CVE Vulnerabilities

CVE-2023-32725

Reliance on Cookies without Validation and Integrity Checking

Published: Dec 18, 2023 | Modified: Dec 22, 2023
CVSS 3.x
8.8
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu
MEDIUM

The website configured in the URL widget will receive a session cookie when testing or executing scheduled reports. The received session cookie can then be used to access the frontend as the particular user.

Weakness

The product relies on the existence or values of cookies when performing security-critical operations, but it does not properly ensure that the setting is valid for the associated user.

Affected Software

Name Vendor Start Version End Version
Zabbix_server Zabbix 6.0.0 (including) 6.0.21 (including)
Zabbix_server Zabbix 6.4.0 (including) 6.4.6 (including)
Zabbix_server Zabbix 7.0.0-alpha1 (including) 7.0.0-alpha1 (including)
Zabbix_server Zabbix 7.0.0-alpha2 (including) 7.0.0-alpha2 (including)
Zabbix_server Zabbix 7.0.0-alpha3 (including) 7.0.0-alpha3 (including)
Zabbix Ubuntu bionic *
Zabbix Ubuntu lunar *
Zabbix Ubuntu mantic *
Zabbix Ubuntu trusty *
Zabbix Ubuntu upstream *
Zabbix Ubuntu xenial *

Potential Mitigations

References