9-984B-4982418C21CD",
              "versionEndIncluding": "5.4.8",
              "versionStartIncluding": "5.4.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:6.0.0:alpha1:*:*:*:*:*:*",
              "matchCriteriaId": "0DC67B03-AF43-45C9-8EAC-D60DA5887712",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
              "matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*",
              "matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "An authenticated user can create a hosts group from the configuration with XSS payload, which will be available for other users. When XSS is stored by an authenticated malicious actor and other users try to search for groups during new host creation, the XSS payload will fire and the actor can steal session cookies and perform session hijacking to impersonate users or take over their accounts."
    },
    {
      "lang": "es",
      "value": "Un usuario autenticado puede crear un grupo de hosts desde la configuraci\u00f3n con el payload de tipo XSS, que estar\u00e1 disponible para otros usuarios. Cuando un actor malicioso autenticado almacena XSS y otros usuarios intentan buscar grupos durante la creaci\u00f3n de nuevos hosts, la carga \u00fatil de tipo XSS se dispara y el actor puede robar las cookies de sesi\u00f3n y llevar a cabo un secuestro de sesi\u00f3n para suplantar a los usuarios o hacerse con sus cuentas"
    }
  ],
  "id": "CVE-2022-23133",
  "lastModified": "2024-11-21T06:48:04.183",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "NONE",
          "baseScore": 3.5,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 6.8,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "LOW",
          "baseScore": 6.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.4,
        "source": "security@zabbix.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.3,
        "impactScore": 2.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-01-13T16:15:08.170",
  "references": [
    {
      "source": "security@zabbix.com",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6SZYHXINBKCY42ITFSNCYE7KCSF33VRA/"
    },
    {
      "source": "security@zabbix.com",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VB6W556GVXOKUYTASTDGL3AI7S3SJHX7/"
    },
    {
      "source": "security@zabbix.com",
      "tags": [
        "Issue Tracking",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://support.zabbix.com/browse/ZBX-20388"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6SZYHXINBKCY42ITFSNCYE7KCSF33VRA/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VB6W556GVXOKUYTASTDGL3AI7S3SJHX7/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://support.zabbix.com/browse/ZBX-20388"
    }
  ],
  "sourceIdentifier": "security@zabbix.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "security@zabbix.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2011-08-19 21:55
Modified
2024-11-21 01:30
Severity ?
Summary
popup.php in Zabbix before 1.8.7 allows remote attackers to read the contents of arbitrary database tables via a modified srctbl parameter.
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD7BE526-650C-42CB-9650-80D96F36AEF0",
              "versionEndIncluding": "1.8.6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E916BD0-BA65-4895-B6A1-1F30E1178BEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1:beta10:*:*:*:*:*:*",
              "matchCriteriaId": "1B3EBE7F-36B9-4D00-B2CF-E933F2A7D578",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1:beta11:*:*:*:*:*:*",
              "matchCriteriaId": "472C48A5-7E2E-440D-A92C-D7F180CD630C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1:beta12:*:*:*:*:*:*",
              "matchCriteriaId": "02A06CE1-FE5B-46C5-8E1A-3EEF0E1B0D4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "00A0CA98-C23B-4042-A55F-9ED6F3A2DB5E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "481DB798-D0F7-48D2-9A07-2785FF31E613",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "A0EC0649-B10E-4557-8D67-FAAAF4AB04B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1:beta5:*:*:*:*:*:*",
              "matchCriteriaId": "ED71C8A8-14FD-4183-99AA-D9359E8DCF32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1:beta6:*:*:*:*:*:*",
              "matchCriteriaId": "16FF6B60-5D7F-4288-9CAF-1FD96DF8D318",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1:beta7:*:*:*:*:*:*",
              "matchCriteriaId": "CFA20306-A682-42AD-A8E9-A623D06476E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1:beta8:*:*:*:*:*:*",
              "matchCriteriaId": "2EA9F77B-7F7D-43C8-97EA-0985A2E275CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1:beta9:*:*:*:*:*:*",
              "matchCriteriaId": "9DA4C658-BF18-484C-9A72-EDC79E55BBF8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0FDE68D0-CF1B-4063-B3DD-850EFF17B4F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0FB47B1-330E-4ED4-A4AF-993DC613B782",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA7AA37E-2E1A-471D-95AE-83A2CABF1DF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "DFABFF16-FD5E-4FCF-BDF8-AE8D654CEAD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "03E211F0-2F61-4503-AE89-0F750C2848B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "652DC200-54ED-4354-A80C-62253CC42210",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "C581C36A-70EE-4E06-9A4C-7CDF99C0E80A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.3:beta:*:*:*:*:*:*",
              "matchCriteriaId": "A660D65E-D5C9-4D33-ABC2-E803644D0666",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.3.1:beta:*:*:*:*:*:*",
              "matchCriteriaId": "8080D8E8-738D-4EBE-B5A3-6F8819617890",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.3.2:beta:*:*:*:*:*:*",
              "matchCriteriaId": "DBC71B56-59CA-4189-BAF0-AA511FF5B944",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.3.3:beta:*:*:*:*:*:*",
              "matchCriteriaId": "13620EBC-D721-47C9-B054-8C243E300773",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.3.4:beta:*:*:*:*:*:*",
              "matchCriteriaId": "72BEAE7A-97FA-4A9E-8F3E-082F3D73597F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.3.5:beta:*:*:*:*:*:*",
              "matchCriteriaId": "CA18F8F3-33FD-4FD0-B739-23B279ABCB32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.3.6:beta:*:*:*:*:*:*",
              "matchCriteriaId": "DA7D5B83-1D9A-4E7D-9F8B-391ED384C1B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.3.7:beta:*:*:*:*:*:*",
              "matchCriteriaId": "76957BA1-20EB-4CD9-8F6F-6B742DE4B7A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.3.8:beta:*:*:*:*:*:*",
              "matchCriteriaId": "09CB3919-850F-420C-B148-7434DF8F4237",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "55BC3D41-DB27-4509-8908-0A7F0A19206E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "96A266AD-7853-40D0-8D1B-6ECFF34A76AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB1611DD-8EB1-49FE-8995-C9D853F812F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F75B7137-657E-4230-BEDA-D8EA2824138B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C27222F-3FA6-4F9A-A017-37B77E536CFF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.5:beta:*:*:*:*:*:*",
              "matchCriteriaId": "8E3057C0-8AF2-48CE-A60B-EDA138E36BC1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.5.1:beta:*:*:*:*:*:*",
              "matchCriteriaId": "CF50FF14-C17D-4043-BD33-F25BE29F583C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.5.2:beta:*:*:*:*:*:*",
              "matchCriteriaId": "4514843A-41E3-4318-BBF0-8304E51F62F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.5.3:beta:*:*:*:*:*:*",
              "matchCriteriaId": "3493784D-992A-461B-944F-D1067E43FC0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.5.4:beta:*:*:*:*:*:*",
              "matchCriteriaId": "0F7EECAF-5F40-480D-9532-9970EEBFBD71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "90F4BAE5-9A6F-4757-B413-9024FF4C9832",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6379BE78-7EFA-4D61-A97D-D336C6F30E00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E70F0D2-1D7C-4B65-B5FC-8DA2CD73E26F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7085354-F91A-4594-9E7A-5F823F8BF189",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C942C4C-2162-4C36-89BC-18F56E81280A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "7337CDB5-4E3F-41B6-A502-F86FCBA81F72",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.6.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "6866F9A2-3986-4F63-8DBA-23E4B59A0C11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.6.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC04F70A-4CB2-486F-BA7B-514065BC00AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.6.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "A293369B-4B44-4210-8D39-407536513897",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.6.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A42EBE3-FEF9-4158-ADD6-063ED75F6683",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C4A2B75-0B3B-46EC-BA80-A528DEF58DAB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B9506E6-3011-430A-B099-AFBF0CE4830B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "13C94196-4CC6-4827-944A-197F748A48E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B6DB768-148D-4067-9202-42B9C16F3DFF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "A24470D7-B73D-4253-AED2-4BE8C015D965",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD5EC94A-383D-45A5-A1BC-5F14D54FD588",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B024F97A-00AA-449D-8726-03D9E6B89541",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CEF7DE3-7A87-4283-A7DF-FD57823C8F47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D4332A9-1D31-41BB-B374-369C583639E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.3:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "D659F67E-74CD-438C-99BE-BC0B91027D2B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.3:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "2875B4AE-D445-4902-8D73-A0274FAD20D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.3:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "92FF443D-EE65-4223-9CC7-AB120D72A260",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF5BE8CC-AC6B-4F9F-9717-26931F524092",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "3EBAE908-9F0C-4840-BFF4-625710758E2A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.4:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "58687670-217C-461F-A2C1-272442331290",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.4:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "CB9EB46D-5333-4BE1-B7EA-704F34EFC871",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.4:rc4:*:*:*:*:*:*",
              "matchCriteriaId": "C696B16B-093A-4C1E-8ECF-8AEA74DC05D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "31ED07A1-8964-4B11-86D3-066380AC1D68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.5:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "D186E4E3-03BE-4D3E-8ED8-43D796B19A7F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.6:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "50129C05-C83D-4365-89C0-CE20010FB90F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8.6:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "1314641E-BA80-4B1D-A669-3DBBF93112D4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "popup.php in Zabbix before 1.8.7 allows remote attackers to read the contents of arbitrary database tables via a modified srctbl parameter."
    },
    {
      "lang": "es",
      "value": "popup.php en Zabbix antes de la versi\u00f3n v1.8.7 permite a atacantes remotos leer cualquier contenido de las tablas de base de datos mediante un par\u00e1metro \u0027srctbl\u0027 debidamente modificado."
    }
  ],
  "id": "CVE-2011-3265",
  "lastModified": "2024-11-21T01:30:08.463",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-08-19T21:55:02.837",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066092.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066110.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/49277"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69376"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://support.zabbix.com/browse/ZBX-3840"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://support.zabbix.com/browse/ZBX-3955"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066092.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-September/066110.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/49277"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69376"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://support.zabbix.com/browse/ZBX-3840"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://support.zabbix.com/browse/ZBX-3955"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-200"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-07-13 10:15
Modified
2024-11-21 07:57
Summary
Duktape is an 3rd-party embeddable JavaScript engine, with a focus on portability and compact footprint. When adding too many values in valstack JavaScript will crash. This issue occurs due to bug in Duktape 2.6 which is an 3rd-party solution that we use.
Impacted products
Vendor Product Version
zabbix zabbix 5.0.34
zabbix zabbix 6.0.17
zabbix zabbix 6.4.2



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:5.0.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "21E9CA91-6BA2-4046-A81B-56203307F325",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:6.0.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6C005FB-B627-4C3B-8873-4ECF4A3696CD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:6.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "2FECE71F-56F9-4E90-99EC-DBDCFE5AC605",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Duktape is an 3rd-party embeddable JavaScript engine, with a focus on portability and compact footprint. When adding too many values in valstack JavaScript will crash. This issue occurs due to bug in Duktape 2.6 which is an 3rd-party solution that we use."
    }
  ],
  "id": "CVE-2023-29458",
  "lastModified": "2024-11-21T07:57:05.837",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 5.9,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.6,
        "impactScore": 4.2,
        "source": "security@zabbix.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-07-13T10:15:09.573",
  "references": [
    {
      "source": "security@zabbix.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://support.zabbix.com/browse/ZBX-22989"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://support.zabbix.com/browse/ZBX-22989"
    }
  ],
  "sourceIdentifier": "security@zabbix.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-129"
        }
      ],
      "source": "security@zabbix.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-129"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2009-12-31 18:30
Modified
2024-11-21 01:09
Severity ?
Summary
SQL injection vulnerability in the get_history_lastid function in the nodewatcher component in Zabbix Server before 1.6.8 allows remote attackers to execute arbitrary SQL commands via a crafted request, possibly related to the send_history_last_id function in zabbix_server/trapper/nodehistory.c.
Impacted products
Vendor Product Version
zabbix zabbix *
zabbix zabbix 1.1.2
zabbix zabbix 1.1.3
zabbix zabbix 1.1.4
zabbix zabbix 1.1.5
zabbix zabbix 1.4.2
zabbix zabbix 1.4.3
zabbix zabbix 1.4.4
zabbix zabbix 1.4.6
zabbix zabbix 1.6.6



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "52E13E4C-E1AE-4B50-92C8-EDD8E0374E39",
              "versionEndIncluding": "1.6.7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0FB47B1-330E-4ED4-A4AF-993DC613B782",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA7AA37E-2E1A-471D-95AE-83A2CABF1DF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "DFABFF16-FD5E-4FCF-BDF8-AE8D654CEAD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "03E211F0-2F61-4503-AE89-0F750C2848B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "55BC3D41-DB27-4509-8908-0A7F0A19206E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "96A266AD-7853-40D0-8D1B-6ECFF34A76AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB1611DD-8EB1-49FE-8995-C9D853F812F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C27222F-3FA6-4F9A-A017-37B77E536CFF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.6.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "6866F9A2-3986-4F63-8DBA-23E4B59A0C11",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "SQL injection vulnerability in the get_history_lastid function in the nodewatcher component in Zabbix Server before 1.6.8 allows remote attackers to execute arbitrary SQL commands via a crafted request, possibly related to the send_history_last_id function in zabbix_server/trapper/nodehistory.c."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de inyecci\u00f3n SQL en la funci\u00f3n get_history_lastid en el componente nodewatcher en Zabbix Server anterior a v1.6.8 permite a atacantes remotos ejecutar comandos SQL de su elecci\u00f3n a trav\u00e9s de una petici\u00f3n manipulada, posiblemente relacionada con la funci\u00f3n send_history_last_id en zabbix_server/trapper/nodehistory.c."
    }
  ],
  "id": "CVE-2009-4499",
  "lastModified": "2024-11-21T01:09:47.360",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2009-12-31T18:30:01.717",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/37740"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/508436/30/60/threaded"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/3514"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://support.zabbix.com/browse/ZBX-1031"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/37740"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/508436/30/60/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/3514"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://support.zabbix.com/browse/ZBX-1031"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-89"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2017-01-23 21:59
Modified
2024-11-21 02:51
Summary
The mysql user parameter configuration script (userparameter_mysql.conf) in the agent in Zabbix before 2.0.18, 2.2.x before 2.2.13, and 3.0.x before 3.0.3, when used with a shell other than bash, allows context-dependent attackers to execute arbitrary code or SQL commands via the mysql.size parameter.
References
cve@mitre.orghttp://packetstormsecurity.com/files/136898/Zabbix-Agent-3.0.1-mysql.size-Shell-Command-Injection.htmlExploit, Third Party Advisory, VDB Entry
cve@mitre.orghttp://seclists.org/fulldisclosure/2016/May/9Exploit, Third Party Advisory, VDB Entry
cve@mitre.orghttp://www.securityfocus.com/archive/1/538258/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/bid/89631Third Party Advisory, VDB Entry
cve@mitre.orghttps://security.gentoo.org/glsa/201612-42Third Party Advisory, VDB Entry
cve@mitre.orghttps://support.zabbix.com/browse/ZBX-10741Exploit, Patch, Vendor Advisory
cve@mitre.orghttps://www.exploit-db.com/exploits/39769/Exploit, Third Party Advisory, VDB Entry
cve@mitre.orghttps://www.zabbix.com/documentation/2.0/manual/introduction/whatsnew2018#miscellaneous_improvementsVendor Advisory
cve@mitre.orghttps://www.zabbix.com/documentation/2.2/manual/introduction/whatsnew2213#miscellaneous_improvementsVendor Advisory
cve@mitre.orghttps://www.zabbix.com/documentation/3.0/manual/introduction/whatsnew303#miscellaneous_improvementsVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://packetstormsecurity.com/files/136898/Zabbix-Agent-3.0.1-mysql.size-Shell-Command-Injection.htmlExploit, Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://seclists.org/fulldisclosure/2016/May/9Exploit, Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/538258/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/89631Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108https://security.gentoo.org/glsa/201612-42Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108https://support.zabbix.com/browse/ZBX-10741Exploit, Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.exploit-db.com/exploits/39769/Exploit, Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108https://www.zabbix.com/documentation/2.0/manual/introduction/whatsnew2018#miscellaneous_improvementsVendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.zabbix.com/documentation/2.2/manual/introduction/whatsnew2213#miscellaneous_improvementsVendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.zabbix.com/documentation/3.0/manual/introduction/whatsnew303#miscellaneous_improvementsVendor Advisory
Impacted products
Vendor Product Version
zabbix zabbix 2.0.0
zabbix zabbix 2.0.1
zabbix zabbix 2.0.2
zabbix zabbix 2.0.3
zabbix zabbix 2.0.4
zabbix zabbix 2.0.5
zabbix zabbix 2.0.6
zabbix zabbix 2.0.7
zabbix zabbix 2.0.8
zabbix zabbix 2.0.9
zabbix zabbix 2.0.10
zabbix zabbix 2.0.11
zabbix zabbix 2.0.12
zabbix zabbix 2.0.13
zabbix zabbix 2.0.14
zabbix zabbix 2.0.15
zabbix zabbix 2.0.16
zabbix zabbix 2.0.17
zabbix zabbix 2.2.0
zabbix zabbix 2.2.1
zabbix zabbix 2.2.2
zabbix zabbix 2.2.3
zabbix zabbix 2.2.4
zabbix zabbix 2.2.5
zabbix zabbix 2.2.6
zabbix zabbix 2.2.7
zabbix zabbix 2.2.8
zabbix zabbix 2.2.9
zabbix zabbix 2.2.10
zabbix zabbix 2.2.11
zabbix zabbix 2.2.12
zabbix zabbix 3.0.0
zabbix zabbix 3.0.2



