Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cve-2024-22116
Vulnerability from cvelistv5
Published
2024-08-09 10:16
Modified
2024-12-04 14:37
Severity ?
EPSS score ?
0.54%
(0.64974)
Summary
An administrator with restricted permissions can exploit the script execution functionality within the Monitoring Hosts section. The lack of default escaping for script parameters enabled this user ability to execute arbitrary code via the Ping script, thereby compromising infrastructure.
References
▼ | URL | Tags | |
---|---|---|---|
security@zabbix.com | https://support.zabbix.com/browse/ZBX-25016 | Vendor Advisory |
{ containers: { adp: [ { affected: [ { cpes: [ "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*", ], defaultStatus: "unknown", product: "zabbix", vendor: "zabbix", versions: [ { lessThanOrEqual: "6.4.15", status: "affected", version: "6.4.9", versionType: "custom", }, { lessThanOrEqual: "7.0.0rc2", status: "affected", version: "7.0.0alpha1", versionType: "custom", }, ], }, ], metrics: [ { other: { content: { id: "CVE-2024-22116", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2024-12-04T04:55:28.879375Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2024-12-04T14:37:43.459Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unaffected", modules: [ "Server", ], product: "Zabbix", repo: "https://git.zabbix.com/", vendor: "Zabbix", versions: [ { changes: [ { at: "6.4.16rc1", status: "unaffected", }, ], lessThanOrEqual: "6.4.15", status: "affected", version: "6.4.9", versionType: "git", }, { changes: [ { at: "7.0.0rc3", status: "unaffected", }, ], lessThanOrEqual: "7.0.0rc2", status: "affected", version: "7.0.0alpha1", versionType: "git", }, ], }, ], credits: [ { lang: "en", type: "reporter", value: "Zabbix wants to thank justonezero and Qusai Alhaddad (qusaialhaddad) who submitted this report in HackerOne bug bounty platform", }, ], datePublic: "2024-06-12T12:52:00.000Z", descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "An administrator with restricted permissions can exploit the script execution functionality within the Monitoring Hosts section. The lack of default escaping for script parameters enabled this user ability to execute arbitrary code via the Ping script, thereby compromising infrastructure.", }, ], value: "An administrator with restricted permissions can exploit the script execution functionality within the Monitoring Hosts section. The lack of default escaping for script parameters enabled this user ability to execute arbitrary code via the Ping script, thereby compromising infrastructure.", }, ], impacts: [ { capecId: "CAPEC-253", descriptions: [ { lang: "en", value: "CAPEC-253 Remote Code Inclusion", }, ], }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.9, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-94", description: "CWE-94 Improper Control of Generation of Code ('Code Injection')", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2024-08-27T09:10:20.447Z", orgId: "72de3e22-0555-4a0d-ae81-9249e0f0a1e8", shortName: "Zabbix", }, references: [ { url: "https://support.zabbix.com/browse/ZBX-25016", }, ], source: { discovery: "EXTERNAL", }, title: "Remote code execution within ping script", x_generator: { engine: "Vulnogram 0.2.0", }, }, }, cveMetadata: { assignerOrgId: "72de3e22-0555-4a0d-ae81-9249e0f0a1e8", assignerShortName: "Zabbix", cveId: "CVE-2024-22116", datePublished: "2024-08-09T10:16:34.982Z", dateReserved: "2024-01-05T07:44:01.394Z", dateUpdated: "2024-12-04T14:37:43.459Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", "vulnerability-lookup:meta": { nvd: "{\"cve\":{\"id\":\"CVE-2024-22116\",\"sourceIdentifier\":\"security@zabbix.com\",\"published\":\"2024-08-12T13:38:15.863\",\"lastModified\":\"2024-12-04T15:21:51.983\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An administrator with restricted permissions can exploit the script execution functionality within the Monitoring Hosts section. The lack of default escaping for script parameters enabled this user ability to execute arbitrary code via the Ping script, thereby compromising infrastructure.