Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CERTFR-2024-AVI-1028
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Zabbix. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Impacted products
References
Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "Zabbix versions 5.0.x ant\u00e9rieures \u00e0 5.0.43rc1", "product": { "name": "Zabbix", "vendor": { "name": "Zabbix", "scada": false } } }, { "description": "Zabbix versions 7.0.x ant\u00e9rieures \u00e0 7.0.4rc1", "product": { "name": "Zabbix", "vendor": { "name": "Zabbix", "scada": false } } }, { "description": "Zabbix versions 6.4.x ant\u00e9rieures \u00e0 6.4.20rc1", "product": { "name": "Zabbix", "vendor": { "name": "Zabbix", "scada": false } } }, { "description": "Zabbix versions 6.0.x ant\u00e9rieures \u00e0 6.0.35rc1", "product": { "name": "Zabbix", "vendor": { "name": "Zabbix", "scada": false } } } ], "affected_systems_content": "", "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).", "cves": [ { "name": "CVE-2024-42329", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42329" }, { "name": "CVE-2024-42326", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42326" }, { "name": "CVE-2024-36468", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36468" }, { "name": "CVE-2024-22117", "url": "https://www.cve.org/CVERecord?id=CVE-2024-22117" }, { "name": "CVE-2024-42331", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42331" }, { "name": "CVE-2024-36464", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36464" }, { "name": "CVE-2024-42332", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42332" }, { "name": "CVE-2024-42327", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42327" }, { "name": "CVE-2024-42333", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42333" }, { "name": "CVE-2024-36463", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36463" }, { "name": "CVE-2024-42328", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42328" }, { "name": "CVE-2024-36466", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36466" }, { "name": "CVE-2024-36467", "url": "https://www.cve.org/CVERecord?id=CVE-2024-36467" }, { "name": "CVE-2024-42330", "url": "https://www.cve.org/CVERecord?id=CVE-2024-42330" } ], "initial_release_date": "2024-11-29T00:00:00", "last_revision_date": "2024-11-29T00:00:00", "links": [], "reference": "CERTFR-2024-AVI-1028", "revisions": [ { "description": "Version initiale", "revision_date": "2024-11-29T00:00:00.000000" } ], "risks": [ { "description": "D\u00e9ni de service \u00e0 distance" }, { "description": "Ex\u00e9cution de code arbitraire \u00e0 distance" }, { "description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es" }, { "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" }, { "description": "\u00c9l\u00e9vation de privil\u00e8ges" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Zabbix. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.", "title": "Multiples vuln\u00e9rabilit\u00e9s dans Zabbix", "vendor_advisories": [ { "published_at": "2024-11-26", "title": "Bulletin de s\u00e9curit\u00e9 Zabbix ZBX-25610", "url": "https://support.zabbix.com/browse/ZBX-25610" }, { "published_at": "2024-11-27", "title": "Bulletin de s\u00e9curit\u00e9 Zabbix ZBX-25630", "url": "https://support.zabbix.com/browse/ZBX-25630" }, { "published_at": "2024-11-27", "title": "Bulletin de s\u00e9curit\u00e9 Zabbix ZBX-25626", "url": "https://support.zabbix.com/browse/ZBX-25626" }, { "published_at": "2024-11-27", "title": "Bulletin de s\u00e9curit\u00e9 Zabbix ZBX-25625", "url": "https://support.zabbix.com/browse/ZBX-25625" }, { "published_at": "2024-11-26", "title": "Bulletin de s\u00e9curit\u00e9 Zabbix ZBX-25611", "url": "https://support.zabbix.com/browse/ZBX-25611" }, { "published_at": "2024-11-27", "title": "Bulletin de s\u00e9curit\u00e9 Zabbix ZBX-25624", "url": "https://support.zabbix.com/browse/ZBX-25624" }, { "published_at": "2024-11-27", "title": "Bulletin de s\u00e9curit\u00e9 Zabbix ZBX-25627", "url": "https://support.zabbix.com/browse/ZBX-25627" }, { "published_at": "2024-11-27", "title": "Bulletin de s\u00e9curit\u00e9 Zabbix ZBX-25621", "url": "https://support.zabbix.com/browse/ZBX-25621" }, { "published_at": "2024-11-27", "title": "Bulletin de s\u00e9curit\u00e9 Zabbix ZBX-25622", "url": "https://support.zabbix.com/browse/ZBX-25622" }, { "published_at": "2024-11-27", "title": "Bulletin de s\u00e9curit\u00e9 Zabbix ZBX-25614", "url": "https://support.zabbix.com/browse/ZBX-25614" }, { "published_at": "2024-11-27", "title": "Bulletin de s\u00e9curit\u00e9 Zabbix ZBX-25628", "url": "https://support.zabbix.com/browse/ZBX-25628" }, { "published_at": "2024-11-27", "title": "Bulletin de s\u00e9curit\u00e9 Zabbix ZBX-25629", "url": "https://support.zabbix.com/browse/ZBX-25629" }, { "published_at": "2024-11-28", "title": "Bulletin de s\u00e9curit\u00e9 Zabbix ZBX-25635", "url": "https://support.zabbix.com/browse/ZBX-25635" }, { "published_at": "2024-11-27", "title": "Bulletin de s\u00e9curit\u00e9 Zabbix ZBX-25623", "url": "https://support.zabbix.com/browse/ZBX-25623" } ] }
CVE-2024-42326 (GCVE-0-2024-42326)
Vulnerability from cvelistv5
Published
2024-11-27 12:03
Modified
2024-11-27 14:57
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-416 - Use After Free
Summary
There was discovered a use after free bug in browser.c in the es_browser_get_variant function
References