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A13691AD-76EE-461B-A5A8-C8433AC907CE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7F5CFFB-7492-4E87-8B85-2EB99CE2A9EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "29ACE6F0-E3B4-4B9D-A40A-47B66BA81FA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E538292A-0573-4F6E-8504-F86863AE1D04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "8213C387-7A54-4C86-AB6C-DF72AA17EFD6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "20104F5A-C278-4426-AF62-FF652C242CBA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "C31B0F7D-E0A5-4EB8-BEE6-963905C734A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "292B7BEC-B201-4415-8730-2424EF00B419",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "C814F99F-93DF-410C-B0F8-4370F9950515",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "24B48111-3352-4F57-AD16-2DC04BA76735",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "7822FDCC-B05B-4716-B75B-20C8C8286CE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "65E9EC9B-C075-442C-8EB7-F1FFE877A05D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5A4EFC4-BF36-4564-9F0D-2E228C994F53",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.13:*:*:*:*:*:*:*",
              "matchCriteriaId": "73516842-638E-4E42-A5DA-4E1511186B05",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.14:*:*:*:*:*:*:*",
              "matchCriteriaId": "128A8572-824D-4C04-9A7F-B22A3F18B694",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.15:*:*:*:*:*:*:*",
              "matchCriteriaId": "C97CAF96-5861-4DE1-AA8D-19C288BFB894",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "3DA8A464-665B-4D43-B273-2062020996F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.0.17:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEA52C15-7E7C-422A-A003-F5B273C05D80",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.2.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "C8E20742-98CE-41DE-AEE7-28B2D85FE7D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.2.1:-:*:*:*:*:*:*",
              "matchCriteriaId": "C69CF03C-D881-45B9-B70C-007D6237C2DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.2.2:-:*:*:*:*:*:*",
              "matchCriteriaId": "DD650581-FCC2-455A-B39B-2B7293C3BA06",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.2.3:-:*:*:*:*:*:*",
              "matchCriteriaId": "037D7380-4763-46AC-80DE-905732FC96E0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E369F7E-7BA8-4A13-A1AD-D270D6525F8F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D7D00BD-DB3A-4423-B69A-A4F9D0DD6424",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "D071ECA5-0D7D-4244-8E89-64E321C14EFE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "78AC01B9-47EE-4D55-8836-B483014B3101",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "EDFFE22A-D946-4FB0-8E82-8BB5B58DF5D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.2.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC7C8136-4C20-4D33-8FE0-04F2702299CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.2.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "72391035-99FB-43C1-BB5F-F1B7B0C966AE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.2.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "C8DFCF86-062C-4750-9669-34C4F7A4354A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:2.2.12:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC7486A9-8D75-492A-81F4-93B931F7B447",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:3.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C35CF109-6E71-4A52-8BC6-AE2F0E397BFA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:3.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "70324316-BC45-4C87-9C73-52B1229D0CBD",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The mysql user parameter configuration script (userparameter_mysql.conf) in the agent in Zabbix before 2.0.18, 2.2.x before 2.2.13, and 3.0.x before 3.0.3, when used with a shell other than bash, allows context-dependent attackers to execute arbitrary code or SQL commands via the mysql.size parameter."
    },
    {
      "lang": "es",
      "value": "La secuencia de comandos de configuraci\u00f3n de par\u00e1metros de usuario de mysql (userparameter_mysql.conf) en el agente en Zabbix en versiones anteriores a 2.0.18, 2.2.x en versiones anteriores a 2.2.13 y 3.0.x en versiones anteriores a 3.0.3, cuando se utiliza con un shell que no sea bash, permite a atacantes dependientes de contexto ejecutar c\u00f3digo arbitrario o comandos SQL a trav\u00e9s del par\u00e1metro mysql.size."
    }
  ],
  "id": "CVE-2016-4338",
  "lastModified": "2024-11-21T02:51:53.700",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.1,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 2.2,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2017-01-23T21:59:01.423",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://packetstormsecurity.com/files/136898/Zabbix-Agent-3.0.1-mysql.size-Shell-Command-Injection.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://seclists.org/fulldisclosure/2016/May/9"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/538258/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/89631"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://security.gentoo.org/glsa/201612-42"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://support.zabbix.com/browse/ZBX-10741"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://www.exploit-db.com/exploits/39769/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.zabbix.com/documentation/2.0/manual/introduction/whatsnew2018#miscellaneous_improvements"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.zabbix.com/documentation/2.2/manual/introduction/whatsnew2213#miscellaneous_improvements"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.zabbix.com/documentation/3.0/manual/introduction/whatsnew303#miscellaneous_improvements"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://packetstormsecurity.com/files/136898/Zabbix-Agent-3.0.1-mysql.size-Shell-Command-Injection.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://seclists.org/fulldisclosure/2016/May/9"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/538258/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/89631"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://security.gentoo.org/glsa/201612-42"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://support.zabbix.com/browse/ZBX-10741"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://www.exploit-db.com/exploits/39769/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.zabbix.com/documentation/2.0/manual/introduction/whatsnew2018#miscellaneous_improvements"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.zabbix.com/documentation/2.2/manual/introduction/whatsnew2213#miscellaneous_improvements"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.zabbix.com/documentation/3.0/manual/introduction/whatsnew303#miscellaneous_improvements"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-89"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2011-11-23 01:55
Modified
2024-11-21 01:22
Severity ?
Summary
SQL injection vulnerability in events.php in Zabbix 1.8.1 and earlier allows remote attackers to execute arbitrary SQL commands via the nav_time parameter.
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "27355F43-2F9C-4A49-BE4A-2273F4AE959A",
              "versionEndIncluding": "1.8.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E916BD0-BA65-4895-B6A1-1F30E1178BEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1:beta10:*:*:*:*:*:*",
              "matchCriteriaId": "1B3EBE7F-36B9-4D00-B2CF-E933F2A7D578",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1:beta11:*:*:*:*:*:*",
              "matchCriteriaId": "472C48A5-7E2E-440D-A92C-D7F180CD630C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1:beta12:*:*:*:*:*:*",
              "matchCriteriaId": "02A06CE1-FE5B-46C5-8E1A-3EEF0E1B0D4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "00A0CA98-C23B-4042-A55F-9ED6F3A2DB5E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "481DB798-D0F7-48D2-9A07-2785FF31E613",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "A0EC0649-B10E-4557-8D67-FAAAF4AB04B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1:beta5:*:*:*:*:*:*",
              "matchCriteriaId": "ED71C8A8-14FD-4183-99AA-D9359E8DCF32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1:beta6:*:*:*:*:*:*",
              "matchCriteriaId": "16FF6B60-5D7F-4288-9CAF-1FD96DF8D318",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1:beta7:*:*:*:*:*:*",
              "matchCriteriaId": "CFA20306-A682-42AD-A8E9-A623D06476E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1:beta8:*:*:*:*:*:*",
              "matchCriteriaId": "2EA9F77B-7F7D-43C8-97EA-0985A2E275CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1:beta9:*:*:*:*:*:*",
              "matchCriteriaId": "9DA4C658-BF18-484C-9A72-EDC79E55BBF8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0FDE68D0-CF1B-4063-B3DD-850EFF17B4F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0FB47B1-330E-4ED4-A4AF-993DC613B782",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA7AA37E-2E1A-471D-95AE-83A2CABF1DF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "DFABFF16-FD5E-4FCF-BDF8-AE8D654CEAD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "03E211F0-2F61-4503-AE89-0F750C2848B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "652DC200-54ED-4354-A80C-62253CC42210",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "C581C36A-70EE-4E06-9A4C-7CDF99C0E80A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.3:beta:*:*:*:*:*:*",
              "matchCriteriaId": "A660D65E-D5C9-4D33-ABC2-E803644D0666",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.3.1:beta:*:*:*:*:*:*",
              "matchCriteriaId": "8080D8E8-738D-4EBE-B5A3-6F8819617890",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.3.2:beta:*:*:*:*:*:*",
              "matchCriteriaId": "DBC71B56-59CA-4189-BAF0-AA511FF5B944",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.3.3:beta:*:*:*:*:*:*",
              "matchCriteriaId": "13620EBC-D721-47C9-B054-8C243E300773",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.3.4:beta:*:*:*:*:*:*",
              "matchCriteriaId": "72BEAE7A-97FA-4A9E-8F3E-082F3D73597F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.3.5:beta:*:*:*:*:*:*",
              "matchCriteriaId": "CA18F8F3-33FD-4FD0-B739-23B279ABCB32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.3.6:beta:*:*:*:*:*:*",
              "matchCriteriaId": "DA7D5B83-1D9A-4E7D-9F8B-391ED384C1B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.3.7:beta:*:*:*:*:*:*",
              "matchCriteriaId": "76957BA1-20EB-4CD9-8F6F-6B742DE4B7A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.3.8:beta:*:*:*:*:*:*",
              "matchCriteriaId": "09CB3919-850F-420C-B148-7434DF8F4237",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "55BC3D41-DB27-4509-8908-0A7F0A19206E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "96A266AD-7853-40D0-8D1B-6ECFF34A76AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB1611DD-8EB1-49FE-8995-C9D853F812F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F75B7137-657E-4230-BEDA-D8EA2824138B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.4.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C27222F-3FA6-4F9A-A017-37B77E536CFF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.5:beta:*:*:*:*:*:*",
              "matchCriteriaId": "8E3057C0-8AF2-48CE-A60B-EDA138E36BC1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.5.1:beta:*:*:*:*:*:*",
              "matchCriteriaId": "CF50FF14-C17D-4043-BD33-F25BE29F583C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.5.2:beta:*:*:*:*:*:*",
              "matchCriteriaId": "4514843A-41E3-4318-BBF0-8304E51F62F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.5.3:beta:*:*:*:*:*:*",
              "matchCriteriaId": "3493784D-992A-461B-944F-D1067E43FC0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.5.4:beta:*:*:*:*:*:*",
              "matchCriteriaId": "0F7EECAF-5F40-480D-9532-9970EEBFBD71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "90F4BAE5-9A6F-4757-B413-9024FF4C9832",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6379BE78-7EFA-4D61-A97D-D336C6F30E00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E70F0D2-1D7C-4B65-B5FC-8DA2CD73E26F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.6.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7085354-F91A-4594-9E7A-5F823F8BF189",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.6.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C942C4C-2162-4C36-89BC-18F56E81280A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "7337CDB5-4E3F-41B6-A502-F86FCBA81F72",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.6.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "6866F9A2-3986-4F63-8DBA-23E4B59A0C11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.6.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC04F70A-4CB2-486F-BA7B-514065BC00AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.6.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "A293369B-4B44-4210-8D39-407536513897",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.6.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A42EBE3-FEF9-4158-ADD6-063ED75F6683",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C4A2B75-0B3B-46EC-BA80-A528DEF58DAB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B9506E6-3011-430A-B099-AFBF0CE4830B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "13C94196-4CC6-4827-944A-197F748A48E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B6DB768-148D-4067-9202-42B9C16F3DFF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "A24470D7-B73D-4253-AED2-4BE8C015D965",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD5EC94A-383D-45A5-A1BC-5F14D54FD588",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "SQL injection vulnerability in events.php in Zabbix 1.8.1 and earlier allows remote attackers to execute arbitrary SQL commands via the nav_time parameter."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de inyecci\u00f3n SQL en events.php en Zabbix v1.8.1 y anteriores, permite a atacantes remotos inyectar comandos SQL de su elecci\u00f3n a trav\u00e9s del par\u00e1metro nav_time."
    }
  ],
  "id": "CVE-2010-5049",
  "lastModified": "2024-11-21T01:22:23.023",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-11-23T01:55:04.157",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://packetstormsecurity.org/1004-exploits/zabbix181-sql.txt"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/39119"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/511454/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/39752"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2010/1240"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://packetstormsecurity.org/1004-exploits/zabbix181-sql.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/39119"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/511454/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/39752"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2010/1240"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-89"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2009-12-31 18:30
Modified
2024-11-21 01:09
Severity ?
Summary
The node_process_command function in Zabbix Server before 1.8 allows remote attackers to execute arbitrary commands via a crafted request.
Impacted products
Vendor Product Version
zabbix zabbix *
zabbix zabbix 1.1.2
zabbix zabbix 1.1.3
zabbix zabbix 1.1.4
zabbix zabbix 1.1.5
zabbix zabbix 1.4.2
zabbix zabbix 1.4.3
zabbix zabbix 1.6.6
zabbix zabbix 1.6.7
zabbix zabbix 1.6.8
zabbix zabbix 1.7
zabbix zabbix 1.7.1
zabbix zabbix 1.7.2
zabbix zabbix 1.7.3