\"},{\"lang\":\"es\",\"value\":\"Un administrador con permisos restringidos puede aprovechar la funcionalidad de ejecución de scripts dentro de la sección Monitoreo de hosts. La falta de un escape predeterminado para los parámetros del script permitió a este usuario ejecutar código arbitrario a través del script Ping, comprometiendo así la infraestructura.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security@zabbix.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H\",\"baseScore\":9.9,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.1,\"impactScore\":6.0},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.2,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.2,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"security@zabbix.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-94\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-94\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.4.9\",\"versionEndIncluding\":\"6.4.15\",\"matchCriteriaId\":\"F6048A1B-69B0-40A5-8E50-00DECE750C58\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zabbix:zabbix:7.0.0:alpha1:*:*:*:*:*:*\",\"matchCriteriaId\":\"93EB5757-7F98-4428-9616-C30A647A6612\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zabbix:zabbix:7.0.0:alpha2:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA00BDB5-433F-44E5-87AC-DA01C64B5DB3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zabbix:zabbix:7.0.0:alpha3:*:*:*:*:*:*\",\"matchCriteriaId\":\"98C46C92-9D86-45CD-88FE-DFBB5502BB88\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zabbix:zabbix:7.0.0:alpha4:*:*:*:*:*:*\",\"matchCriteriaId\":\"B568E6DD-A6D1-4402-BB40-7DA2596A5BC8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zabbix:zabbix:7.0.0:alpha5:*:*:*:*:*:*\",\"matchCriteriaId\":\"B9C3673B-8459-4C63-8E90-724D1D42A8BB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zabbix:zabbix:7.0.0:alpha6:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C9F6957-7526-4852-A579-DE556DBFAA97\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zabbix:zabbix:7.0.0:alpha7:*:*:*:*:*:*\",\"matchCriteriaId\":\"81A7A191-93DE-4C5D-963E-E8890FF7AACA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zabbix:zabbix:7.0.0:alpha8:*:*:*:*:*:*\",\"matchCriteriaId\":\"AEE202D5-3C88-43A5-9328-FC78D0B9B8CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zabbix:zabbix:7.0.0:alpha9:*:*:*:*:*:*\",\"matchCriteriaId\":\"F88BFB75-7951-47D5-941F-3839E9E31FFA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zabbix:zabbix:7.0.0:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"8216247E-C160-4D2C-906E-9D8CD731B5C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zabbix:zabbix:7.0.0:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"06548219-0DC3-4B5B-85D1-B1EE0FA30CD2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zabbix:zabbix:7.0.0:beta3:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D23985B-2F4D-41F6-B9D6-7B184FC7E447\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zabbix:zabbix:7.0.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"97964B9B-6A5E-4547-8886-E81B0849A876\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:zabbix:zabbix:7.0.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"40992B5F-0D83-4D5C-9188-E84C369FF92F\"}]}]}],\"references\":[{\"url\":\"https://support.zabbix.com/browse/ZBX-25016\",\"source\":\"security@zabbix.com\",\"tags\":[\"Vendor Advisory\"]}]}}", vulnrichment: { containers: "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-22116\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-12-04T04:55:28.879375Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*\"], \"vendor\": \"zabbix\", \"product\": \"zabbix\", \"versions\": [{\"status\": \"affected\", \"version\": \"6.4.9\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"6.4.15\"}, {\"status\": \"affected\", \"version\": \"7.0.0alpha1\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"7.0.0rc2\"}], \"defaultStatus\": \"unknown\"}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-08-13T14:56:30.690Z\"}}], \"cna\": {\"title\": \"Remote