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-42326", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-27T14:56:46.762724Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-27T14:57:07.595Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "modules": [ "Server" ], "product": "Zabbix", "repo": "https://git.zabbix.com/", "vendor": "Zabbix", "versions": [ { "changes": [ { "at": "7.0.4rc1", "status": "unaffected" } ], "lessThanOrEqual": "7.0.3", "status": "affected", "version": "7.0.0", "versionType": "git" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "Zabbix wants to thank chamal for submitting this report on the HackerOne bug bounty platform." } ], "datePublic": "2024-10-30T12:49:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "There was discovered a use after free bug in browser.c in the es_browser_get_variant function" } ], "value": "There was discovered a use after free bug in browser.c in the es_browser_get_variant function" } ], "impacts": [ { "capecId": "CAPEC-100", "descriptions": [ { "lang": "en", "value": "CAPEC-100 Overflow Buffers" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416 Use After Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-27T12:03:37.611Z", "orgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8", "shortName": "Zabbix" }, "references": [ { "url": "https://support.zabbix.com/browse/ZBX-25622" } ], "source": { "discovery": "EXTERNAL" }, "title": "Use after free vulnerability in browser.c", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8", "assignerShortName": "Zabbix", "cveId": "CVE-2024-42326", "datePublished": "2024-11-27T12:03:37.611Z", "dateReserved": "2024-07-30T08:27:36.132Z", "dateUpdated": "2024-11-27T14:57:07.595Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-42330 (GCVE-0-2024-42330)
Vulnerability from cvelistv5
Published
2024-11-27 12:05
Modified
2024-12-04 04:55
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-134 - Use of Externally-Controlled Format String
Summary
The HttpRequest object allows to get the HTTP headers from the server's response after sending the request. The problem is that the returned strings are created directly from the data returned by the server and are not correctly encoded for JavaScript. This allows to create internal strings that can be used to access hidden properties of objects.
References
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:zabbix:frontend:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "frontend", "vendor": "zabbix", "versions": [ { "lessThanOrEqual": "6.0.33", "status": "affected", "version": "6.0.0", "versionType": "git" }, { "lessThanOrEqual": "6.4.18", "status": "affected", "version": "6.4.0", "versionType": "git" }, { "lessThanOrEqual": "7.0.3", "status": "affected", "version": "7.0.0", "versionType": "git" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-42330", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-12-03T00:00:00+00:00", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-04T04:55:23.233Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "modules": [ "Server" ], "product": "Zabbix", "repo": "https://git.zabbix.com/", "vendor": "Zabbix", "versions": [ { "changes": [ { "at": "6.0.34rc1", "status": "unaffected" } ], "lessThanOrEqual": "6.0.33", "status": "affected", "version": "6.0.0", "versionType": "git" }, { "changes": [ { "at": "6.4.19rc1", "status": "unaffected" } ], "lessThanOrEqual": "6.4.18", "status": "affected", "version": "6.4.0", "versionType": "git" }, { "changes": [ { "at": "7.0.4rc1", "status": "unaffected" } ], "lessThanOrEqual": "7.0.3", "status": "affected", "version": "7.0.0", "versionType": "git" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "Zabbix wants to thank zhutyra for submitting this report on the HackerOne bug bounty platform." } ], "datePublic": "2024-10-30T09:43:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "The HttpRequest object allows to get the HTTP headers from the server\u0027s response after sending the request. The problem is that the returned strings are created directly from the data returned by the server and are not correctly encoded for JavaScript. This allows to create internal strings that can be used to access hidden properties of objects." } ], "value": "The HttpRequest object allows to get the HTTP headers from the server\u0027s response after sending the request. The problem is that the returned strings are created directly from the data returned by the server and are not correctly encoded for JavaScript. This allows to create internal strings that can be used to access hidden properties of objects." } ], "impacts": [ { "capecId": "CAPEC-100", "descriptions": [ { "lang": "en", "value": "CAPEC-100 Overflow Buffers" } ] }, { "capecId": "CAPEC-253", "descriptions": [ { "lang": "en", "value": "CAPEC-253 Remote Code Inclusion" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-134", "description": "CWE-134 Use of Externally-Controlled Format String", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-27T12:05:47.722Z", "orgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8", "shortName": "Zabbix" }, "references": [ { "url": "https://support.zabbix.com/browse/ZBX-25626" } ], "source": { "discovery": "EXTERNAL" }, "title": "JS - Internal strings in HTTP headers", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8", "assignerShortName": "Zabbix", "cveId": "CVE-2024-42330", "datePublished": "2024-11-27T12:05:47.722Z", "dateReserved": "2024-07-30T08:27:36.132Z", "dateUpdated": "2024-12-04T04:55:23.233Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-42332 (GCVE-0-2024-42332)
Vulnerability from cvelistv5
Published
2024-11-27 12:06
Modified
2024-11-27 14:55
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE 117 Improper Output Neutralization for Logs
Summary
The researcher is showing that due to the way the SNMP trap log is parsed, an attacker can craft an SNMP trap with additional lines of information and have forged data show in the Zabbix UI. This attack requires SNMP auth to be off and/or the attacker to know the community/auth details. The attack requires an SNMP item to be configured as text on the target host.