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "029D5AFC-404B-4BF2-AB85-F04F2E77F4BD",
              "versionEndIncluding": "1.7.4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0FB47B1-330E-4ED4-A4AF-993DC613B782",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA7AA37E-2E1A-471D-95AE-83A2CABF1DF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "DFABFF16-FD5E-4FCF-BDF8-AE8D654CEAD4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "03E211F0-2F61-4503-AE89-0F750C2848B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "55BC3D41-DB27-4509-8908-0A7F0A19206E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "96A266AD-7853-40D0-8D1B-6ECFF34A76AA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.6.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "6866F9A2-3986-4F63-8DBA-23E4B59A0C11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.6.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC04F70A-4CB2-486F-BA7B-514065BC00AF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.6.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "A293369B-4B44-4210-8D39-407536513897",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C4A2B75-0B3B-46EC-BA80-A528DEF58DAB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B9506E6-3011-430A-B099-AFBF0CE4830B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "13C94196-4CC6-4827-944A-197F748A48E2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:1.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B6DB768-148D-4067-9202-42B9C16F3DFF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The node_process_command function in Zabbix Server before 1.8 allows remote attackers to execute arbitrary commands via a crafted request."
    },
    {
      "lang": "es",
      "value": "La funci\u00f3n node_process_command function de Zabbix Server en versiones anteriores a la v1.8 permite a atacantes remotos ejecutar comandos de su elecci\u00f3n a trav\u00e9s de una petici\u00f3n modificada."
    }
  ],
  "id": "CVE-2009-4498",
  "lastModified": "2024-11-21T01:09:47.223",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2009-12-31T18:30:01.627",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/37740"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.openwall.com/lists/oss-security/2010/04/02/1"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/508436/30/60/threaded"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/3514"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://support.zabbix.com/browse/ZBX-1030"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/37740"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2010/04/02/1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/508436/30/60/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2009/3514"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://support.zabbix.com/browse/ZBX-1030"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-78"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2019-08-17 18:15
Modified
2024-11-21 04:28
Summary
Zabbix through 4.4.0alpha1 allows User Enumeration. With login requests, it is possible to enumerate application usernames based on the variability of server responses (e.g., the "Login name or password is incorrect" and "No permissions for system access" messages, or just blocking for a number of seconds). This affects both api_jsonrpc.php and index.php.
Impacted products
Vendor Product Version
zabbix zabbix *
zabbix zabbix *
zabbix zabbix *
zabbix zabbix 4.4.0
debian debian_linux 9.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A45A296D-29EE-4BFA-BAE5-547097D80BEB",
              "versionEndIncluding": "4.0.26",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B26DDF2A-ABF5-4C74-88EE-37A4C0496785",
              "versionEndIncluding": "5.0.5",
              "versionStartIncluding": "5.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DAB9A55-5251-461A-A6AA-B3A834956D89",
              "versionEndIncluding": "5.2.1",
              "versionStartIncluding": "5.2.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:zabbix:zabbix:4.4.0:alpha1:*:*:*:*:*:*",
              "matchCriteriaId": "F5C8FB6D-1539-428A-B57D-D066492FD305",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Zabbix through 4.4.0alpha1 allows User Enumeration. With login requests, it is possible to enumerate application usernames based on the variability of server responses (e.g., the \"Login name or password is incorrect\" and \"No permissions for system access\" messages, or just blocking for a number of seconds). This affects both api_jsonrpc.php and index.php."
    },
    {
      "lang": "es",
      "value": "Zabbix versiones hasta 4.4.0alpha1, permite la enumeraci\u00f3n de usuarios. Con las peticiones de inicio de sesi\u00f3n, es posible enumerar los nombres de usuario de la aplicaci\u00f3n en funci\u00f3n de la variabilidad de las respuestas del servidor (por ejemplo, los mensajes \"Login name or password is incorrect\" y \"No permissions for system access\", o solo bloqueando durante varios segundos). Esto afecta tanto al archivo api_jsonrpc.php como al archivo index.php."
    }
  ],
  "id": "CVE-2019-15132",
  "lastModified": "2024-11-21T04:28:07.297",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 1.4,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-08-17T18:15:10.690",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00018.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00013.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://support.zabbix.com/browse/ZBX-16532"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "https://lists.debian.org/debian-lts-announce/2021/04/msg00018.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00013.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://support.zabbix.com/browse/ZBX-16532"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-203"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

var-201112-0335
Vulnerability from variot

SQL injection vulnerability in popup.php in Zabbix 1.8.3 and 1.8.4, and possibly other versions before 1.8.9, allows remote attackers to execute arbitrary SQL commands via the only_hostid parameter. ZABBIX is a distributed network monitoring system with CS structure. Because applications fail to adequately filter user-provided data before being used in SQL queries, an attacker can exploit a vulnerability to compromise an application, access or modify data, or exploit potential vulnerabilities in the underlying database. ZABBIX is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. ZABBIX versions 1.8.3 and 1.8.4 are vulnerable. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201311-15


                                        http://security.gentoo.org/

Severity: Normal Title: Zabbix: Multiple vulnerabilities Date: November 25, 2013 Bugs: #312875, #394497, #428372, #452878, #486696 ID: 201311-15


Synopsis

Multiple vulnerabilities have been found in Zabbix, possibly leading to SQL injection attacks, Denial of Service, or information disclosure.

Background

Zabbix is software for monitoring applications, networks, and servers.

Affected packages

-------------------------------------------------------------------
 Package              /     Vulnerable     /            Unaffected
-------------------------------------------------------------------

1 net-analyzer/zabbix < 2.0.9_rc1-r2 >= 2.0.9_rc1-r2

Description

Multiple vulnerabilities have been discovered in Zabbix. Please review the CVE identifiers referenced below for details.

Impact

A remote attacker may be able to execute arbitrary SQL statements, cause a Denial of Service condition, or obtain sensitive information.

Workaround

There is no known workaround at this time.

Resolution

All Zabbix users should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot -v ">=net-analyzer/zabbix-2.0.9_rc1-r2"

References

[ 1 ] CVE-2010-1277 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1277 [ 2 ] CVE-2011-2904 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2904 [ 3 ] CVE-2011-3263 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3263 [ 4 ] CVE-2011-4674 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4674 [ 5 ] CVE-2012-3435 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3435 [ 6 ] CVE-2013-1364 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1364 [ 7 ] CVE-2013-5572 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5572

Availability

This GLSA and any updates to it are available for viewing at the Gentoo Security Website:

http://security.gentoo.org/glsa/glsa-201311-15.xml

Concerns?

Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.

License

Copyright 2013 Gentoo Foundation, Inc; referenced text belongs to its owner(s).

The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201112-0335",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 3.3,
        "vendor": "zabbix",
        "version": "1.8.4"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 3.3,
        "vendor": "zabbix",
        "version": "1.8.3"
      },
      {
        "model": "linux",
        "scope": null,
        "trust": 0.3,
        "vendor": "gentoo",
        "version": null
      },
      {
        "model": "zabbix",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "zabbix",
        "version": "1.8.9"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "zabbix",
        "version": "1.8.3"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "zabbix",
        "version": "1.8.4"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "ccc54b70-1f7d-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2011-5067"
      },
      {
        "db": "BID",
        "id": "50803"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-003195"
      },
      {
        "db": "NVD",
        "id": "CVE-2011-4674"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201112-017"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.8.4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.8.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2011-4674"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "M?cio Almeida de Mac?o",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201111-443"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2011-4674",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "HIGH",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Network",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "Partial",
            "baseScore": 7.5,
            "confidentialityImpact": "Partial",
            "exploitabilityScore": null,
            "id": "CVE-2011-4674",
            "impactScore": null,
            "integrityImpact": "Partial",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "High",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "ccc54b70-1f7d-11e6-abef-000c29c66e3d",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.2,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.9 [IVD]"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2011-4674",
            "trust": 1.8,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201112-017",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "IVD",
            "id": "ccc54b70-1f7d-11e6-abef-000c29c66e3d",
            "trust": 0.2,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "ccc54b70-1f7d-11e6-abef-000c29c66e3d"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-003195"
      },
      {
        "db": "NVD",
        "id": "CVE-2011-4674"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201112-017"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "SQL injection vulnerability in popup.php in Zabbix 1.8.3 and 1.8.4, and possibly other versions before 1.8.9, allows remote attackers to execute arbitrary SQL commands via the only_hostid parameter. ZABBIX is a distributed network monitoring system with CS structure. Because applications fail to adequately filter user-provided data before being used in SQL queries, an attacker can exploit a vulnerability to compromise an application, access or modify data, or exploit potential vulnerabilities in the underlying database. ZABBIX is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. \nZABBIX versions 1.8.3 and 1.8.4 are vulnerable. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory                           GLSA 201311-15\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n                                            http://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: Normal\n    Title: Zabbix: Multiple vulnerabilities\n     Date: November 25, 2013\n     Bugs: #312875, #394497, #428372, #452878, #486696\n       ID: 201311-15\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nMultiple vulnerabilities have been found in Zabbix, possibly leading to\nSQL injection attacks, Denial of Service, or information disclosure. \n\nBackground\n==========\n\nZabbix is software for monitoring applications, networks, and servers. \n\nAffected packages\n=================\n\n    -------------------------------------------------------------------\n     Package              /     Vulnerable     /            Unaffected\n    -------------------------------------------------------------------\n  1  net-analyzer/zabbix       \u003c 2.0.9_rc1-r2         \u003e= 2.0.9_rc1-r2\n\nDescription\n===========\n\nMultiple vulnerabilities have been discovered in Zabbix. Please review\nthe CVE identifiers referenced below for details. \n\nImpact\n======\n\nA remote attacker may be able to execute arbitrary SQL statements,\ncause a Denial of Service condition, or obtain sensitive information. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll Zabbix users should upgrade to the latest version:\n\n  # emerge --sync\n  # emerge --ask --oneshot -v \"\u003e=net-analyzer/zabbix-2.0.9_rc1-r2\"\n\nReferences\n==========\n\n[ 1 ] CVE-2010-1277\n      http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1277\n[ 2 ] CVE-2011-2904\n      http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2904\n[ 3 ] CVE-2011-3263\n      http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3263\n[ 4 ] CVE-2011-4674\n      http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4674\n[ 5 ] CVE-2012-3435\n      http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3435\n[ 6 ] CVE-2013-1364\n      http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1364\n[ 7 ] CVE-2013-5572\n      http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5572\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n http://security.gentoo.org/glsa/glsa-201311-15.xml\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users\u0027 machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2013 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.5\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2011-4674"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-003195"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2011-5067"
      },
      {
        "db": "BID",
        "id": "50803"
      },
      {
        "db": "IVD",
        "id": "ccc54b70-1f7d-11e6-abef-000c29c66e3d"
      },
      {
        "db": "PACKETSTORM",
        "id": "124173"
      }
    ],
    "trust": 2.7
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "BID",
        "id": "50803",
        "trust": 3.1
      },
      {
        "db": "NVD",
        "id": "CVE-2011-4674",
        "trust": 3.0
      },
      {
        "db": "EXPLOIT-DB",
        "id": "18155",
        "trust": 1.6
      },
      {
        "db": "CNVD",
        "id": "CNVD-2011-5067",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201112-017",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-003195",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201111-443",
        "trust": 0.6
      },
      {
        "db": "XF",
        "id": "71479",
        "trust": 0.6
      },
      {
        "db": "IVD",
        "id": "CCC54B70-1F7D-11E6-ABEF-000C29C66E3D",
        "trust": 0.2
      },
      {
        "db": "PACKETSTORM",
        "id": "124173",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "ccc54b70-1f7d-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2011-5067"
      },
      {
        "db": "BID",
        "id": "50803"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-003195"
      },
      {
        "db": "PACKETSTORM",
        "id": "124173"
      },
      {
        "db": "NVD",
        "id": "CVE-2011-4674"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201111-443"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201112-017"
      }
    ]
  },
  "id": "VAR-201112-0335",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "ccc54b70-1f7d-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2011-5067"
      }
    ],
    "trust": 0.08
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "ccc54b70-1f7d-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2011-5067"
      }
    ]
  },
  "last_update_date": "2023-12-18T12:11:18.450000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "ZBX-4385",
        "trust": 0.8,
        "url": "https://support.zabbix.com/browse/zbx-4385"
      },
      {
        "title": "ZABBIX \u0027only_hostid\u0027 parameter SQL injection vulnerability patch",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchinfo/show/6037"
      },
      {
        "title": "zabbix-1.8.9",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=41938"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2011-5067"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-003195"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201112-017"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-89",
        "trust": 1.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-003195"
      },
      {
        "db": "NVD",
        "id": "CVE-2011-4674"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.8,
        "url": "http://www.securityfocus.com/bid/50803"
      },
      {
        "trust": 1.6,
        "url": "http://www.exploit-db.com/exploits/18155"
      },
      {
        "trust": 1.6,
        "url": "https://support.zabbix.com/browse/zbx-4385"
      },
      {
        "trust": 1.0,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71479"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-4674"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-4674"
      },
      {
        "trust": 0.6,
        "url": "http://xforce.iss.net/xforce/xfdb/71479"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-1277"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2011-4674"
      },
      {
        "trust": 0.1,
        "url": "http://creativecommons.org/licenses/by-sa/2.5"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-5572"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3263"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3435"
      },
      {
        "trust": 0.1,
        "url": "http://security.gentoo.org/glsa/glsa-201311-15.xml"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-1364"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3263"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2013-1364"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2013-5572"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-4674"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2904"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2010-1277"
      },
      {
        "trust": 0.1,
        "url": "http://security.gentoo.org/"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2011-2904"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2012-3435"
      },
      {
        "trust": 0.1,
        "url": "https://bugs.gentoo.org."
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2011-5067"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-003195"
      },
      {
        "db": "PACKETSTORM",
        "id": "124173"
      },
      {
        "db": "NVD",
        "id": "CVE-2011-4674"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201111-443"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201112-017"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "IVD",
        "id": "ccc54b70-1f7d-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2011-5067"
      },
      {
        "db": "BID",
        "id": "50803"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-003195"
      },
      {
        "db": "PACKETSTORM",
        "id": "124173"
      },
      {
        "db": "NVD",
        "id": "CVE-2011-4674"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201111-443"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201112-017"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2011-11-25T00:00:00",
        "db": "IVD",
        "id": "ccc54b70-1f7d-11e6-abef-000c29c66e3d"
      },
      {
        "date": "2011-11-25T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2011-5067"
      },
      {
        "date": "2011-11-24T00:00:00",
        "db": "BID",
        "id": "50803"
      },
      {
        "date": "2011-12-06T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2011-003195"
      },
      {
        "date": "2013-11-25T23:55:55",
        "db": "PACKETSTORM",
        "id": "124173"
      },
      {
        "date": "2011-12-02T18:55:02.967000",
        "db": "NVD",
        "id": "CVE-2011-4674"
      },
      {
        "date": "1900-01-01T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201111-443"
      },
      {
        "date": "2011-12-05T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201112-017"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2011-11-25T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2011-5067"
      },
      {
        "date": "2015-04-13T21:58:00",
        "db": "BID",
        "id": "50803"
      },
      {
        "date": "2011-12-06T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2011-003195"
      },
      {
        "date": "2017-08-29T01:30:32.257000",
        "db": "NVD",
        "id": "CVE-2011-4674"
      },
      {
        "date": "2011-11-28T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201111-443"
      },
      {
        "date": "2011-12-05T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201112-017"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201111-443"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201112-017"
      }
    ],
    "trust": 1.2
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "ZABBIX \u0027only_hostid\u0027 parameter SQL injection vulnerability",
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2011-5067"
      },
      {
        "db": "BID",
        "id": "50803"
      }
    ],
    "trust": 0.9
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "SQL injection",
    "sources": [
      {
        "db": "IVD",
        "id": "ccc54b70-1f7d-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201111-443"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201112-017"
      }
    ],
    "trust": 1.4
  }
}

var-201008-0180
Vulnerability from variot

Multiple cross-site scripting (XSS) vulnerabilities in the formatQuery function in frontends/php/include/classes/class.curl.php in Zabbix before 1.8.3rc1 allow remote attackers to inject arbitrary web script or HTML via the (1) filter_set, (2) show_details, (3) filter_rst, or (4) txt_select parameters to the triggers page (tr_status.php). NOTE: some of these details are obtained from third party information. Zabbix is a CS network distributed network monitoring system. ZABBIX is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks. ZABBIX version 1.8.2 is vulnerable; other versions may also be affected. ----------------------------------------------------------------------

"From 2007 to 2009 vulnerabilities in a typical end-user PC almost doubled from about 220 to 420."