code execution within ping script\", \"source\": {\"discovery\": \"EXTERNAL\"}, \"credits\": [{\"lang\": \"en\", \"type\": \"reporter\", \"value\": \"Zabbix wants to thank justonezero and Qusai Alhaddad (qusaialhaddad) who submitted this report in HackerOne bug bounty platform\"}], \"impacts\": [{\"capecId\": \"CAPEC-253\", \"descriptions\": [{\"lang\": \"en\", \"value\": \"CAPEC-253 Remote Code Inclusion\"}]}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"CHANGED\", \"version\": \"3.1\", \"baseScore\": 9.9, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"CRITICAL\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"HIGH\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"repo\": \"https://git.zabbix.com/\", \"vendor\": \"Zabbix\", \"modules\": [\"Server\"], \"product\": \"Zabbix\", \"versions\": [{\"status\": \"affected\", \"changes\": [{\"at\": \"6.4.16rc1\", \"status\": \"unaffected\"}], \"version\": \"6.4.9\", \"versionType\": \"git\", \"lessThanOrEqual\": \"6.4.15\"}, {\"status\": \"affected\", \"changes\": [{\"at\": \"7.0.0rc3\", \"status\": \"unaffected\"}], \"version\": \"7.0.0alpha1\", \"versionType\": \"git\", \"lessThanOrEqual\": \"7.0.0rc2\"}], \"defaultStatus\": \"unaffected\"}], \"datePublic\": \"2024-06-12T12:52:00.000Z\", \"references\": [{\"url\": \"https://support.zabbix.com/browse/ZBX-25016\"}], \"x_generator\": {\"engine\": \"Vulnogram 0.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"An administrator with restricted permissions can exploit the script execution functionality within the Monitoring Hosts section. The lack of default escaping for script parameters enabled this user ability to execute arbitrary code via the Ping script, thereby compromising infrastructure.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"An administrator with restricted permissions can exploit the script execution functionality within the Monitoring Hosts section. The lack of default escaping for script parameters enabled this user ability to execute arbitrary code via the Ping script, thereby compromising infrastructure.\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-94\", \"description\": \"CWE-94 Improper Control of Generation of Code ('Code Injection')\"}]}], \"providerMetadata\": {\"orgId\": \"72de3e22-0555-4a0d-ae81-9249e0f0a1e8\", \"shortName\": \"Zabbix\", \"dateUpdated\": \"2024-08-27T09:10:20.447Z\"}}}", cveMetadata: "{\"cveId\": \"CVE-2024-22116\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-12-04T14:37:43.459Z\", \"dateReserved\": \"2024-01-05T07:44:01.394Z\", \"assignerOrgId\": \"72de3e22-0555-4a0d-ae81-9249e0f0a1e8\", \"datePublished\": \"2024-08-09T10:16:34.982Z\", \"assignerShortName\": \"Zabbix\"}", dataType: "CVE_RECORD", dataVersion: "5.1", }, }, }
NCSC-2024-0331
Vulnerability from csaf_ncscnl
Published
2024-08-12 10:34
Modified
2024-08-12 10:34
Summary
Kwetsbaarheden verholpen in Zabbix
Notes
The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:
NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.
NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.
This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings.
Feiten
Er zijn kwetsbaarheden verholpen in Zabbix.
Interpretaties
Een kwaadwillende kan de kwetsbaarheden misbruiken om een Denial-of-Service te veroorzaken, om toegang te krijgen tot gevoelige gegevens, of mogelijk willekeurige code uit te voeren met rechten van de applicatie.
Voor uitvoer van willekeurige code heeft de kwaadwillende voorafgaande verhoogde rechten nodig.
Oplossingen
De ontwikkelaars van Zabbix hebben updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.