References
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-42332", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-27T14:54:59.322691Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-27T14:55:10.340Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "modules": [ "Server" ], "product": "Zabbix", "repo": "https://git.zabbix.com/", "vendor": "Zabbix", "versions": [ { "changes": [ { "at": "6.0.35rc1", "status": "unaffected" } ], "lessThan": "6.0.34", "status": "affected", "version": "6.0.0", "versionType": "git" }, { "changes": [ { "at": "6.4.20rc1", "status": "unaffected" } ], "lessThan": "6.4.19", "status": "affected", "version": "6.4.0", "versionType": "git" }, { "changes": [ { "at": "7.0.5rc1", "status": "unaffected" } ], "lessThan": "7.0.4", "status": "affected", "version": "7.0.0", "versionType": "git" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "Zabbix wants to thank chamal for submitting this report on the HackerOne bug bounty platform." } ], "datePublic": "2024-10-30T06:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "The researcher is showing that due to the way the SNMP trap log is parsed, an attacker can craft an SNMP trap with additional lines of information and have forged data show in the Zabbix UI. This attack requires SNMP auth to be off and/or the attacker to know the community/auth details. The attack requires an SNMP item to be configured as text on the target host." } ], "value": "The researcher is showing that due to the way the SNMP trap log is parsed, an attacker can craft an SNMP trap with additional lines of information and have forged data show in the Zabbix UI. This attack requires SNMP auth to be off and/or the attacker to know the community/auth details. The attack requires an SNMP item to be configured as text on the target host." } ], "impacts": [ { "capecId": "CAPEC-93", "descriptions": [ { "lang": "en", "value": "CAPEC-93 Log Injection-Tampering-Forging" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "description": "CWE 117 Improper Output Neutralization for Logs", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-27T12:06:44.515Z", "orgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8", "shortName": "Zabbix" }, "references": [ { "url": "https://support.zabbix.com/browse/ZBX-25628" } ], "source": { "discovery": "EXTERNAL" }, "title": "New line injection in Zabbix SNMP traps", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8", "assignerShortName": "Zabbix", "cveId": "CVE-2024-42332", "datePublished": "2024-11-27T12:06:44.515Z", "dateReserved": "2024-07-30T08:27:36.132Z", "dateUpdated": "2024-11-27T14:55:10.340Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-22117 (GCVE-0-2024-22117)
Vulnerability from cvelistv5
Published
2024-11-26 14:11
Modified
2024-11-26 15:06
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-20 - Improper Input Validation
Summary
When a URL is added to the map element, it is recorded in the database with sequential IDs. Upon adding a new URL, the system retrieves the last sysmapelementurlid value and increments it by one. However, an issue arises when a user manually changes the sysmapelementurlid value by adding sysmapelementurlid + 1. This action prevents others from adding URLs to the map element.
References
Impacted products
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-22117", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-26T15:03:28.054720Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-26T15:06:22.759Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "modules": [ "Frontend", "API" ], "product": "Zabbix", "repo": "https://git.zabbix.com/", "vendor": "Zabbix", "versions": [ { "changes": [ { "at": "5.0.44rc1", "status": "unaffected" } ], "lessThanOrEqual": "5.0.43", "status": "affected", "version": "5,0,0", "versionType": "git" }, { "changes": [ { "at": "6.0.34rc1", "status": "unaffected" } ], "lessThanOrEqual": "6.0.33", "status": "affected", "version": "6.0.0", "versionType": "git" }, { "changes": [ { "at": "6.4.19rc1", "status": "unaffected" } ], "lessThanOrEqual": "6.4.18", "status": "affected", "version": "6.4.0", "versionType": "git" }, { "changes": [ { "at": "7.0.4rc1", "status": "unaffected" } ], "lessThanOrEqual": "7.0.3", "status": "affected", "version": "7.0.0", "versionType": "git" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "Zabbix wants to thank prasetia (prasetia) for submitting this report on the HackerOne bug bounty platform" } ], "datePublic": "2024-07-03T08:33:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "When a URL is added to the map element, it is recorded in the database with sequential IDs. Upon adding a new URL, the system retrieves the last sysmapelementurlid value and increments it by one. However, an issue arises when a user manually changes the sysmapelementurlid value by adding sysmapelementurlid + 1. This action prevents others from adding URLs to the map element." } ], "value": "When a URL is added to the map element, it is recorded in the database with sequential IDs. Upon adding a new URL, the system retrieves the last sysmapelementurlid value and increments it by one. However, an issue arises when a user manually changes the sysmapelementurlid value by adding sysmapelementurlid + 1. This action prevents others from adding URLs to the map element." } ], "impacts": [ { "capecId": "CAPEC-207", "descriptions": [ { "lang": "en", "value": "CAPEC-207 Removing Important Client Functionality" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 2.2, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-26T14:11:57.195Z", "orgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8", "shortName": "Zabbix" }, "references": [ { "url": "https://support.zabbix.com/browse/ZBX-25610" } ], "source": { "discovery": "EXTERNAL" }, "title": "Value of sysmap_element_url can be de-synchronized causing the map element to crash when new URLs is added", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8", "assignerShortName": "Zabbix", "cveId": "CVE-2024-22117", "datePublished": "2024-11-26T14:11:57.195Z", "dateReserved": "2024-01-05T07:44:01.394Z", "dateUpdated": "2024-11-26T15:06:22.759Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-36468 (GCVE-0-2024-36468)
Vulnerability from cvelistv5
Published
2024-11-27 12:03
Modified
2024-11-27 14:57
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-121 - Stack-based Buffer Overflow
Summary
The reported vulnerability is a stack buffer overflow in the zbx_snmp_cache_handle_engineid function within the Zabbix server/proxy code. This issue occurs when copying data from session->securityEngineID to local_record.engineid without proper bounds checking.