Non-Microsoft software to blame for increase in vulnerabilities affecting typical Windows end-users, read more:

http://secunia.com/gfx/pdf/Secunia_Half_Year_Report_2010.pdf


TITLE: Zabbix PHP Frontend "formatQuery()" Cross-Site Scripting Vulnerability

SECUNIA ADVISORY ID: SA40679

VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/40679/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=40679

RELEASE DATE: 2010-07-28

DISCUSS ADVISORY: http://secunia.com/advisories/40679/#comments

AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s)

http://secunia.com/advisories/40679/

ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS

https://ca.secunia.com/?page=viewadvisory&vuln_id=40679

ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING

http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

DESCRIPTION: A vulnerability has been discovered in Zabbix, which can be exploited by malicious people to conduct cross-site scripting attacks.

Various input is not properly sanitised by the "formatQuery()" function of the "Curl" class in frontends/php/include/classes/class.curl.php before being returned to the user.

SOLUTION: Fixed in version 1.8.3-rc1.

PROVIDED AND/OR DISCOVERED BY: Reported as a normal bug by alixen. Later independently reported as cross-site scripting vulnerabilities in frontends/php/tr_status.php by Vupen.

ORIGINAL ADVISORY: Zabbix: http://www.zabbix.com/forum/showthread.php?p=68770 https://support.zabbix.com/browse/ZBX-2326

OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/

DEEP LINKS: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/

EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/

EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/

EXPLOIT: Further details available in Customer Area: http://secunia.com/products/corporate/EVM/


About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/advisories/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.


Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org


Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201008-0180",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "zabbix",
        "version": "1.5.2"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "zabbix",
        "version": "1.6.4"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "zabbix",
        "version": "1.6"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "zabbix",
        "version": "1.6.2"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "zabbix",
        "version": "1.5.4"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "zabbix",
        "version": "1.5.1"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "zabbix",
        "version": "1.5"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "zabbix",
        "version": "1.6.5"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "zabbix",
        "version": "1.6.9"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "zabbix",
        "version": "1.6.1"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.4.5"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.3.4"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.4.4"
      },
      {
        "model": "zabbix",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.8.2"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.1.3"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.1.5"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.3"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.3.1"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.8.1"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.1"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.1.7"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.7.2"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.1.1"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.6.6"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.7"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.3.2"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.3.7"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.1.6"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.4.2"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.4.6"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.8"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.6.7"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.3.5"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.6.8"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.7.1"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.1.2"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.3.3"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.3.8"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.5.3"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.6.3"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.3.6"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.4.3"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.1.4"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.7.4"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.7.3"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "zabbix",
        "version": "1.8.2"
      },
      {
        "model": "zabbix",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "zabbix",
        "version": "1.8.3rc1"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2010-1470"
      },
      {
        "db": "BID",
        "id": "42017"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2010-001957"
      },
      {
        "db": "NVD",
        "id": "CVE-2010-2790"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201008-024"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.6.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.1:beta2:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.1.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.7.4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.5.3:beta:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.1.4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.1.6:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.4.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.6.5:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.4.6:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.6.8:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.1:beta4:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.7.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.4.4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.5.1:beta:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.3.7:beta:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.7.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.8:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.6.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.1:beta3:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.3.1:beta:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.3.2:beta:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.6.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.7:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.3.5:beta:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.1.7:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.6:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.6.7:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.6.4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.1:beta9:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.1:beta10:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.3.8:beta:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.7.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.1:beta6:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.3.6:beta:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.5.4:beta:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.1.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.1:beta8:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.1:beta11:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.1:beta7:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.1.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.8.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.6.6:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.6.9:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.4.5:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.3.4:beta:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.1:beta5:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.5:beta:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.4.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.1:beta12:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.1.5:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "1.8.2",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.5.2:beta:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.3.3:beta:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.3:beta:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2010-2790"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Alixen",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201008-024"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2010-2790",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 8.6,
            "impactScore": 2.9,
            "integrityImpact": "PARTIAL",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "MEDIUM",
            "trust": 1.0,
            "userInteractionRequired": true,
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Medium",
            "accessVector": "Network",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "None",
            "baseScore": 4.3,
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "CVE-2010-2790",
            "impactScore": null,
            "integrityImpact": "Partial",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2010-2790",
            "trust": 1.8,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201008-024",
            "trust": 0.6,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2010-001957"
      },
      {
        "db": "NVD",
        "id": "CVE-2010-2790"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201008-024"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Multiple cross-site scripting (XSS) vulnerabilities in the formatQuery function in frontends/php/include/classes/class.curl.php in Zabbix before 1.8.3rc1 allow remote attackers to inject arbitrary web script or HTML via the (1) filter_set, (2) show_details, (3) filter_rst, or (4) txt_select parameters to the triggers page (tr_status.php).  NOTE: some of these details are obtained from third party information. Zabbix is a CS network distributed network monitoring system. ZABBIX is prone to a cross-site scripting vulnerability because it fails to properly sanitize user-supplied input. \nAn attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks. \nZABBIX version 1.8.2 is vulnerable; other versions may also be affected. ----------------------------------------------------------------------\n\n\n\"From 2007 to 2009 vulnerabilities in a typical end-user PC almost doubled from about 220 to 420.\"\n\nNon-Microsoft software to blame for increase in vulnerabilities affecting typical Windows end-users, read more:\n\nhttp://secunia.com/gfx/pdf/Secunia_Half_Year_Report_2010.pdf\n\n\n----------------------------------------------------------------------\n\nTITLE:\nZabbix PHP Frontend \"formatQuery()\" Cross-Site Scripting\nVulnerability\n\nSECUNIA ADVISORY ID:\nSA40679\n\nVERIFY ADVISORY:\nSecunia.com\nhttp://secunia.com/advisories/40679/\nCustomer Area (Credentials Required)\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=40679\n\nRELEASE DATE:\n2010-07-28\n\nDISCUSS ADVISORY:\nhttp://secunia.com/advisories/40679/#comments\n\nAVAILABLE ON SITE AND IN CUSTOMER AREA:\n * Last Update\n * Popularity\n * Comments\n * Criticality Level\n * Impact\n * Where\n * Solution Status\n * Operating System / Software\n * CVE Reference(s)\n\nhttp://secunia.com/advisories/40679/\n\nONLY AVAILABLE IN CUSTOMER AREA:\n * Authentication Level\n * Report Reliability\n * Secunia PoC\n * Secunia Analysis\n * Systems Affected\n * Approve Distribution\n * Remediation Status\n * Secunia CVSS Score\n * CVSS\n\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=40679\n\nONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:\n * AUTOMATED SCANNING\n\nhttp://secunia.com/vulnerability_scanning/personal/\nhttp://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/\n\nDESCRIPTION:\nA vulnerability has been discovered in Zabbix, which can be exploited\nby malicious people to conduct cross-site scripting attacks. \n\nVarious input is not properly sanitised by the \"formatQuery()\"\nfunction of the \"Curl\" class in\nfrontends/php/include/classes/class.curl.php before being returned to\nthe user. \n\nSOLUTION:\nFixed in version 1.8.3-rc1. \n\nPROVIDED AND/OR DISCOVERED BY:\nReported as a normal bug by alixen. Later independently reported as\ncross-site scripting vulnerabilities in frontends/php/tr_status.php\nby Vupen. \n\nORIGINAL ADVISORY:\nZabbix:\nhttp://www.zabbix.com/forum/showthread.php?p=68770\nhttps://support.zabbix.com/browse/ZBX-2326\n\nOTHER REFERENCES:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nDEEP LINKS:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nEXTENDED DESCRIPTION:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nEXTENDED SOLUTION:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\nEXPLOIT:\nFurther details available in Customer Area:\nhttp://secunia.com/products/corporate/EVM/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\nprivate users keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2010-2790"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2010-001957"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2010-1470"
      },
      {
        "db": "BID",
        "id": "42017"
      },
      {
        "db": "PACKETSTORM",
        "id": "92257"
      }
    ],
    "trust": 2.52
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "BID",
        "id": "42017",
        "trust": 3.3
      },
      {
        "db": "SECUNIA",
        "id": "40679",
        "trust": 3.1
      },
      {
        "db": "NVD",
        "id": "CVE-2010-2790",
        "trust": 2.7
      },
      {
        "db": "VUPEN",
        "id": "ADV-2010-1908",
        "trust": 2.4
      },
      {
        "db": "XF",
        "id": "60772",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2010-001957",
        "trust": 0.8
      },
      {
        "db": "CNVD",
        "id": "CNVD-2010-1470",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201008-024",
        "trust": 0.6
      },
      {
        "db": "PACKETSTORM",
        "id": "92257",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2010-1470"
      },
      {
        "db": "BID",
        "id": "42017"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2010-001957"
      },
      {
        "db": "PACKETSTORM",
        "id": "92257"
      },
      {
        "db": "NVD",
        "id": "CVE-2010-2790"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201008-024"
      }
    ]
  },
  "id": "VAR-201008-0180",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2010-1470"
      }
    ],
    "trust": 0.06
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2010-1470"
      }
    ]
  },
  "last_update_date": "2023-12-18T13:40:15.850000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "rn1.8.3",
        "trust": 0.8,
        "url": "http://www.zabbix.com/rn1.8.3.php"
      },
      {
        "title": "Zabbix 1.8.3rc1 released",
        "trust": 0.8,
        "url": "http://www.zabbix.com/forum/showthread.php?p=68770"
      },
      {
        "title": "ZBX-2326",
        "trust": 0.8,
        "url": "https://support.zabbix.com/browse/zbx-2326"
      },
      {
        "title": "Patch for ZABBIX \u0027formatQuery()\u0027 cross-site scripting vulnerability",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchinfo/show/724"
      },
      {
        "title": "zabbix-1.8.3",
        "trust": 0.6,
        "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=39955"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2010-1470"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2010-001957"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201008-024"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-79",
        "trust": 1.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2010-001957"
      },
      {
        "db": "NVD",
        "id": "CVE-2010-2790"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.4,
        "url": "http://secunia.com/advisories/40679"
      },
      {
        "trust": 2.4,
        "url": "http://www.securityfocus.com/bid/42017"
      },
      {
        "trust": 2.4,
        "url": "http://www.vupen.com/english/advisories/2010/1908"
      },
      {
        "trust": 2.0,
        "url": "https://support.zabbix.com/browse/zbx-2326"
      },
      {
        "trust": 1.7,
        "url": "http://www.zabbix.com/forum/showthread.php?p=68770"
      },
      {
        "trust": 1.6,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/60772"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2790"
      },
      {
        "trust": 0.8,
        "url": "http://xforce.iss.net/xforce/xfdb/60772"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2010-2790"
      },
      {
        "trust": 0.7,
        "url": "http://secunia.com/advisories/40679/"
      },
      {
        "trust": 0.3,
        "url": "http://www.zabbix.org"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/products/corporate/evm/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/secunia_security_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/40679/#comments"
      },
      {
        "trust": 0.1,
        "url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=40679"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/vulnerability_scanning/personal/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/gfx/pdf/secunia_half_year_report_2010.pdf"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/about_secunia_advisories/"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2010-1470"
      },
      {
        "db": "BID",
        "id": "42017"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2010-001957"
      },
      {
        "db": "PACKETSTORM",
        "id": "92257"
      },
      {
        "db": "NVD",
        "id": "CVE-2010-2790"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201008-024"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2010-1470"
      },
      {
        "db": "BID",
        "id": "42017"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2010-001957"
      },
      {
        "db": "PACKETSTORM",
        "id": "92257"
      },
      {
        "db": "NVD",
        "id": "CVE-2010-2790"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201008-024"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2010-07-28T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2010-1470"
      },
      {
        "date": "2010-07-28T00:00:00",
        "db": "BID",
        "id": "42017"
      },
      {
        "date": "2010-09-07T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2010-001957"
      },
      {
        "date": "2010-07-28T14:42:01",
        "db": "PACKETSTORM",
        "id": "92257"
      },
      {
        "date": "2010-08-05T13:23:09.680000",
        "db": "NVD",
        "id": "CVE-2010-2790"
      },
      {
        "date": "2010-07-28T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201008-024"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2010-07-28T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2010-1470"
      },
      {
        "date": "2015-04-13T21:48:00",
        "db": "BID",
        "id": "42017"
      },
      {
        "date": "2010-09-07T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2010-001957"
      },
      {
        "date": "2023-11-07T02:05:43.647000",
        "db": "NVD",
        "id": "CVE-2010-2790"
      },
      {
        "date": "2023-04-26T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201008-024"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201008-024"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Zabbix of  formatQuery Function vulnerable to cross-site scripting",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2010-001957"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "xss",
    "sources": [
      {
        "db": "PACKETSTORM",
        "id": "92257"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201008-024"
      }
    ],
    "trust": 0.7
  }
}

var-201112-0115
Vulnerability from variot

Cross-site scripting (XSS) vulnerability in ZABBIX before 1.8.10 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors related to the profiler. Zabbix is a CS network distributed network monitoring system. The gname variable is not properly filtered when creating users and host groups. The following URL can cause persistent XSS attacks: URL: hostgroups.php usergrps.php Affected Parameters: gname Method: POST Injection: \" Persists in: http://test/zabbix/hostgroups.php http://test/zabbix/users.php http://test/zabbix/hosts.php?form=update. ZABBIX is prone to multiple HTML-injection vulnerabilities because it fails to properly sanitize user-supplied input before using it in dynamically generated content. Successful exploits will allow attacker-supplied HTML and script code to run in the context of the affected browser, potentially allowing the attacker to steal cookie-based authentication credentials, or control how the site is rendered to the user. Other attacks are also possible. ZABBIX 1.8.5 is vulnerable; other versions may also be affected. ----------------------------------------------------------------------

Secunia is hiring!

Find your next job here:

http://secunia.com/company/jobs/


TITLE: Zabbix Two Script Insertion Vulnerabilities

SECUNIA ADVISORY ID: SA47216

VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/47216/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=47216

RELEASE DATE: 2011-12-16

DISCUSS ADVISORY: http://secunia.com/advisories/47216/#comments

AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s)

http://secunia.com/advisories/47216/

ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS

https://ca.secunia.com/?page=viewadvisory&vuln_id=47216

ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING

http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

DESCRIPTION: Multiple vulnerabilities have been reported in Zabbix, which can be exploited by malicious users to conduct script insertion attacks.

Successful exploitation of this vulnerability requires access rights to modify "host group" names.

2) Certain unspecified input to the profiler is not properly sanitised before being used.

The vulnerabilities are reported in version 1.8.5.

SOLUTION: Fixed in version 1.8.10rc.

