9.6
CVE-2023-32725
- EPSS 0.2%
- Veröffentlicht 18.12.2023 10:15:06
- Zuletzt bearbeitet 21.11.2024 08:03:55
- Quelle security@zabbix.com
- Teams Watchlist Login
- Unerledigt Login
The website configured in the URL widget will receive a session cookie when testing or executing scheduled reports. The received session cookie can then be used to access the frontend as the particular user.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Zabbix ≫ Zabbix Server Version >= 6.0.0 <= 6.0.21
Zabbix ≫ Zabbix Server Version >= 6.4.0 <= 6.4.6
Zabbix ≫ Zabbix Server Version7.0.0 Updatealpha1
Zabbix ≫ Zabbix Server Version7.0.0 Updatealpha2
Zabbix ≫ Zabbix Server Version7.0.0 Updatealpha3
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.2% | 0.428 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 8.8 | 2.8 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
|
security@zabbix.com | 9.6 | 2.8 | 6 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
|
CWE-565 Reliance on Cookies without Validation and Integrity Checking
The product relies on the existence or values of cookies when performing security-critical operations, but it does not properly ensure that the setting is valid for the associated user.