References
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-36468", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-27T14:57:25.702787Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-27T14:57:32.411Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "modules": [ "Proxy", "Server" ], "product": "Zabbix", "repo": "https://git.zabbix.com/", "vendor": "Zabbix", "versions": [ { "changes": [ { "at": "7.0.3rc1", "status": "unaffected" } ], "lessThanOrEqual": "7.0.2rc1", "status": "affected", "version": "7.0.0", "versionType": "git" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Zabbix wants to thank chamal for submitting this report on the HackerOne bug bounty platform" } ], "datePublic": "2024-09-12T12:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "The reported vulnerability is a stack buffer overflow in the zbx_snmp_cache_handle_engineid function within the Zabbix server/proxy code. This issue occurs when copying data from session-\u0026gt;securityEngineID to local_record.engineid without proper bounds checking." } ], "value": "The reported vulnerability is a stack buffer overflow in the zbx_snmp_cache_handle_engineid function within the Zabbix server/proxy code. This issue occurs when copying data from session-\u003esecurityEngineID to local_record.engineid without proper bounds checking." } ], "impacts": [ { "capecId": "CAPEC-100", "descriptions": [ { "lang": "en", "value": "CAPEC-100 Overflow Buffers" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-121", "description": "CWE-121 Stack-based Buffer Overflow", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-27T12:03:07.626Z", "orgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8", "shortName": "Zabbix" }, "references": [ { "url": "https://support.zabbix.com/browse/ZBX-25621" } ], "source": { "discovery": "EXTERNAL" }, "title": "Stack buffer overflow in zbx_snmp_cache_handle_engineid", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8", "assignerShortName": "Zabbix", "cveId": "CVE-2024-36468", "datePublished": "2024-11-27T12:03:07.626Z", "dateReserved": "2024-05-28T11:21:24.947Z", "dateUpdated": "2024-11-27T14:57:32.411Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-36463 (GCVE-0-2024-36463)
Vulnerability from cvelistv5
Published
2024-11-26 15:06
Modified
2024-11-26 16:21
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-767 - Access to Critical Private Variable via Public Method
Summary
The implementation of atob in "Zabbix JS" allows to create a string with arbitrary content and use it to access internal properties of objects.
References
Impacted products
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-36463", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-26T16:21:34.528363Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-26T16:21:54.142Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "modules": [ "Proxy", "Server" ], "product": "Zabbix", "repo": "https://git.zabbix.com/", "vendor": "Zabbix", "versions": [ { "changes": [ { "at": "5.0.43rc1", "status": "unaffected" } ], "lessThanOrEqual": "5.0.42", "status": "affected", "version": "5.0.0", "versionType": "git" }, { "changes": [ { "at": "6.0.33rc1", "status": "unaffected" } ], "lessThanOrEqual": "6.0.32", "status": "affected", "version": "6.0.0", "versionType": "git" }, { "changes": [ { "at": "6.4.18rc1", "status": "unaffected" } ], "lessThanOrEqual": "6.4.17", "status": "affected", "version": "6.4.0", "versionType": "git" }, { "changes": [ { "at": "7.0.3rc1", "status": "unaffected" } ], "lessThanOrEqual": "7.0.2", "status": "affected", "version": "7.0.0", "versionType": "git" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "Zabbix wants to thank zhutyra for submitting this report on the HackerOne bug bounty platform." } ], "datePublic": "2024-09-05T07:45:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "The implementation of atob in \"Zabbix JS\" allows to create a string with arbitrary content and use it to access internal properties of objects." } ], "value": "The implementation of atob in \"Zabbix JS\" allows to create a string with arbitrary content and use it to access internal properties of objects." } ], "impacts": [ { "capecId": "CAPEC-253", "descriptions": [ { "lang": "en", "value": "CAPEC-253 Remote Code Inclusion" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-767", "description": "CWE-767 Access to Critical Private Variable via Public Method", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-26T15:06:14.217Z", "orgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8", "shortName": "Zabbix" }, "references": [ { "url": "https://support.zabbix.com/browse/ZBX-25611" } ], "source": { "discovery": "EXTERNAL" }, "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8", "assignerShortName": "Zabbix", "cveId": "CVE-2024-36463", "datePublished": "2024-11-26T15:06:14.217Z", "dateReserved": "2024-05-28T11:21:24.946Z", "dateUpdated": "2024-11-26T16:21:54.142Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-42327 (GCVE-0-2024-42327)
Vulnerability from cvelistv5
Published
2024-11-27 12:04
Modified
2024-12-04 04:55
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-89 - SQL Injection
Summary
A non-admin user account on the Zabbix frontend with the default User role, or with any other role that gives API access can exploit this vulnerability. An SQLi exists in the CUser class in the addRelatedObjects function, this function is being called from the CUser.get function which is available for every user who has API access.