PROVIDED AND/OR DISCOVERED BY: 1) Martina Matari within a Zabbix bug report. 2) Reported by the vendor.

ORIGINAL ADVISORY: Zabbix: http://www.zabbix.com/rn1.8.10rc1.php https://support.zabbix.com/browse/ZBX-4015

OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/

DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/

EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/

EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/

EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/


About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/advisories/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.


Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org


Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201112-0115",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "zabbix",
        "version": "1.8.5"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "zabbix",
        "version": "1.1"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "zabbix",
        "version": "1.4.3"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.4.5"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.3.4"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.4.4"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.5.2"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.6.4"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.8.9"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.1.3"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.1.5"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.3"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.3.1"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.6"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.8.1"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.8.4"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.6.2"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.5.4"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.1.7"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.7.2"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.1.1"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.6.6"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.7"
      },
      {
        "model": "zabbix",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.8.10"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.3.2"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.3.7"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.8.2"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.8.7"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.1.6"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.4.2"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.8.3"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.5.1"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.4.1"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.4.6"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.8"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.8.10"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.6.7"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.8.8"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.3.5"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.6.8"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.7.1"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.1.2"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.5"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.3.3"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.3.8"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.5.3"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.6.3"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.3.6"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.1.4"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.6.5"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.7.4"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.6.9"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.6.1"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.8.6"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.4"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.7.3"
      },
      {
        "model": "zabbix",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "zabbix",
        "version": "1.8.10"
      },
      {
        "model": "1.8.10rc",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "zabbix",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2011-5355"
      },
      {
        "db": "BID",
        "id": "51093"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-003584"
      },
      {
        "db": "NVD",
        "id": "CVE-2011-5027"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201112-481"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:*:rc2:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "1.8.10",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.8.8:rc2:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.8.8:rc1:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.8.5:rc1:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.8.4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.8.4:rc4:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.8.3:rc2:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.8.3:rc1:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.7.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.7:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.6.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.6.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.6.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.4.6:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.4.5:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.3.7:beta:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.3.6:beta:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.1.6:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.1.5:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.1:beta11:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.1:beta10:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.1:beta3:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.1:beta2:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.8.9:rc2:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.8.9:rc1:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.8.6:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.8.6:rc2:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.8.4:rc1:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.8.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.8:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.7.4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.6.7:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.6.6:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.5.3:beta:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.5.2:beta:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.4.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.4.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.3.3:beta:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.3.2:beta:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.1.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.1.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.1:beta7:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.1:beta6:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.8.8:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.8.8:rc3:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.8.6:rc1:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.8.5:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.8.3:rc4:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.8.3:rc3:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.7.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.7.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.6.5:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.6.4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.5.1:beta:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.5:beta:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.3.8:beta:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.3.1:beta:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.3:beta:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.1.7:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.1:beta12:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.1:beta5:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.1:beta4:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.8.10:rc1:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.8.9:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.8.7:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.8.7:rc1:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.8.4:rc3:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.8.4:rc2:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.8.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.8.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.6.9:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.6.8:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.6:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.5.4:beta:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.4.4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.4.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.3.5:beta:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.3.4:beta:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.1.4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.1.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.1:beta9:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.1:beta8:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2011-5027"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Martina Matari and Zabbix",
    "sources": [
      {
        "db": "BID",
        "id": "51093"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201112-354"
      }
    ],
    "trust": 0.9
  },
  "cve": "CVE-2011-5027",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 8.6,
            "impactScore": 2.9,
            "integrityImpact": "PARTIAL",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "MEDIUM",
            "trust": 1.0,
            "userInteractionRequired": true,
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Medium",
            "accessVector": "Network",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "None",
            "baseScore": 4.3,
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "CVE-2011-5027",
            "impactScore": null,
            "integrityImpact": "Partial",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2011-5027",
            "trust": 1.8,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201112-481",
            "trust": 0.6,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-003584"
      },
      {
        "db": "NVD",
        "id": "CVE-2011-5027"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201112-481"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Cross-site scripting (XSS) vulnerability in ZABBIX before 1.8.10 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors related to the profiler. Zabbix is a CS network distributed network monitoring system. The gname variable is not properly filtered when creating users and host groups. The following URL can cause persistent XSS attacks: URL: hostgroups.php usergrps.php Affected Parameters: gname Method: POST Injection: \\\"\u003c/options\u003e\u003cscript\u003ealert( \u0027XSS\u0027)\u003c/script\u003e Persists in: http://test/zabbix/hostgroups.php http://test/zabbix/users.php http://test/zabbix/hosts.php?form=update. ZABBIX is prone to multiple HTML-injection vulnerabilities because it fails to properly sanitize user-supplied input before using it in dynamically generated content. \nSuccessful exploits will allow attacker-supplied HTML and script code to run in the context of the affected browser, potentially allowing the attacker to steal cookie-based authentication credentials, or control how the site is rendered to the user. Other attacks are also possible. \nZABBIX 1.8.5 is vulnerable; other versions may also be affected. ----------------------------------------------------------------------\n\nSecunia is hiring!\n\nFind your next job here:\n\nhttp://secunia.com/company/jobs/\n\n----------------------------------------------------------------------\n\nTITLE:\nZabbix Two Script Insertion Vulnerabilities\n\nSECUNIA ADVISORY ID:\nSA47216\n\nVERIFY ADVISORY:\nSecunia.com\nhttp://secunia.com/advisories/47216/\nCustomer Area (Credentials Required)\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=47216\n\nRELEASE DATE:\n2011-12-16\n\nDISCUSS ADVISORY:\nhttp://secunia.com/advisories/47216/#comments\n\nAVAILABLE ON SITE AND IN CUSTOMER AREA:\n * Last Update\n * Popularity\n * Comments\n * Criticality Level\n * Impact\n * Where\n * Solution Status\n * Operating System / Software\n * CVE Reference(s)\n\nhttp://secunia.com/advisories/47216/\n\nONLY AVAILABLE IN CUSTOMER AREA:\n * Authentication Level\n * Report Reliability\n * Secunia PoC\n * Secunia Analysis\n * Systems Affected\n * Approve Distribution\n * Remediation Status\n * Secunia CVSS Score\n * CVSS\n\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=47216\n\nONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:\n * AUTOMATED SCANNING\n\nhttp://secunia.com/vulnerability_scanning/personal/\nhttp://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/\n\nDESCRIPTION:\nMultiple vulnerabilities have been reported in Zabbix, which can be\nexploited by malicious users to conduct script insertion attacks. \n\nSuccessful exploitation of this vulnerability requires access rights\nto modify \"host group\" names. \n\n2) Certain unspecified input to the profiler is not properly\nsanitised before being used. \n\nThe vulnerabilities are reported in version 1.8.5. \n\nSOLUTION:\nFixed in version 1.8.10rc. \n\nPROVIDED AND/OR DISCOVERED BY:\n1) Martina Matari within a Zabbix bug report. \n2) Reported by the vendor. \n\nORIGINAL ADVISORY:\nZabbix:\nhttp://www.zabbix.com/rn1.8.10rc1.php\nhttps://support.zabbix.com/browse/ZBX-4015\n\nOTHER REFERENCES:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nDEEP LINKS:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXTENDED DESCRIPTION:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXTENDED SOLUTION:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXPLOIT:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\nprivate users keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2011-5027"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-003584"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2011-5355"
      },
      {
        "db": "BID",
        "id": "51093"
      },
      {
        "db": "PACKETSTORM",
        "id": "107954"
      }
    ],
    "trust": 2.52
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2011-5027",
        "trust": 2.7
      },
      {
        "db": "BID",
        "id": "51093",
        "trust": 2.5
      },
      {
        "db": "SECUNIA",
        "id": "47216",
        "trust": 1.7
      },
      {
        "db": "OSVDB",
        "id": "77772",
        "trust": 1.6
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-003584",
        "trust": 0.8
      },
      {
        "db": "CNVD",
        "id": "CNVD-2011-5355",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201112-354",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201112-481",
        "trust": 0.6
      },
      {
        "db": "PACKETSTORM",
        "id": "107954",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2011-5355"
      },
      {
        "db": "BID",
        "id": "51093"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-003584"
      },
      {
        "db": "PACKETSTORM",
        "id": "107954"
      },
      {
        "db": "NVD",
        "id": "CVE-2011-5027"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201112-354"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201112-481"
      }
    ]
  },
  "id": "VAR-201112-0115",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2011-5355"
      }
    ],
    "trust": 0.06
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2011-5355"
      }
    ]
  },
  "last_update_date": "2023-12-18T12:45:50.118000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "ZBX-4015",
        "trust": 0.8,
        "url": "https://support.zabbix.com/browse/zbx-4015"
      },
      {
        "title": "ZABBIX has multiple patches for HTML injection vulnerabilities",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchinfo/show/6377"
      },
      {
        "title": "zabbix-1.8.10",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=42237"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2011-5355"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-003584"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201112-481"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-79",
        "trust": 1.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-003584"
      },
      {
        "db": "NVD",
        "id": "CVE-2011-5027"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.6,
        "url": "https://support.zabbix.com/browse/zbx-4015"
      },
      {
        "trust": 1.6,
        "url": "http://osvdb.org/77772"
      },
      {
        "trust": 1.6,
        "url": "http://secunia.com/advisories/47216"
      },
      {
        "trust": 1.6,
        "url": "http://www.securityfocus.com/bid/51093"
      },
      {
        "trust": 1.6,
        "url": "http://www.zabbix.com/rn1.8.10.php"
      },
      {
        "trust": 1.0,
        "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-january/071660.html"
      },
      {
        "trust": 1.0,
        "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-january/071687.html"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-5027"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-5027"
      },
      {
        "trust": 0.4,
        "url": "http://www.zabbix.com/rn1.8.10rc1.php"
      },
      {
        "trust": 0.3,
        "url": "http://www.zabbix.org"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/47216/#comments"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/company/jobs/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/vulnerability_intelligence/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/secunia_security_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/about_secunia_advisories/"
      },
      {
        "trust": 0.1,
        "url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=47216"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/vulnerability_scanning/personal/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/47216/"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2011-5355"
      },
      {
        "db": "BID",
        "id": "51093"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-003584"
      },
      {
        "db": "PACKETSTORM",
        "id": "107954"
      },
      {
        "db": "NVD",
        "id": "CVE-2011-5027"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201112-354"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201112-481"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2011-5355"
      },
      {
        "db": "BID",
        "id": "51093"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-003584"
      },
      {
        "db": "PACKETSTORM",
        "id": "107954"
      },
      {
        "db": "NVD",
        "id": "CVE-2011-5027"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201112-354"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201112-481"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2011-12-21T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2011-5355"
      },
      {
        "date": "2011-12-16T00:00:00",
        "db": "BID",
        "id": "51093"
      },
      {
        "date": "2012-01-05T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2011-003584"
      },
      {
        "date": "2011-12-16T04:27:38",
        "db": "PACKETSTORM",
        "id": "107954"
      },
      {
        "date": "2011-12-29T22:55:01.203000",
        "db": "NVD",
        "id": "CVE-2011-5027"
      },
      {
        "date": "1900-01-01T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201112-354"
      },
      {
        "date": "2011-12-30T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201112-481"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2011-12-21T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2011-5355"
      },
      {
        "date": "2015-04-16T17:49:00",
        "db": "BID",
        "id": "51093"
      },
      {
        "date": "2012-01-05T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2011-003584"
      },
      {
        "date": "2012-02-01T04:12:35.460000",
        "db": "NVD",
        "id": "CVE-2011-5027"
      },
      {
        "date": "2011-12-20T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201112-354"
      },
      {
        "date": "2011-12-30T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201112-481"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201112-354"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201112-481"
      }
    ],
    "trust": 1.2
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Zabbix Vulnerable to cross-site scripting",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-003584"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "XSS",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201112-481"
      }
    ],
    "trust": 0.6
  }
}

var-201112-0343
Vulnerability from variot

Multiple cross-site scripting (XSS) vulnerabilities in Zabbix before 1.8.10 allow remote attackers to inject arbitrary web script or HTML via the gname parameter (aka host groups name) to (1) hostgroups.php and (2) usergrps.php, the update action to (3) hosts.php and (4) scripts.php, and (5) maintenance.php. Zabbix is a CS network distributed network monitoring system. The gname variable is not properly filtered when creating users and host groups. The following URL can cause persistent XSS attacks: URL: hostgroups.php usergrps.php Affected Parameters: gname Method: POST Injection: \" Persists in: http://test/zabbix/hostgroups.php http://test/zabbix/users.php http://test/zabbix/hosts.php?form=update. ZABBIX is prone to multiple HTML-injection vulnerabilities because it fails to properly sanitize user-supplied input before using it in dynamically generated content. Successful exploits will allow attacker-supplied HTML and script code to run in the context of the affected browser, potentially allowing the attacker to steal cookie-based authentication credentials, or control how the site is rendered to the user. Other attacks are also possible. ZABBIX 1.8.5 is vulnerable; other versions may also be affected. ----------------------------------------------------------------------

Secunia is hiring!

Find your next job here:

http://secunia.com/company/jobs/


TITLE: Zabbix Two Script Insertion Vulnerabilities

SECUNIA ADVISORY ID: SA47216

VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/47216/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=47216

RELEASE DATE: 2011-12-16

DISCUSS ADVISORY: http://secunia.com/advisories/47216/#comments

AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s)

http://secunia.com/advisories/47216/

ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS

https://ca.secunia.com/?page=viewadvisory&vuln_id=47216

ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING

http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

DESCRIPTION: Multiple vulnerabilities have been reported in Zabbix, which can be exploited by malicious users to conduct script insertion attacks.

Successful exploitation of this vulnerability requires access rights to modify "host group" names.

2) Certain unspecified input to the profiler is not properly sanitised before being used.

The vulnerabilities are reported in version 1.8.5.

SOLUTION: Fixed in version 1.8.10rc.

PROVIDED AND/OR DISCOVERED BY: 1) Martina Matari within a Zabbix bug report. 2) Reported by the vendor.

ORIGINAL ADVISORY: Zabbix: http://www.zabbix.com/rn1.8.10rc1.php https://support.zabbix.com/browse/ZBX-4015

OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/

DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/

EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/

EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/

EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/


About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/advisories/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.


Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org


Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201112-0343",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "zabbix",
        "version": "1.8.5"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "zabbix",
        "version": "1.4.5"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "zabbix",
        "version": "1.4.4"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "zabbix",
        "version": "1.6.6"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "zabbix",
        "version": "1.4.2"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "zabbix",
        "version": "1.5.1"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "zabbix",
        "version": "1.4.1"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "zabbix",
        "version": "1.4.6"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "zabbix",
        "version": "1.6.7"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "zabbix",
        "version": "1.6.8"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "zabbix",
        "version": "1.4.3"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.3.4"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.5.2"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.6.4"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.8.9"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.1.3"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.1.5"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.3"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.3.1"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.6"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.8.1"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.8.4"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.6.2"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.5.4"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.1"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.1.7"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.7.2"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.1.1"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.7"
      },
      {
        "model": "zabbix",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.8.10"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.3.2"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.3.7"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.8.2"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.8.7"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.1.6"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.8.3"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.8"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.8.10"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.8.8"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.3.5"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.7.1"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.1.2"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.5"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.3.3"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.3.8"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.5.3"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.6.3"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.3.6"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.1.4"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.6.5"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.7.4"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.6.9"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.6.1"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.8.6"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.4"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.7.3"
      },
      {
        "model": "zabbix",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "zabbix",
        "version": "1.8.10"
      },
      {
        "model": "1.8.10rc",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "zabbix",
        "version": null
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "zabbix",
        "version": "*"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "zabbix",
        "version": "1.8.5"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "db4d000a-1f7a-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2011-5355"
      },
      {
        "db": "BID",
        "id": "51093"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-003583"
      },
      {
        "db": "NVD",
        "id": "CVE-2011-4615"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201112-480"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:*:rc2:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "1.8.10",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.8.10:rc1:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.8.7:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.8.7:rc1:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.8.4:rc4:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.8.4:rc3:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.8.3:rc1:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.8.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.6.9:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.6.8:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.6.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.6:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.4.5:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.4.4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.3.5:beta:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.3.4:beta:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.1.5:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.1.4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.1:beta10:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.1:beta9:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.8.9:rc1:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.8.8:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.8.6:rc1:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.8.5:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.8.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.8.3:rc4:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.7.4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.7.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.6.5:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.6.4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.5.2:beta:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.5.1:beta:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.4.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.3.8:beta:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.3.1:beta:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.3:beta:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.1.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.1:beta5:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.1:beta4:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.8.8:rc3:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.8.8:rc2:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.8.8:rc1:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.8.5:rc1:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.8.4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.8.3:rc3:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.8.3:rc2:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.7.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.7.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.7:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.6.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.6.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.5:beta:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.4.6:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.3.7:beta:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.3.6:beta:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.1.7:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.1.6:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.1:beta12:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.1:beta11:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.1:beta3:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.1:beta2:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.8.9:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.8.9:rc2:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.8.6:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.8.6:rc2:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.8.4:rc2:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.8.4:rc1:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.8.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.8:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.6.7:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.6.6:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.5.4:beta:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.5.3:beta:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.4.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.4.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.3.3:beta:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.3.2:beta:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.1.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.1.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.1:beta8:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.1:beta7:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.1:beta6:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2011-4615"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Martina Matari and Zabbix",
    "sources": [
      {
        "db": "BID",
        "id": "51093"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201112-354"
      }
    ],
    "trust": 0.9
  },
  "cve": "CVE-2011-4615",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 8.6,
            "impactScore": 2.9,
            "integrityImpact": "PARTIAL",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "MEDIUM",
            "trust": 1.0,
            "userInteractionRequired": true,
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Medium",
            "accessVector": "Network",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "None",
            "baseScore": 4.3,
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "CVE-2011-4615",
            "impactScore": null,
            "integrityImpact": "Partial",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "NONE",
            "baseScore": 4.3,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 8.6,
            "id": "db4d000a-1f7a-11e6-abef-000c29c66e3d",
            "impactScore": 2.9,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.2,
            "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
            "version": "2.9 [IVD]"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2011-4615",
            "trust": 1.8,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201112-480",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "IVD",
            "id": "db4d000a-1f7a-11e6-abef-000c29c66e3d",
            "trust": 0.2,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "db4d000a-1f7a-11e6-abef-000c29c66e3d"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-003583"
      },
      {
        "db": "NVD",
        "id": "CVE-2011-4615"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201112-480"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Multiple cross-site scripting (XSS) vulnerabilities in Zabbix before 1.8.10 allow remote attackers to inject arbitrary web script or HTML via the gname parameter (aka host groups name) to (1) hostgroups.php and (2) usergrps.php, the update action to (3) hosts.php and (4) scripts.php, and (5) maintenance.php. Zabbix is a CS network distributed network monitoring system. The gname variable is not properly filtered when creating users and host groups. The following URL can cause persistent XSS attacks: URL: hostgroups.php usergrps.php Affected Parameters: gname Method: POST Injection: \\\"\u003c/options\u003e\u003cscript\u003ealert( \u0027XSS\u0027)\u003c/script\u003e Persists in: http://test/zabbix/hostgroups.php http://test/zabbix/users.php http://test/zabbix/hosts.php?form=update. ZABBIX is prone to multiple HTML-injection vulnerabilities because it fails to properly sanitize user-supplied input before using it in dynamically generated content. \nSuccessful exploits will allow attacker-supplied HTML and script code to run in the context of the affected browser, potentially allowing the attacker to steal cookie-based authentication credentials, or control how the site is rendered to the user. Other attacks are also possible. \nZABBIX 1.8.5 is vulnerable; other versions may also be affected. ----------------------------------------------------------------------\n\nSecunia is hiring!\n\nFind your next job here:\n\nhttp://secunia.com/company/jobs/\n\n----------------------------------------------------------------------\n\nTITLE:\nZabbix Two Script Insertion Vulnerabilities\n\nSECUNIA ADVISORY ID:\nSA47216\n\nVERIFY ADVISORY:\nSecunia.com\nhttp://secunia.com/advisories/47216/\nCustomer Area (Credentials Required)\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=47216\n\nRELEASE DATE:\n2011-12-16\n\nDISCUSS ADVISORY:\nhttp://secunia.com/advisories/47216/#comments\n\nAVAILABLE ON SITE AND IN CUSTOMER AREA:\n * Last Update\n * Popularity\n * Comments\n * Criticality Level\n * Impact\n * Where\n * Solution Status\n * Operating System / Software\n * CVE Reference(s)\n\nhttp://secunia.com/advisories/47216/\n\nONLY AVAILABLE IN CUSTOMER AREA:\n * Authentication Level\n * Report Reliability\n * Secunia PoC\n * Secunia Analysis\n * Systems Affected\n * Approve Distribution\n * Remediation Status\n * Secunia CVSS Score\n * CVSS\n\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=47216\n\nONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:\n * AUTOMATED SCANNING\n\nhttp://secunia.com/vulnerability_scanning/personal/\nhttp://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/\n\nDESCRIPTION:\nMultiple vulnerabilities have been reported in Zabbix, which can be\nexploited by malicious users to conduct script insertion attacks. \n\nSuccessful exploitation of this vulnerability requires access rights\nto modify \"host group\" names. \n\n2) Certain unspecified input to the profiler is not properly\nsanitised before being used. \n\nThe vulnerabilities are reported in version 1.8.5. \n\nSOLUTION:\nFixed in version 1.8.10rc. \n\nPROVIDED AND/OR DISCOVERED BY:\n1) Martina Matari within a Zabbix bug report. \n2) Reported by the vendor. \n\nORIGINAL ADVISORY:\nZabbix:\nhttp://www.zabbix.com/rn1.8.10rc1.php\nhttps://support.zabbix.com/browse/ZBX-4015\n\nOTHER REFERENCES:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nDEEP LINKS:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXTENDED DESCRIPTION:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXTENDED SOLUTION:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXPLOIT:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\nprivate users keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2011-4615"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-003583"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2011-5355"
      },
      {
        "db": "BID",
        "id": "51093"
      },
      {
        "db": "IVD",
        "id": "db4d000a-1f7a-11e6-abef-000c29c66e3d"
      },
      {
        "db": "PACKETSTORM",
        "id": "107954"
      }
    ],
    "trust": 2.7
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2011-4615",
        "trust": 2.9
      },
      {
        "db": "BID",
        "id": "51093",
        "trust": 2.5
      },
      {
        "db": "SECUNIA",
        "id": "47216",
        "trust": 1.7
      },
      {
        "db": "OSVDB",
        "id": "77771",
        "trust": 1.6
      },
      {
        "db": "CNVD",
        "id": "CNVD-2011-5355",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201112-480",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-003583",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201112-354",
        "trust": 0.6
      },
      {
        "db": "XF",
        "id": "71855",
        "trust": 0.6
      },
      {
        "db": "IVD",
        "id": "DB4D000A-1F7A-11E6-ABEF-000C29C66E3D",
        "trust": 0.2
      },
      {
        "db": "PACKETSTORM",
        "id": "107954",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "db4d000a-1f7a-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2011-5355"
      },
      {
        "db": "BID",
        "id": "51093"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-003583"
      },
      {
        "db": "PACKETSTORM",
        "id": "107954"
      },
      {
        "db": "NVD",
        "id": "CVE-2011-4615"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201112-354"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201112-480"
      }
    ]
  },
  "id": "VAR-201112-0343",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "db4d000a-1f7a-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2011-5355"
      }
    ],
    "trust": 0.08
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "db4d000a-1f7a-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2011-5355"
      }
    ]
  },
  "last_update_date": "2023-12-18T12:45:50.077000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "ZBX-4015",
        "trust": 0.8,
        "url": "https://support.zabbix.com/browse/zbx-4015"
      },
      {
        "title": "ZABBIX has multiple patches for HTML injection vulnerabilities",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchinfo/show/6377"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2011-5355"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-003583"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-79",
        "trust": 1.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-003583"
      },
      {
        "db": "NVD",
        "id": "CVE-2011-4615"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.6,
        "url": "https://support.zabbix.com/browse/zbx-4015"
      },
      {
        "trust": 1.6,
        "url": "http://osvdb.org/77771"
      },
      {
        "trust": 1.6,
        "url": "http://secunia.com/advisories/47216"
      },
      {
        "trust": 1.6,
        "url": "http://www.securityfocus.com/bid/51093"
      },
      {
        "trust": 1.6,
        "url": "http://www.zabbix.com/rn1.8.10.php"
      },
      {
        "trust": 1.0,
        "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-january/071660.html"
      },
      {
        "trust": 1.0,
        "url": "http://lists.fedoraproject.org/pipermail/package-announce/2012-january/071687.html"
      },
      {
        "trust": 1.0,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/71855"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-4615"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-4615"
      },
      {
        "trust": 0.6,
        "url": "http://xforce.iss.net/xforce/xfdb/71855"
      },
      {
        "trust": 0.4,
        "url": "http://www.zabbix.com/rn1.8.10rc1.php"
      },
      {
        "trust": 0.3,
        "url": "http://www.zabbix.org"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/47216/#comments"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/company/jobs/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/vulnerability_intelligence/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/secunia_security_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/about_secunia_advisories/"
      },
      {
        "trust": 0.1,
        "url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=47216"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/vulnerability_scanning/personal/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/47216/"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2011-5355"
      },
      {
        "db": "BID",
        "id": "51093"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-003583"
      },
      {
        "db": "PACKETSTORM",
        "id": "107954"
      },
      {
        "db": "NVD",
        "id": "CVE-2011-4615"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201112-354"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201112-480"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "IVD",
        "id": "db4d000a-1f7a-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2011-5355"
      },
      {
        "db": "BID",
        "id": "51093"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-003583"
      },
      {
        "db": "PACKETSTORM",
        "id": "107954"
      },
      {
        "db": "NVD",
        "id": "CVE-2011-4615"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201112-354"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201112-480"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2011-12-21T00:00:00",
        "db": "IVD",
        "id": "db4d000a-1f7a-11e6-abef-000c29c66e3d"
      },
      {
        "date": "2011-12-21T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2011-5355"
      },
      {
        "date": "2011-12-16T00:00:00",
        "db": "BID",
        "id": "51093"
      },
      {
        "date": "2012-01-05T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2011-003583"
      },
      {
        "date": "2011-12-16T04:27:38",
        "db": "PACKETSTORM",
        "id": "107954"
      },
      {
        "date": "2011-12-29T22:55:01.140000",
        "db": "NVD",
        "id": "CVE-2011-4615"
      },
      {
        "date": "1900-01-01T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201112-354"
      },
      {
        "date": "2011-12-29T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201112-480"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2011-12-21T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2011-5355"
      },
      {
        "date": "2015-04-16T17:49:00",
        "db": "BID",
        "id": "51093"
      },
      {
        "date": "2012-01-05T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2011-003583"
      },
      {
        "date": "2017-08-29T01:30:31.723000",
        "db": "NVD",
        "id": "CVE-2011-4615"
      },
      {
        "date": "2011-12-20T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201112-354"
      },
      {
        "date": "2012-01-04T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201112-480"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201112-354"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201112-480"
      }
    ],
    "trust": 1.2
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Zabbix Multiple cross-site scripting vulnerabilities",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2011-003583"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "XSS",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201112-480"
      }
    ],
    "trust": 0.6
  }
}

var-201208-0374
Vulnerability from variot

SQL injection vulnerability in frontends/php/popup_bitem.php in Zabbix 1.8.15rc1 and earlier, and 2.x before 2.0.2rc1, allows remote attackers to execute arbitrary SQL commands via the itemid parameter. Zabbix is an enterprise-class open source solution that provides distributed system monitoring and network monitoring based on a web interface. ZABBIX is prone to an SQL-injection vulnerability. A successful exploit may allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. Versions prior to ZABBIX 2.0.2 are vulnerable. ----------------------------------------------------------------------

We are millions! Join us to protect all Pc's Worldwide. Download the new Secunia PSI 3.0 available in 5 languages and share it with your friends: http://secunia.com/psi


TITLE: Zabbix "itemid" SQL Injection Vulnerability

SECUNIA ADVISORY ID: SA49809

VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/49809/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=49809

RELEASE DATE: 2012-07-25

DISCUSS ADVISORY: http://secunia.com/advisories/49809/#comments

AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s)

http://secunia.com/advisories/49809/

ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS

https://ca.secunia.com/?page=viewadvisory&vuln_id=49809

ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING

http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

DESCRIPTION: A vulnerability has been reported in Zabbix, which can be exploited by malicious people to conduct SQL injection attacks. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.

The vulnerability is reported in version 2.0.1.

SOLUTION: Fixed in version 2.0.2rc2. Also fixed in the GIT repository.

PROVIDED AND/OR DISCOVERED BY: muts

ORIGINAL ADVISORY: Zabbix: https://support.zabbix.com/browse/ZBX-5348 http://git.zabbixzone.com/zabbix2.0/.git/commit/333a3a5542ba8a2c901c24b7bf5440f41f1f4f54

muts: http://www.exploit-db.com/exploits/20087/

OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/

DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/

EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/

EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/

EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/


About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/advisories/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.


Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org


. ----------------------------------------------------------------------

The final version of the CSI 6.0 has been released.

For more information: SA49809

SOLUTION: Apply updated packages via the apt-get package manager. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1


Debian Security Advisory DSA-2539-1 security@debian.org http://www.debian.org/security/ Raphael Geissert September 06, 2012 http://www.debian.org/security/faq


Package : zabbix Vulnerability : SQL injection Problem type : remote Debian-specific: no CVE ID : CVE-2012-3435 Debian Bug : 683273

It was discovered that Zabbix, a network monitoring solution, does not properly validate user input used as a part of an SQL query.

For the testing distribution (wheezy), this problem will be fixed soon.

We recommend that you upgrade your zabbix packages.

Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: http://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux)

iEYEARECAAYFAlBIX7AACgkQYy49rUbZzlrfKwCdGUAYYsmuSFcaKKjgaap5PmSg Yj4AoJ6SogKTB06ZEoEwxkCAhGv7XIvO =lWI6 -----END PGP SIGNATURE----- . - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201311-15


                                        http://security.gentoo.org/

Severity: Normal Title: Zabbix: Multiple vulnerabilities Date: November 25, 2013 Bugs: #312875, #394497, #428372, #452878, #486696 ID: 201311-15


Synopsis

Multiple vulnerabilities have been found in Zabbix, possibly leading to SQL injection attacks, Denial of Service, or information disclosure.

Background

Zabbix is software for monitoring applications, networks, and servers.

