2.7
CVE-2024-36464
- EPSS 0.14%
- Published 27.11.2024 14:15:17
- Last modified 27.11.2024 14:15:17
- Source security@zabbix.com
- Teams watchlist Login
- Open Login
When exporting media types, the password is exported in the YAML in plain text. This appears to be a best practices type issue and may have no actual impact. The user would need to have permissions to access the media types and therefore would be expected to have access to these passwords.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorZabbix
≫
Product
Zabbix
Default Statusunaffected
Version <=
6.0.29
Version
6.0.0
Status
affected
Version <=
6.4.15
Version
6.4.0
Status
affected
Version <=
7.0.0
Version
7.0.0alpha1
Status
affected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.14% | 0.346 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
security@zabbix.com | 2.7 | 1.2 | 1.4 |
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N
|
CWE-256 Plaintext Storage of a Password
Storing a password in plaintext may result in a system compromise.