References
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "zabbix", "vendor": "zabbix", "versions": [ { "lessThanOrEqual": "6.0.31", "status": "affected", "version": "6.0.0", "versionType": "git" }, { "lessThanOrEqual": "6.4.16", "status": "affected", "version": "6.4.0", "versionType": "git" }, { "lessThanOrEqual": "7.0.1", "status": "affected", "version": "7.0.0", "versionType": "git" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-42327", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-12-03T00:00:00+00:00", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-04T04:55:21.730Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "modules": [ "API" ], "product": "Zabbix", "repo": "https://git.zabbix.com/", "vendor": "Zabbix", "versions": [ { "changes": [ { "at": "6.0.32rc1", "status": "unaffected" } ], "lessThanOrEqual": "6.0.31", "status": "affected", "version": "6.0.0", "versionType": "git" }, { "changes": [ { "at": "6.4.17rc1", "status": "unaffected" } ], "lessThanOrEqual": "6.4.16", "status": "affected", "version": "6.4.0", "versionType": "git" }, { "changes": [ { "at": "7.0.2rc1", "status": "unaffected" } ], "lessThanOrEqual": "7.0.1", "status": "affected", "version": "7.0.0", "versionType": "git" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Zabbix wants to thank M\u00e1rk R\u00e1k\u00f3czi (reeeeeeeeeeee) for submitting this report on the HackerOne bug bounty platform." } ], "datePublic": "2024-10-30T12:06:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "A non-admin user account on the Zabbix frontend with the default User role, or with any other role that gives API access can exploit this vulnerability. An SQLi exists in the CUser class in the addRelatedObjects function, this function is being called from the CUser.get function which is available for every user who has API access." } ], "value": "A non-admin user account on the Zabbix frontend with the default User role, or with any other role that gives API access can exploit this vulnerability. An SQLi exists in the CUser class in the addRelatedObjects function, this function is being called from the CUser.get function which is available for every user who has API access." } ], "impacts": [ { "capecId": "CAPEC-233", "descriptions": [ { "lang": "en", "value": "CAPEC-233: Privilege Escalation" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.9, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-89", "description": "CWE-89: SQL Injection", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-27T12:04:31.950Z", "orgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8", "shortName": "Zabbix" }, "references": [ { "url": "https://support.zabbix.com/browse/ZBX-25623" } ], "source": { "discovery": "INTERNAL" }, "title": "SQL injection in user.get API", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8", "assignerShortName": "Zabbix", "cveId": "CVE-2024-42327", "datePublished": "2024-11-27T12:04:31.950Z", "dateReserved": "2024-07-30T08:27:36.132Z", "dateUpdated": "2024-12-04T04:55:21.730Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-42328 (GCVE-0-2024-42328)
Vulnerability from cvelistv5
Published
2024-11-27 12:04
Modified
2024-11-27 14:56
Severity ?
VLAI Severity ?
EPSS score ?
Summary
When the webdriver for the Browser object downloads data from a HTTP server, the data pointer is set to NULL and is allocated only in curl_write_cb when receiving data. If the server's response is an empty document, then wd->data in the code below will remain NULL and an attempt to read from it will result in a crash.
References
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-42328", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-27T14:56:07.120650Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-27T14:56:15.833Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "modules": [ "Server" ], "product": "Zabbix", "repo": "https://git.zabbix.com/", "vendor": "Zabbix", "versions": [ { "changes": [ { "at": "7.0.3rc1", "status": "unaffected" } ], "lessThanOrEqual": "7.0.2", "status": "affected", "version": "7.0.0", "versionType": "git" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "Zabbix wants to thank zhutyra for submitting this report on the HackerOne bug bounty platform" } ], "datePublic": "2024-10-30T11:49:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "When the webdriver for the Browser object downloads data from a HTTP server, the data pointer is set to NULL and is allocated only in curl_write_cb when receiving data. If the server\u0027s response is an empty document, then wd-\u0026gt;data in the code below will remain NULL and an attempt to read from it will result in a crash." } ], "value": "When the webdriver for the Browser object downloads data from a HTTP server, the data pointer is set to NULL and is allocated only in curl_write_cb when receiving data. If the server\u0027s response is an empty document, then wd-\u003edata in the code below will remain NULL and an attempt to read from it will result in a crash." } ], "impacts": [ { "capecId": "CAPEC-215", "descriptions": [ { "lang": "en", "value": "CAPEC-215 Fuzzing for application mapping" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-690", "description": "CWE-690 Unchecked Return Value to NULL Pointer Dereference", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-476", "description": "CWE-476 NULL Pointer Dereference", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-27T12:04:53.864Z", "orgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8", "shortName": "Zabbix" }, "references": [ { "url": "https://support.zabbix.com/browse/ZBX-25624" } ], "source": { "discovery": "EXTERNAL" }, "title": "JS - Crash on empty HTTP server response", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8", "assignerShortName": "Zabbix", "cveId": "CVE-2024-42328", "datePublished": "2024-11-27T12:04:53.864Z", "dateReserved": "2024-07-30T08:27:36.132Z", "dateUpdated": "2024-11-27T14:56:15.833Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-36466 (GCVE-0-2024-36466)
Vulnerability from cvelistv5
Published
2024-11-28 07:19
Modified
2024-12-04 14:38
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-290 - Authentication Bypass by Spoofing
Summary
A bug in the code allows an attacker to sign a forged zbx_session cookie, which then allows them to sign in with admin permissions.
