gsd-2022-43515
Vulnerability from gsd
Modified
2023-12-13 01:19
Details
Zabbix Frontend provides a feature that allows admins to maintain the installation and ensure that only certain IP addresses can access it. In this way, any user will not be able to access the Zabbix Frontend while it is being maintained and possible sensitive data will be prevented from being disclosed. An attacker can bypass this protection and access the instance using IP address not listed in the defined range.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2022-43515", "id": "GSD-2022-43515", "references": [ "https://www.suse.com/security/cve/CVE-2022-43515.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2022-43515" ], "details": "Zabbix Frontend provides a feature that allows admins to maintain the installation and ensure that only certain IP addresses can access it. In this way, any user will not be able to access the Zabbix Frontend while it is being maintained and possible sensitive data will be prevented from being disclosed. An attacker can bypass this protection and access the instance using IP address not listed in the defined range.", "id": "GSD-2022-43515", "modified": "2023-12-13T01:19:31.795979Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "AKA": "ZBV-2022-10-1", "ASSIGNER": "security@zabbix.com", "DATE_PUBLIC": "2022-10-18T06:21:00.000Z", "ID": "CVE-2022-43515", "STATE": "PUBLIC", "TITLE": "X-Forwarded-For header is active by default causes access to Zabbix sites in maintenance mode" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Frontend", "version": { "version_data": [ { "version_affected": "=", "version_value": "4.0.0-4.0.44" }, { "version_affected": "=", "version_value": "5.0.0-5.0.29" }, { "version_affected": "=", "version_value": "6.0.0-6.0.9" }, { "version_affected": "=", "version_value": "6.2.0-6.2.4" }, { "version_affected": "!\u003e=", "version_value": "5.0.30rc1" }, { "version_affected": "!\u003e=", "version_value": "6.0.11rc1" }, { "version_affected": "!\u003e=", "version_value": "6.2.5rc1" } ] } } ] }, "vendor_name": "Zabbix" } ] } }, "credit": [ { "lang": "eng", "value": "osman1337" } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Zabbix Frontend provides a feature that allows admins to maintain the installation and ensure that only certain IP addresses can access it. In this way, any user will not be able to access the Zabbix Frontend while it is being maintained and possible sensitive data will be prevented from being disclosed. An attacker can bypass this protection and access the instance using IP address not listed in the defined range." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-20 Improper Input Validation" } ] } ] }, "references": { "reference_data": [ { "name": "https://support.zabbix.com/browse/ZBX-22050", "refsource": "MISC", "url": "https://support.zabbix.com/browse/ZBX-22050" }, { "name": "[debian-lts-announce] 20230822 [SECURITY] [DLA 3538-1] zabbix security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00027.html" } ] }, "solution": [ { "lang": "eng", "value": "To remediate this vulnerability, apply the updates listed in the \u0027Unaffected\u0027 section to appropriate products or use the workaround" } ], "source": { "discovery": "EXTERNAL" }, "work_around": [ { "lang": "eng", "value": "If an immediate update is not possible, limit network access to Zabbix Frontend during the maintenance window." } ] }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:zabbix:frontend:6.2.5:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:zabbix:frontend:6.0.11:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:zabbix:frontend:5.0.30:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:zabbix:frontend:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "6.2.4", "versionStartIncluding": "6.2.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:zabbix:frontend:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "6.0.9", "versionStartIncluding": "6.0.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:zabbix:frontend:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "5.0.29", "versionStartIncluding": "5.0.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:zabbix:frontend:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "4.0.44", "versionStartIncluding": "4.0.0", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "security@zabbix.com", "ID": "CVE-2022-43515" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Zabbix Frontend provides a feature that allows admins to maintain the installation and ensure that only certain IP addresses can access it. In this way, any user will not be able to access the Zabbix Frontend while it is being maintained and possible sensitive data will be prevented from being disclosed. An attacker can bypass this protection and access the instance using IP address not listed in the defined range." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-863" } ] } ] }, "references": { "reference_data": [ { "name": "https://support.zabbix.com/browse/ZBX-22050", "refsource": "MISC", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://support.zabbix.com/browse/ZBX-22050" }, { "name": "[debian-lts-announce] 20230822 [SECURITY] [DLA 3538-1] zabbix security update", "refsource": "MLIST", "tags": [], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00027.html" } ] } }, "impact": { "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9 } }, "lastModifiedDate": "2023-08-22T19:16Z", "publishedDate": "2022-12-05T19:15Z" } } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.