Affected packages

-------------------------------------------------------------------
 Package              /     Vulnerable     /            Unaffected
-------------------------------------------------------------------

1 net-analyzer/zabbix < 2.0.9_rc1-r2 >= 2.0.9_rc1-r2

Description

Multiple vulnerabilities have been discovered in Zabbix. Please review the CVE identifiers referenced below for details.

Impact

A remote attacker may be able to execute arbitrary SQL statements, cause a Denial of Service condition, or obtain sensitive information.

Workaround

There is no known workaround at this time.

Resolution

All Zabbix users should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot -v ">=net-analyzer/zabbix-2.0.9_rc1-r2"

References

[ 1 ] CVE-2010-1277 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1277 [ 2 ] CVE-2011-2904 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2904 [ 3 ] CVE-2011-3263 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3263 [ 4 ] CVE-2011-4674 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4674 [ 5 ] CVE-2012-3435 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3435 [ 6 ] CVE-2013-1364 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1364 [ 7 ] CVE-2013-5572 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5572

Availability

This GLSA and any updates to it are available for viewing at the Gentoo Security Website:

http://security.gentoo.org/glsa/glsa-201311-15.xml

Concerns?

Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.

License

Copyright 2013 Gentoo Foundation, Inc; referenced text belongs to its owner(s).

The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.5

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201208-0374",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": null,
        "scope": "eq",
        "trust": 2.4,
        "vendor": "zabbix",
        "version": "1.1"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "zabbix",
        "version": "1.1"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "zabbix",
        "version": "1.7.2"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "zabbix",
        "version": "1.6.7"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "zabbix",
        "version": "1.6.8"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "zabbix",
        "version": "1.7.4"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "zabbix",
        "version": "1.7.3"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 1.4,
        "vendor": "zabbix",
        "version": "2.0.0"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "zabbix",
        "version": "2.0.1"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.4.5"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.3.4"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.4.4"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.5.2"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.6.4"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.1.3"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.1.5"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.3"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.3.1"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.6"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.8.1"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.6.2"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.5.4"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.1.7"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.1.1"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.6.6"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.7"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.3.2"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.3.7"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.8.2"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.1.6"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.4.2"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.8.3"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.5.1"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.4.6"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.8"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.3.5"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.7.1"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.1.2"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.5"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.3.3"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.3.8"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.5.3"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.6.3"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.3.6"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.4.3"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.1.4"
      },
      {
        "model": "zabbix",
        "scope": "lte",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.8.15"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.6.5"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.6.9"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "1.6.1"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "2.0.0"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "zabbix",
        "version": "1.8.4"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "zabbix",
        "version": "1.8.6"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "zabbix",
        "version": "1.8.7"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "zabbix",
        "version": "1.8.9"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 0.9,
        "vendor": "zabbix",
        "version": "1.8.5"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "zabbix",
        "version": "2.0.2rc1"
      },
      {
        "model": "zabbix",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "zabbix",
        "version": "2.x"
      },
      {
        "model": "zabbix",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "zabbix",
        "version": "1.8.15rc1 and earlier"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.6,
        "vendor": "zabbix",
        "version": "1.8.3"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.6,
        "vendor": "zabbix",
        "version": "2.0.1"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "zabbix",
        "version": "2.0"
      },
      {
        "model": "fedora epel",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "6"
      },
      {
        "model": "linux",
        "scope": null,
        "trust": 0.3,
        "vendor": "gentoo",
        "version": null
      },
      {
        "model": "linux sparc",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "debian",
        "version": "6.0"
      },
      {
        "model": "linux s/390",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "debian",
        "version": "6.0"
      },
      {
        "model": "linux powerpc",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "debian",
        "version": "6.0"
      },
      {
        "model": "linux mips",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "debian",
        "version": "6.0"
      },
      {
        "model": "linux ia-64",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "debian",
        "version": "6.0"
      },
      {
        "model": "linux ia-32",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "debian",
        "version": "6.0"
      },
      {
        "model": "linux arm",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "debian",
        "version": "6.0"
      },
      {
        "model": "linux amd64",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "debian",
        "version": "6.0"
      },
      {
        "model": "zabbix",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "zabbix",
        "version": "2.0.2"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "zabbix",
        "version": "1.1.1"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "zabbix",
        "version": "1.1.2"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "zabbix",
        "version": "1.1.3"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "zabbix",
        "version": "1.1.4"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "zabbix",
        "version": "1.1.5"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "zabbix",
        "version": "1.1.6"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "zabbix",
        "version": "1.1.7"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "zabbix",
        "version": "1.3"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "zabbix",
        "version": "1.3.1"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "zabbix",
        "version": "1.3.2"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "zabbix",
        "version": "1.3.3"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "zabbix",
        "version": "1.3.4"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "zabbix",
        "version": "1.3.5"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "zabbix",
        "version": "1.3.6"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "zabbix",
        "version": "1.3.7"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "zabbix",
        "version": "1.3.8"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "zabbix",
        "version": "1.4.2"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "zabbix",
        "version": "1.4.3"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "zabbix",
        "version": "1.4.4"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "zabbix",
        "version": "1.4.5"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "zabbix",
        "version": "1.4.6"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "zabbix",
        "version": "1.5"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "zabbix",
        "version": "1.5.1"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "zabbix",
        "version": "1.5.2"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "zabbix",
        "version": "1.5.3"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "zabbix",
        "version": "1.5.4"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "zabbix",
        "version": "1.6"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "zabbix",
        "version": "1.6.1"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "zabbix",
        "version": "1.6.2"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "zabbix",
        "version": "1.6.3"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "zabbix",
        "version": "1.6.4"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "zabbix",
        "version": "1.6.5"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "zabbix",
        "version": "1.6.6"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "zabbix",
        "version": "1.6.7"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "zabbix",
        "version": "1.6.8"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "zabbix",
        "version": "1.6.9"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "zabbix",
        "version": "1.7"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "zabbix",
        "version": "1.7.1"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "zabbix",
        "version": "1.7.2"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "zabbix",
        "version": "1.7.3"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "zabbix",
        "version": "1.7.4"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "zabbix",
        "version": "1.8"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "zabbix",
        "version": "1.8.1"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "zabbix",
        "version": "1.8.2"
      },
      {
        "model": null,
        "scope": "eq",
        "trust": 0.2,
        "vendor": "zabbix",
        "version": "*"
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "d67c7e64-1f5e-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-3918"
      },
      {
        "db": "BID",
        "id": "54661"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-003708"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-3435"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201207-600"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:*:rc1:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndIncluding": "1.8.15",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.7.4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.1:beta10:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.1.6:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.1.7:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.1:beta2:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.4.6:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.8.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.1.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.8.3:rc2:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.4.5:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.5.2:beta:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.5.1:beta:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.7.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.1:beta7:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.6.8:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.1:beta11:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.3:beta:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.3.1:beta:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.1:beta4:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.1:beta3:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.1.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.8:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.8.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.8.3:rc1:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.3.8:beta:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.5:beta:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.6.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.6.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:2.0.0:rc1:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:2.0.0:rc2:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:2.0.1:rc2:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:2.0.1:rc1:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.7.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.1:beta8:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.6.7:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.1:beta12:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.6.6:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.3.2:beta:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.3.3:beta:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.7:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.1:beta6:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.1.4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.4.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.3.7:beta:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.8.3:rc3:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.6.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.6:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:2.0.0:rc3:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:2.0.0:rc4:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.6.5:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.6.4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:2.0.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:2.0.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.7.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.1:beta9:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.1.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.3.4:beta:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.3.5:beta:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.4.4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.1:beta5:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.4.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.1.5:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.3.6:beta:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.5.3:beta:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.5.4:beta:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:1.6.9:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:2.0.0:rc5:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:2.0.0:rc6:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2012-3435"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "muts",
    "sources": [
      {
        "db": "BID",
        "id": "54661"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201207-600"
      }
    ],
    "trust": 0.9
  },
  "cve": "CVE-2012-3435",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "obtainAllPrivilege": false,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "HIGH",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Network",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "Partial",
            "baseScore": 7.5,
            "confidentialityImpact": "Partial",
            "exploitabilityScore": null,
            "id": "CVE-2012-3435",
            "impactScore": null,
            "integrityImpact": "Partial",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "High",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "IVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "d67c7e64-1f5e-11e6-abef-000c29c66e3d",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.2,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.9 [IVD]"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2012-3435",
            "trust": 1.8,
            "value": "HIGH"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201207-600",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "IVD",
            "id": "d67c7e64-1f5e-11e6-abef-000c29c66e3d",
            "trust": 0.2,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "d67c7e64-1f5e-11e6-abef-000c29c66e3d"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-003708"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-3435"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201207-600"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "SQL injection vulnerability in frontends/php/popup_bitem.php in Zabbix 1.8.15rc1 and earlier, and 2.x before 2.0.2rc1, allows remote attackers to execute arbitrary SQL commands via the itemid parameter. Zabbix is an enterprise-class open source solution that provides distributed system monitoring and network monitoring based on a web interface. ZABBIX is prone to an SQL-injection vulnerability. \nA successful exploit may allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. \nVersions prior to ZABBIX 2.0.2 are vulnerable. ----------------------------------------------------------------------\n\nWe are millions!  Join us to protect all Pc\u0027s Worldwide. \nDownload the new Secunia PSI 3.0 available in 5 languages and share it with your friends:\nhttp://secunia.com/psi\n\n----------------------------------------------------------------------\n\nTITLE:\nZabbix \"itemid\" SQL Injection Vulnerability\n\nSECUNIA ADVISORY ID:\nSA49809\n\nVERIFY ADVISORY:\nSecunia.com\nhttp://secunia.com/advisories/49809/\nCustomer Area (Credentials Required)\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=49809\n\nRELEASE DATE:\n2012-07-25\n\nDISCUSS ADVISORY:\nhttp://secunia.com/advisories/49809/#comments\n\nAVAILABLE ON SITE AND IN CUSTOMER AREA:\n * Last Update\n * Popularity\n * Comments\n * Criticality Level\n * Impact\n * Where\n * Solution Status\n * Operating System / Software\n * CVE Reference(s)\n\nhttp://secunia.com/advisories/49809/\n\nONLY AVAILABLE IN CUSTOMER AREA:\n * Authentication Level\n * Report Reliability\n * Secunia PoC\n * Secunia Analysis\n * Systems Affected\n * Approve Distribution\n * Remediation Status\n * Secunia CVSS Score\n * CVSS\n\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=49809\n\nONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:\n * AUTOMATED SCANNING\n\nhttp://secunia.com/vulnerability_scanning/personal/\nhttp://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/\n\nDESCRIPTION:\nA vulnerability has been reported in Zabbix, which can be exploited\nby malicious people to conduct SQL injection attacks. This can be\nexploited to manipulate SQL queries by injecting arbitrary SQL code. \n\nThe vulnerability is reported in version 2.0.1. \n\nSOLUTION:\nFixed in version 2.0.2rc2. Also fixed in the GIT repository. \n\nPROVIDED AND/OR DISCOVERED BY:\nmuts\n\nORIGINAL ADVISORY:\nZabbix:\nhttps://support.zabbix.com/browse/ZBX-5348\nhttp://git.zabbixzone.com/zabbix2.0/.git/commit/333a3a5542ba8a2c901c24b7bf5440f41f1f4f54\n\nmuts:\nhttp://www.exploit-db.com/exploits/20087/\n\nOTHER REFERENCES:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nDEEP LINKS:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXTENDED DESCRIPTION:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXTENDED SOLUTION:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXPLOIT:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\nprivate users keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n. ----------------------------------------------------------------------\n\nThe final version of the CSI 6.0 has been released. \n\nFor more information:\nSA49809\n\nSOLUTION:\nApply updated packages via the apt-get package manager. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n- -------------------------------------------------------------------------\nDebian Security Advisory DSA-2539-1                   security@debian.org\nhttp://www.debian.org/security/                          Raphael Geissert\nSeptember 06, 2012                     http://www.debian.org/security/faq\n- -------------------------------------------------------------------------\n\nPackage        : zabbix\nVulnerability  : SQL injection\nProblem type   : remote\nDebian-specific: no\nCVE ID         : CVE-2012-3435\nDebian Bug     : 683273\n\nIt was discovered that Zabbix, a network monitoring solution, does not\nproperly validate user input used as a part of an SQL query. \n\nFor the testing distribution (wheezy), this problem will be fixed soon. \n\nWe recommend that you upgrade your zabbix packages. \n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: http://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1.4.12 (GNU/Linux)\n\niEYEARECAAYFAlBIX7AACgkQYy49rUbZzlrfKwCdGUAYYsmuSFcaKKjgaap5PmSg\nYj4AoJ6SogKTB06ZEoEwxkCAhGv7XIvO\n=lWI6\n-----END PGP SIGNATURE-----\n. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory                           GLSA 201311-15\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n                                            http://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: Normal\n    Title: Zabbix: Multiple vulnerabilities\n     Date: November 25, 2013\n     Bugs: #312875, #394497, #428372, #452878, #486696\n       ID: 201311-15\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nMultiple vulnerabilities have been found in Zabbix, possibly leading to\nSQL injection attacks, Denial of Service, or information disclosure. \n\nBackground\n==========\n\nZabbix is software for monitoring applications, networks, and servers. \n\nAffected packages\n=================\n\n    -------------------------------------------------------------------\n     Package              /     Vulnerable     /            Unaffected\n    -------------------------------------------------------------------\n  1  net-analyzer/zabbix       \u003c 2.0.9_rc1-r2         \u003e= 2.0.9_rc1-r2\n\nDescription\n===========\n\nMultiple vulnerabilities have been discovered in Zabbix. Please review\nthe CVE identifiers referenced below for details. \n\nImpact\n======\n\nA remote attacker may be able to execute arbitrary SQL statements,\ncause a Denial of Service condition, or obtain sensitive information. \n\nWorkaround\n==========\n\nThere is no known workaround at this time. \n\nResolution\n==========\n\nAll Zabbix users should upgrade to the latest version:\n\n  # emerge --sync\n  # emerge --ask --oneshot -v \"\u003e=net-analyzer/zabbix-2.0.9_rc1-r2\"\n\nReferences\n==========\n\n[ 1 ] CVE-2010-1277\n      http://nvd.nist.gov/nvd.cfm?cvename=CVE-2010-1277\n[ 2 ] CVE-2011-2904\n      http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2904\n[ 3 ] CVE-2011-3263\n      http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3263\n[ 4 ] CVE-2011-4674\n      http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-4674\n[ 5 ] CVE-2012-3435\n      http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3435\n[ 6 ] CVE-2013-1364\n      http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1364\n[ 7 ] CVE-2013-5572\n      http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-5572\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n http://security.gentoo.org/glsa/glsa-201311-15.xml\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users\u0027 machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2013 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.5\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2012-3435"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-003708"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-3918"
      },
      {
        "db": "BID",
        "id": "54661"
      },
      {
        "db": "IVD",
        "id": "d67c7e64-1f5e-11e6-abef-000c29c66e3d"
      },
      {
        "db": "PACKETSTORM",
        "id": "114993"
      },
      {
        "db": "PACKETSTORM",
        "id": "116281"
      },
      {
        "db": "PACKETSTORM",
        "id": "116311"
      },
      {
        "db": "PACKETSTORM",
        "id": "124173"
      }
    ],
    "trust": 2.97
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2012-3435",
        "trust": 3.1
      },
      {
        "db": "BID",
        "id": "54661",
        "trust": 2.5
      },
      {
        "db": "SECUNIA",
        "id": "49809",
        "trust": 1.8
      },
      {
        "db": "EXPLOIT-DB",
        "id": "20087",
        "trust": 1.7
      },
      {
        "db": "OPENWALL",
        "id": "OSS-SECURITY/2012/07/27/6",
        "trust": 1.6
      },
      {
        "db": "OPENWALL",
        "id": "OSS-SECURITY/2012/07/28/3",
        "trust": 1.6
      },
      {
        "db": "OSVDB",
        "id": "84127",
        "trust": 1.6
      },
      {
        "db": "SECUNIA",
        "id": "50475",
        "trust": 1.1
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-3918",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201207-600",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-003708",
        "trust": 0.8
      },
      {
        "db": "XF",
        "id": "77195",
        "trust": 0.6
      },
      {
        "db": "MLIST",
        "id": "[OSS-SECURITY] 20120727 ZABBIX SQL INJECTION FLAW (CVE REQUEST)",
        "trust": 0.6
      },
      {
        "db": "MLIST",
        "id": "[OSS-SECURITY] 20120728 RE: ZABBIX SQL INJECTION FLAW (CVE REQUEST)",
        "trust": 0.6
      },
      {
        "db": "IVD",
        "id": "D67C7E64-1F5E-11E6-ABEF-000C29C66E3D",
        "trust": 0.2
      },
      {
        "db": "PACKETSTORM",
        "id": "114993",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "116281",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "116311",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "124173",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "d67c7e64-1f5e-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-3918"
      },
      {
        "db": "BID",
        "id": "54661"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-003708"
      },
      {
        "db": "PACKETSTORM",
        "id": "114993"
      },
      {
        "db": "PACKETSTORM",
        "id": "116281"
      },
      {
        "db": "PACKETSTORM",
        "id": "116311"
      },
      {
        "db": "PACKETSTORM",
        "id": "124173"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-3435"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201207-600"
      }
    ]
  },
  "id": "VAR-201208-0374",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "IVD",
        "id": "d67c7e64-1f5e-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-3918"
      }
    ],
    "trust": 0.08
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "IVD",
        "id": "d67c7e64-1f5e-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-3918"
      }
    ]
  },
  "last_update_date": "2023-12-18T12:11:18.495000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "DSA-2539",
        "trust": 0.8,
        "url": "http://www.debian.org/security/2012/dsa-2539"
      },
      {
        "title": "zabbix2.0/.git/commitdiff",
        "trust": 0.8,
        "url": "http://git.zabbixzone.com/zabbix2.0/.git/commitdiff/333a3a5542ba8a2c901c24b7bf5440f41f1f4f54"
      },
      {
        "title": "ZBX-5348",
        "trust": 0.8,
        "url": "https://support.zabbix.com/browse/zbx-5348"
      },
      {
        "title": "ZABBIX \u0027itemid\u0027 parameter SQL injection vulnerability patch",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchinfo/show/19262"
      },
      {
        "title": "zabbix-2.0.2",
        "trust": 0.6,
        "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=44036"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2012-3918"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-003708"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201207-600"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-89",
        "trust": 1.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-003708"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-3435"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.0,
        "url": "https://support.zabbix.com/browse/zbx-5348"
      },
      {
        "trust": 1.6,
        "url": "http://git.zabbixzone.com/zabbix2.0/.git/commitdiff/333a3a5542ba8a2c901c24b7bf5440f41f1f4f54"
      },
      {
        "trust": 1.6,
        "url": "http://osvdb.org/84127"
      },
      {
        "trust": 1.6,
        "url": "http://secunia.com/advisories/49809"
      },
      {
        "trust": 1.6,
        "url": "http://www.exploit-db.com/exploits/20087"
      },
      {
        "trust": 1.6,
        "url": "http://www.openwall.com/lists/oss-security/2012/07/27/6"
      },
      {
        "trust": 1.6,
        "url": "http://www.openwall.com/lists/oss-security/2012/07/28/3"
      },
      {
        "trust": 1.6,
        "url": "http://www.securityfocus.com/bid/54661"
      },
      {
        "trust": 1.0,
        "url": "http://secunia.com/advisories/50475"
      },
      {
        "trust": 1.0,
        "url": "http://www.debian.org/security/2012/dsa-2539"
      },
      {
        "trust": 1.0,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/77195"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-3435"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-3435"
      },
      {
        "trust": 0.6,
        "url": "http://git.zabbixzone.com/zabbix2.0/.git/commit/333a3a5542ba8a2c901c24b7bf5440f41f1f4f54http"
      },
      {
        "trust": 0.6,
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=843927"
      },
      {
        "trust": 0.6,
        "url": "http://xforce.iss.net/xforce/xfdb/77195"
      },
      {
        "trust": 0.3,
        "url": "http://www.zabbix.com/rn2.0.1.php"
      },
      {
        "trust": 0.3,
        "url": "http://www.zabbix.com/"
      },
      {
        "trust": 0.3,
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=843928"
      },
      {
        "trust": 0.3,
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=843929"
      },
      {
        "trust": 0.2,
        "url": "http://secunia.com/vulnerability_intelligence/"
      },
      {
        "trust": 0.2,
        "url": "http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/"
      },
      {
        "trust": 0.2,
        "url": "http://secunia.com/advisories/secunia_security_advisories/"
      },
      {
        "trust": 0.2,
        "url": "http://secunia.com/vulnerability_scanning/personal/"
      },
      {
        "trust": 0.2,
        "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
      },
      {
        "trust": 0.2,
        "url": "http://secunia.com/advisories/about_secunia_advisories/"
      },
      {
        "trust": 0.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2012-3435"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/psi"
      },
      {
        "trust": 0.1,
        "url": "http://www.exploit-db.com/exploits/20087/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/49809/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/49809/#comments"
      },
      {
        "trust": 0.1,
        "url": "http://git.zabbixzone.com/zabbix2.0/.git/commit/333a3a5542ba8a2c901c24b7bf5440f41f1f4f54"
      },
      {
        "trust": 0.1,
        "url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=49809"
      },
      {
        "trust": 0.1,
        "url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=50475"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/blog/325/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/50475/"
      },
      {
        "trust": 0.1,
        "url": "http://lists.debian.org/debian-security-announce/2012/msg00180.html"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/50475/#comments"
      },
      {
        "trust": 0.1,
        "url": "http://www.debian.org/security/faq"
      },
      {
        "trust": 0.1,
        "url": "http://www.debian.org/security/"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2010-1277"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2011-4674"
      },
      {
        "trust": 0.1,
        "url": "http://creativecommons.org/licenses/by-sa/2.5"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-5572"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3263"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3435"
      },
      {
        "trust": 0.1,
        "url": "http://security.gentoo.org/glsa/glsa-201311-15.xml"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-1364"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3263"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2013-1364"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2013-5572"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-4674"
      },
      {
        "trust": 0.1,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2904"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2010-1277"
      },
      {
        "trust": 0.1,
        "url": "http://security.gentoo.org/"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2011-2904"
      },
      {
        "trust": 0.1,
        "url": "https://bugs.gentoo.org."
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2012-3918"
      },
      {
        "db": "BID",
        "id": "54661"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-003708"
      },
      {
        "db": "PACKETSTORM",
        "id": "114993"
      },
      {
        "db": "PACKETSTORM",
        "id": "116281"
      },
      {
        "db": "PACKETSTORM",
        "id": "116311"
      },
      {
        "db": "PACKETSTORM",
        "id": "124173"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-3435"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201207-600"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "IVD",
        "id": "d67c7e64-1f5e-11e6-abef-000c29c66e3d"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2012-3918"
      },
      {
        "db": "BID",
        "id": "54661"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2012-003708"
      },
      {
        "db": "PACKETSTORM",
        "id": "114993"
      },
      {
        "db": "PACKETSTORM",
        "id": "116281"
      },
      {
        "db": "PACKETSTORM",
        "id": "116311"
      },
      {
        "db": "PACKETSTORM",
        "id": "124173"
      },
      {
        "db": "NVD",
        "id": "CVE-2012-3435"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201207-600"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2012-07-27T00:00:00",
        "db": "IVD",
        "id": "d67c7e64-1f5e-11e6-abef-000c29c66e3d"
      },
      {
        "date": "2012-07-27T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2012-3918"
      },
      {
        "date": "2012-07-24T00:00:00",
        "db": "BID",
        "id": "54661"
      },
      {
        "date": "2012-08-20T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2012-003708"
      },
      {
        "date": "2012-07-25T04:55:22",
        "db": "PACKETSTORM",
        "id": "114993"
      },
      {
        "date": "2012-09-06T06:37:52",
        "db": "PACKETSTORM",
        "id": "116281"
      },
      {
        "date": "2012-09-07T03:06:39",
        "db": "PACKETSTORM",
        "id": "116311"
      },
      {
        "date": "2013-11-25T23:55:55",
        "db": "PACKETSTORM",
        "id": "124173"
      },
      {
        "date": "2012-08-15T20:55:03.070000",
        "db": "NVD",
        "id": "CVE-2012-3435"
      },
      {
        "date": "2012-07-24T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201207-600"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2012-07-27T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2012-3918"
      },
      {
        "date": "2015-04-13T22:08:00",
        "db": "BID",
        "id": "54661"
      },
      {
        "date": "2012-11-15T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2012-003708"
      },
      {
        "date": "2017-08-29T01:31:55.417000",
        "db": "NVD",
        "id": "CVE-2012-3435"
      },
      {
        "date": "2012-08-01T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201207-600"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201207-600"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "ZABBIX \u0027itemid\u0027 parameter SQL injection vulnerability",
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2012-3918"
      },
      {
        "db": "BID",
        "id": "54661"
      }
    ],
    "trust": 0.9
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "SQL injection",
    "sources": [
      {
        "db": "IVD",
        "id": "d67c7e64-1f5e-11e6-abef-000c29c66e3d"
      },
      {
        "db": "PACKETSTORM",
        "id": "114993"
      },
      {
        "db": "PACKETSTORM",
        "id": "116281"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201207-600"
      }
    ],
    "trust": 1.0
  }
}