References
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "zabbix", "vendor": "zabbix", "versions": [ { "lessThanOrEqual": "6.0.31", "status": "affected", "version": "6.0.0", "versionType": "git" }, { "lessThanOrEqual": "6.4.16", "status": "affected", "version": "6.4.0", "versionType": "git" }, { "lessThan": "7.0.1rc1", "status": "affected", "version": "7.0.0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-36466", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-12-04T04:55:27.332810Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-04T14:38:41.930Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "modules": [ "Frontend" ], "product": "Zabbix", "repo": "https://git.zabbix.com/", "vendor": "Zabbix", "versions": [ { "changes": [ { "at": "6.0.32rc1", "status": "unaffected" } ], "lessThanOrEqual": "6.0.31", "status": "affected", "version": "6.0.0", "versionType": "git" }, { "changes": [ { "at": "6.4.17rc1", "status": "unaffected" } ], "lessThanOrEqual": "6.4.16", "status": "affected", "version": "6.4.0", "versionType": "git" }, { "status": "affected", "version": "7.0.0", "versionType": "git" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Zabbix wants to thank M\u00e1rk R\u00e1k\u00f3czi (reeeeeeeeeeee) for submitting this report on the HackerOne bug bounty platform." } ], "datePublic": "2024-07-02T13:25:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "A bug in the code allows an attacker to sign a forged zbx_session cookie, which then allows them to sign in with admin permissions.\u003cbr\u003e" } ], "value": "A bug in the code allows an attacker to sign a forged zbx_session cookie, which then allows them to sign in with admin permissions." } ], "impacts": [ { "capecId": "CAPEC-196", "descriptions": [ { "lang": "en", "value": "CAPEC-196 Session Credential Falsification through Forging" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-290", "description": "CWE-290 Authentication Bypass by Spoofing", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-28T07:19:48.806Z", "orgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8", "shortName": "Zabbix" }, "references": [ { "url": "https://support.zabbix.com/browse/ZBX-25635" } ], "source": { "discovery": "EXTERNAL" }, "title": "Unauthenticated Zabbix frontend takeover when SSO is being used", "workarounds": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Disabling SSO authentication method" } ], "value": "Disabling SSO authentication method" } ], "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8", "assignerShortName": "Zabbix", "cveId": "CVE-2024-36466", "datePublished": "2024-11-28T07:19:48.806Z", "dateReserved": "2024-05-28T11:21:24.947Z", "dateUpdated": "2024-12-04T14:38:41.930Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-42329 (GCVE-0-2024-42329)
Vulnerability from cvelistv5
Published
2024-11-27 12:05
Modified
2024-11-27 14:55
Severity ?
VLAI Severity ?
EPSS score ?
Summary
The webdriver for the Browser object expects an error object to be initialized when the webdriver_session_query function fails. But this function can fail for various reasons without an error description and then the wd->error will be NULL and trying to read from it will result in a crash.
References
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-42329", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-27T14:55:49.394112Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-27T14:55:58.417Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "modules": [ "Server" ], "product": "Zabbix", "repo": "https://git.zabbix.com/", "vendor": "Zabbix", "versions": [ { "changes": [ { "at": "7.0.4rc1", "status": "unaffected" } ], "lessThanOrEqual": "7.0.3rc1", "status": "affected", "version": "7.0.0", "versionType": "git" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "Zabbix wants to thank zhutyra for submitting this report on the HackerOne bug bounty platform." } ], "datePublic": "2024-10-30T11:36:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "The webdriver for the Browser object expects an error object to be initialized when the webdriver_session_query function fails. But this function can fail for various reasons without an error description and then the wd-\u0026gt;error will be NULL and trying to read from it will result in a crash." } ], "value": "The webdriver for the Browser object expects an error object to be initialized when the webdriver_session_query function fails. But this function can fail for various reasons without an error description and then the wd-\u003eerror will be NULL and trying to read from it will result in a crash." } ], "impacts": [ { "capecId": "CAPEC-215", "descriptions": [ { "lang": "en", "value": "CAPEC-215 Fuzzing for application mapping" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-690", "description": "CWE-690 Unchecked Return Value to NULL Pointer Dereference", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-476", "description": "CWE-476 NULL Pointer Dereference", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-27T12:05:21.915Z", "orgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8", "shortName": "Zabbix" }, "references": [ { "url": "https://support.zabbix.com/browse/ZBX-25625" } ], "source": { "discovery": "EXTERNAL" }, "title": "JS - Crash on unexpected HTTP server response", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8", "assignerShortName": "Zabbix", "cveId": "CVE-2024-42329", "datePublished": "2024-11-27T12:05:21.915Z", "dateReserved": "2024-07-30T08:27:36.132Z", "dateUpdated": "2024-11-27T14:55:58.417Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-42331 (GCVE-0-2024-42331)
Vulnerability from cvelistv5
Published
2024-11-27 12:06
Modified
2024-11-27 14:55
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-416 - Use After Free
Summary
In the src/libs/zbxembed/browser.c file, the es_browser_ctor method retrieves a heap pointer from the Duktape JavaScript engine. This heap pointer is subsequently utilized by the browser_push_error method in the src/libs/zbxembed/browser_error.c file. A use-after-free bug can occur at this stage if the wd->browser heap pointer is freed by garbage collection.
