CVE Vulnerabilities

CVE-2023-32725

Reliance on Cookies without Validation and Integrity Checking

Published: Dec 18, 2023 | Modified: Nov 21, 2024
CVSS 3.x
8.8
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

The website configured in the URL widget will receive a session cookie when testing or executing scheduled reports. The received session cookie can then be used to access the frontend as the particular user.

Weakness

The product relies on the existence or values of cookies when performing security-critical operations, but it does not properly ensure that the setting is valid for the associated user.

Affected Software

NameVendorStart VersionEnd Version
Zabbix_serverZabbix6.0.0 (including)6.0.21 (including)
Zabbix_serverZabbix6.4.0 (including)6.4.6 (including)
Zabbix_serverZabbix7.0.0-alpha1 (including)7.0.0-alpha1 (including)
Zabbix_serverZabbix7.0.0-alpha2 (including)7.0.0-alpha2 (including)
Zabbix_serverZabbix7.0.0-alpha3 (including)7.0.0-alpha3 (including)
ZabbixUbuntubionic*
ZabbixUbuntulunar*
ZabbixUbuntumantic*
ZabbixUbuntutrusty*
ZabbixUbuntuupstream*
ZabbixUbuntuxenial*

Potential Mitigations

References