var-202212-0878
Vulnerability from variot

A Firewall Rule which allows all incoming TCP connections to all programs from any source and to all ports is created in Windows Firewall after Zabbix agent installation (MSI). Microsoft's Windows Firewall Unspecified vulnerabilities exist in products from multiple vendors.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-202212-0878",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "windows firewall",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "microsoft",
        "version": null
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "6.0.12"
      },
      {
        "model": "zabbix",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "6.2.0"
      },
      {
        "model": "zabbix",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "6.0.12"
      },
      {
        "model": "zabbix",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "6.0.10"
      },
      {
        "model": "zabbix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "6.2.6"
      },
      {
        "model": "zabbix",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "zabbix",
        "version": "6.2.6"
      },
      {
        "model": "zabbix",
        "scope": null,
        "trust": 0.8,
        "vendor": "zabbix",
        "version": null
      },
      {
        "model": "windows firewall",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "\u30de\u30a4\u30af\u30ed\u30bd\u30d5\u30c8",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2022-023332"
      },
      {
        "db": "NVD",
        "id": "CVE-2022-43516"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:6.2.6:rc1:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:6.0.12:rc1:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndExcluding": "6.2.6",
                "versionStartIncluding": "6.2.0",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "versionEndExcluding": "6.0.12",
                "versionStartIncluding": "6.0.10",
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:microsoft:windows_firewall:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2022-43516"
      }
    ]
  },
  "cve": "CVE-2022-43516",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [],
        "cvssV3": [
          {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "author": "NVD",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 3.9,
            "impactScore": 5.9,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "author": "security@zabbix.com",
            "availabilityImpact": "LOW",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "exploitabilityScore": 2.2,
            "impactScore": 3.7,
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L",
            "version": "3.1"
          },
          {
            "attackComplexity": "Low",
            "attackVector": "Network",
            "author": "NVD",
            "availabilityImpact": "High",
            "baseScore": 9.8,
            "baseSeverity": "Critical",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "CVE-2022-43516",
            "impactScore": null,
            "integrityImpact": "High",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2022-43516",
            "trust": 1.8,
            "value": "CRITICAL"
          },
          {
            "author": "security@zabbix.com",
            "id": "CVE-2022-43516",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-202212-2470",
            "trust": 0.6,
            "value": "CRITICAL"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2022-023332"
      },
      {
        "db": "NVD",
        "id": "CVE-2022-43516"
      },
      {
        "db": "NVD",
        "id": "CVE-2022-43516"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202212-2470"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "A Firewall Rule which allows all incoming TCP connections to all programs from any source and to all ports is created in Windows Firewall after Zabbix agent installation (MSI). Microsoft\u0027s Windows Firewall Unspecified vulnerabilities exist in products from multiple vendors.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2022-43516"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2022-023332"
      },
      {
        "db": "VULHUB",
        "id": "VHN-440572"
      }
    ],
    "trust": 1.71
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2022-43516",
        "trust": 3.3
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2022-023332",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202212-2470",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-440572",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-440572"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2022-023332"
      },
      {
        "db": "NVD",
        "id": "CVE-2022-43516"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202212-2470"
      }
    ]
  },
  "id": "VAR-202212-0878",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-440572"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2023-12-18T14:03:35.748000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "ZBX-22002 microsoft microsoft",
        "trust": 0.8,
        "url": "https://support.zabbix.com/browse/zbx-22002"
      },
      {
        "title": "Zabbix Security vulnerabilities",
        "trust": 0.6,
        "url": "http://123.124.177.30/web/xxk/bdxqbyid.tag?id=216735"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2022-023332"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202212-2470"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-Other",
        "trust": 1.0
      },
      {
        "problemtype": "others (CWE-Other) [NVD evaluation ]",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2022-023332"
      },
      {
        "db": "NVD",
        "id": "CVE-2022-43516"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.7,
        "url": "https://support.zabbix.com/browse/zbx-22002"
      },
      {
        "trust": 0.8,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2022-43516"
      },
      {
        "trust": 0.6,
        "url": "https://cxsecurity.com/cveshow/cve-2022-43516/"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-440572"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2022-023332"
      },
      {
        "db": "NVD",
        "id": "CVE-2022-43516"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202212-2470"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-440572"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2022-023332"
      },
      {
        "db": "NVD",
        "id": "CVE-2022-43516"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202212-2470"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2022-12-05T00:00:00",
        "db": "VULHUB",
        "id": "VHN-440572"
      },
      {
        "date": "2023-11-28T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2022-023332"
      },
      {
        "date": "2022-12-05T20:15:10.887000",
        "db": "NVD",
        "id": "CVE-2022-43516"
      },
      {
        "date": "2022-12-05T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202212-2470"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2022-12-07T00:00:00",
        "db": "VULHUB",
        "id": "VHN-440572"
      },
      {
        "date": "2023-11-28T05:33:00",
        "db": "JVNDB",
        "id": "JVNDB-2022-023332"
      },
      {
        "date": "2022-12-07T17:23:42.017000",
        "db": "NVD",
        "id": "CVE-2022-43516"
      },
      {
        "date": "2022-12-08T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202212-2470"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202212-2470"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Microsoft\u0027s \u00a0Windows\u00a0Firewall\u00a0 Vulnerabilities in products from multiple vendors such as",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2022-023332"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "other",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202212-2470"
      }
    ],
    "trust": 0.6
  }
}