References
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-42331", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-27T14:55:25.904954Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-27T14:55:34.113Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "modules": [ "Server" ], "product": "Zabbix", "repo": "https://git.zabbix.com/", "vendor": "Zabbix", "versions": [ { "changes": [ { "at": "7.0.4rc1", "status": "unaffected" } ], "lessThanOrEqual": "7.0.3", "status": "affected", "version": "7.0.0", "versionType": "git" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "Zabbix wants to thank chamal for submitting this report on the HackerOne bug bounty platform." } ], "datePublic": "2024-10-30T09:13:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "In the src/libs/zbxembed/browser.c file, the es_browser_ctor method retrieves a heap pointer from the Duktape JavaScript engine. This heap pointer is subsequently utilized by the browser_push_error method in the src/libs/zbxembed/browser_error.c file. A use-after-free bug can occur at this stage if the wd-\u0026gt;browser heap pointer is freed by garbage collection." } ], "value": "In the src/libs/zbxembed/browser.c file, the es_browser_ctor method retrieves a heap pointer from the Duktape JavaScript engine. This heap pointer is subsequently utilized by the browser_push_error method in the src/libs/zbxembed/browser_error.c file. A use-after-free bug can occur at this stage if the wd-\u003ebrowser heap pointer is freed by garbage collection." } ], "impacts": [ { "capecId": "CAPEC-100", "descriptions": [ { "lang": "en", "value": "CAPEC-100 Overflow Buffers" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "CWE-416 Use After Free", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-27T12:06:12.250Z", "orgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8", "shortName": "Zabbix" }, "references": [ { "url": "https://support.zabbix.com/browse/ZBX-25627" } ], "source": { "discovery": "EXTERNAL" }, "title": "Use after free in browser_push_error", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8", "assignerShortName": "Zabbix", "cveId": "CVE-2024-42331", "datePublished": "2024-11-27T12:06:12.250Z", "dateReserved": "2024-07-30T08:27:36.132Z", "dateUpdated": "2024-11-27T14:55:34.113Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-42333 (GCVE-0-2024-42333)
Vulnerability from cvelistv5
Published
2024-11-27 12:07
Modified
2024-11-27 14:54
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-126 - Buffer Over-read
Summary
The researcher is showing that it is possible to leak a small amount of Zabbix Server memory using an out of bounds read in src/libs/zbxmedia/email.c
References
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-42333", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-27T14:54:27.245135Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-27T14:54:36.459Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "modules": [ "Server" ], "product": "Zabbix", "repo": "https://git.zabbix.com/", "vendor": "Zabbix", "versions": [ { "changes": [ { "at": "6.0.34rc1", "status": "unaffected" } ], "lessThanOrEqual": "6.0.33", "status": "affected", "version": "6.0.0", "versionType": "git" }, { "changes": [ { "at": "6.4.19rc1", "status": "unaffected" } ], "lessThanOrEqual": "6.4.18", "status": "affected", "version": "6.4.0", "versionType": "git" }, { "changes": [ { "at": "7.0.4rc1", "status": "unaffected" } ], "lessThanOrEqual": "7.0.3", "status": "affected", "version": "7.0.0", "versionType": "git" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "Zabbix wants to thank chamal for submitting this report on the HackerOne bug bounty platform." } ], "datePublic": "2024-10-07T06:37:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "The researcher is showing that it is possible to leak a small amount of Zabbix Server memory using an out of bounds read in src/libs/zbxmedia/email.c" } ], "value": "The researcher is showing that it is possible to leak a small amount of Zabbix Server memory using an out of bounds read in src/libs/zbxmedia/email.c" } ], "impacts": [ { "capecId": "CAPEC-679", "descriptions": [ { "lang": "en", "value": "CAPEC-679 Exploitation of Improperly Configured or Implemented Memory Protections" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 2.7, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-126", "description": "CWE-126 Buffer Over-read", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-27T12:07:11.159Z", "orgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8", "shortName": "Zabbix" }, "references": [ { "url": "https://support.zabbix.com/browse/ZBX-25629" } ], "source": { "discovery": "EXTERNAL" }, "title": "Heap buffer over-read", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8", "assignerShortName": "Zabbix", "cveId": "CVE-2024-42333", "datePublished": "2024-11-27T12:07:11.159Z", "dateReserved": "2024-07-30T08:27:36.132Z", "dateUpdated": "2024-11-27T14:54:36.459Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-36464 (GCVE-0-2024-36464)
Vulnerability from cvelistv5
Published
2024-11-27 14:01
Modified
2024-11-27 14:28
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-256 - Plaintext Storage of a Password
Summary
When exporting media types, the password is exported in the YAML in plain text. This appears to be a best practices type issue and may have no actual impact. The user would need to have permissions to access the media types and therefore would be expected to have access to these passwords.
References
Impacted products
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-36464", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-27T14:27:15.357237Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-27T14:28:40.384Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "modules": [ "API", "Frontend", "Server" ], "product": "Zabbix", "repo": "https://git.zabbix.com/", "vendor": "Zabbix", "versions": [ { "changes": [ { "at": "6.0.30rc1", "status": "unaffected" } ], "lessThanOrEqual": "6.0.29", "status": "affected", "version": "6.0.0", "versionType": "git" }, { "changes": [ { "at": "6.4.16rc1", "status": "unaffected" } ], "lessThanOrEqual": "6.4.15", "status": "affected", "version": "6.4.0", "versionType": "git" }, { "changes": [ { "at": "7.0.1rc1", "status": "unaffected" } ], "lessThanOrEqual": "7.0.0", "status": "affected", "version": "7.0.0alpha1", "versionType": "git" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "Zabbix wants to thank Jayateertha G for submitting this report on the HackerOne bug bounty platform." } ], "datePublic": "2024-10-30T13:37:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "When exporting media types, the password is exported in the YAML in plain text. This appears to be a best practices type issue and may have no actual impact. The user would need to have permissions to access the media types and therefore would be expected to have access to these passwords." } ], "value": "When exporting media types, the password is exported in the YAML in plain text. This appears to be a best practices type issue and may have no actual impact. The user would need to have permissions to access the media types and therefore would be expected to have access to these passwords." } ], "impacts": [ { "descriptions": [ { "lang": "en", "value": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 2.7, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-256", "description": "CWE-256 Plaintext Storage of a Password", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-27T14:01:58.136Z", "orgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8", "shortName": "Zabbix" }, "references": [ { "url": "https://support.zabbix.com/browse/ZBX-25630" } ], "source": { "discovery": "EXTERNAL" }, "title": "Media Types: Office365, SMTP passwords are unencrypted and visible in plaintext when exported", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8", "assignerShortName": "Zabbix", "cveId": "CVE-2024-36464", "datePublished": "2024-11-27T14:01:58.136Z", "dateReserved": "2024-05-28T11:21:24.946Z", "dateUpdated": "2024-11-27T14:28:40.384Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-36467 (GCVE-0-2024-36467)
Vulnerability from cvelistv5
Published
2024-11-27 06:16
Modified
2024-12-04 14:36
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-285 - Improper Authorization
Summary
An authenticated user with API access (e.g.: user with default User role), more specifically a user with access to the user.update API endpoint is enough to be able to add themselves to any group (e.g.: Zabbix Administrators), except to groups that are disabled or having restricted GUI access.
References
Impacted products
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "zabbix", "vendor": "zabbix", "versions": [ { "lessThanOrEqual": "5.0.42", "status": "affected", "version": "5.0.0", "versionType": "custom" }, { "lessThanOrEqual": "6.0.32", "status": "affected", "version": "6.0.0", "versionType": "custom" }, { "lessThanOrEqual": "6.4.17", "status": "affected", "version": "6.4.0", "versionType": "custom" }, { "lessThanOrEqual": "7.0.1rc", "status": "affected", "version": "7.0.0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-36467", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-12-04T04:55:25.645854Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-04T14:36:54.043Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "modules": [ "API" ], "product": "Zabbix", "repo": "https://git.zabbix.com/", "vendor": "Zabbix", "versions": [ { "changes": [ { "at": "5.0.43rc1", "status": "unaffected" } ], "lessThanOrEqual": "5.0.42", "status": "affected", "version": "5.0.0", "versionType": "git" }, { "changes": [ { "at": "6.0.33rc1", "status": "unaffected" } ], "lessThanOrEqual": "6.0.32", "status": "affected", "version": "6.0.0", "versionType": "git" }, { "changes": [ { "at": "6.4.18rc1", "status": "unaffected" } ], "lessThanOrEqual": "6.4.17", "status": "affected", "version": "6.4.0", "versionType": "git" }, { "changes": [ { "at": "7.0.2rc1", "status": "unaffected" } ], "lessThanOrEqual": "7.0.1rc1", "status": "affected", "version": "7.0.0", "versionType": "git" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "Zabbix wants to thank M\u00e1rk R\u00e1k\u00f3czi for submitting this report on the HackerOne bug bounty platform." } ], "datePublic": "2024-09-12T08:25:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "An authenticated user with API access (e.g.: user with default User role), more specifically a user with access to the user.update API endpoint is enough to be able to add themselves to any group (e.g.: Zabbix Administrators), except to groups that are disabled or having restricted GUI access." } ], "value": "An authenticated user with API access (e.g.: user with default User role), more specifically a user with access to the user.update API endpoint is enough to be able to add themselves to any group (e.g.: Zabbix Administrators), except to groups that are disabled or having restricted GUI access." } ], "impacts": [ { "capecId": "CAPEC-233", "descriptions": [ { "lang": "en", "value": "CAPEC-233 Privilege Escalation" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-285", "description": "CWE-285 Improper Authorization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-27T06:16:30.381Z", "orgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8", "shortName": "Zabbix" }, "references": [ { "url": "https://support.zabbix.com/browse/ZBX-25614" } ], "source": { "discovery": "EXTERNAL" }, "title": "Authentication privilege escalation via user groups due to missing authorization checks", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8", "assignerShortName": "Zabbix", "cveId": "CVE-2024-36467", "datePublished": "2024-11-27T06:16:30.381Z", "dateReserved": "2024-05-28T11:21:24.947Z", "dateUpdated": "2024-12-04T14:36:54.043Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…