Kans
medium
Schade
high
CWE-256
Plaintext Storage of a Password
CWE-770
Allocation of Resources Without Limits or Throttling
CWE-822
Untrusted Pointer Dereference
CWE-94
Improper Control of Generation of Code ('Code Injection')
{ document: { category: "csaf_security_advisory", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", }, }, lang: "nl", notes: [ { category: "legal_disclaimer", text: "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings.", }, { category: "description", text: "Er zijn kwetsbaarheden verholpen in Zabbix.", title: "Feiten", }, { category: "description", text: "Een kwaadwillende kan de kwetsbaarheden misbruiken om een Denial-of-Service te veroorzaken, om toegang te krijgen tot gevoelige gegevens, of mogelijk willekeurige code uit te voeren met rechten van de applicatie.\n\nVoor uitvoer van willekeurige code heeft de kwaadwillende voorafgaande verhoogde rechten nodig.", title: "Interpretaties", }, { category: "description", text: "De ontwikkelaars van Zabbix hebben updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.", title: "Oplossingen", }, { category: "general", text: "medium", title: "Kans", }, { category: "general", text: "high", title: "Schade", }, { category: "general", text: "Plaintext Storage of a Password", title: "CWE-256", }, { category: "general", text: "Allocation of Resources Without Limits or Throttling", title: "CWE-770", }, { category: "general", text: "Untrusted Pointer Dereference", title: "CWE-822", }, { category: "general", text: "Improper Control of Generation of Code ('Code Injection')", title: "CWE-94", }, ], publisher: { category: "coordinator", contact_details: "cert@ncsc.nl", name: "Nationaal Cyber Security Centrum", namespace: "https://www.ncsc.nl/", }, references: [ { category: "external", summary: "Reference - cveprojectv5", url: "https://support.zabbix.com/browse/ZBX-25016", }, { category: "external", summary: "Reference - cveprojectv5", url: "https://support.zabbix.com/browse/ZBX-25017", }, { category: "external", summary: "Reference - cveprojectv5", url: "https://support.zabbix.com/browse/ZBX-25018", }, { category: "external", summary: "Reference - cveprojectv5", url: "https://support.zabbix.com/browse/ZBX-25019", }, ], title: "Kwetsbaarheden verholpen in Zabbix", tracking: { current_release_date: "2024-08-12T10:34:15.273912Z", id: "NCSC-2024-0331", initial_release_date: "2024-08-12T10:34:15.273912Z", revision_history: [ { date: "2024-08-12T10:34:15.273912Z", number: "0", summary: "Initiele versie", }, ], status: "final", version: "1.0.0", }, }, product_tree: { branches: [ { branches: [ { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760413", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:6.4.4:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760414", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:6.4.5:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760415", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:6.4.6:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760679", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:6.4.7:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760682", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:6.4.8:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-1611367", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:6.4.9:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-1611463", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:7.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-1533343", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:7.0.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-966696", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:7.0.0alpha1:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-1611915", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:7.0.0rc2:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-1611373", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:7.0rc1:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-1611374", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:7.0rc2:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-1532245", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:5_0_0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760642", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:5.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-468065", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:5.0.1:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760650", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:5.0.10:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760651", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:5.0.11:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760652", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:5.0.12:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760653", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:5.0.13:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760654", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:5.0.14:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760655", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:5.0.15:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760656", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:5.0.16:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760657", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:5.0.17:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760658", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:5.0.18:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760659", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:5.0.19:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760643", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:5.0.2:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760660", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:5.0.20:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760661", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:5.0.21:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760662", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:5.0.22:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760663", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:5.0.23:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760664", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:5.0.24:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760665", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:5.0.25:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760666", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:5.0.26:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760667", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:5.0.27:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760668", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:5.0.28:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760669", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:5.0.29:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760644", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:5.0.3:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760670", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:5.0.30:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760671", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:5.0.31:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760672", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:5.0.32:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760673", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:5.0.33:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-248453", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:5.0.34:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760674", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:5.0.35:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760675", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:5.0.36:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760676", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:5.0.37:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760677", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:5.0.38:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760684", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:5.0.39:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760645", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:5.0.4:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-1611358", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:5.0.40:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-1611359", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:5.0.41:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-1611360", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:5.0.42:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760646", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:5.0.5:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760647", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:5.0.6:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760648", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:5.0.7:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760649", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:5.0.8:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-430572", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:5.0.9:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760390", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:6.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-401440", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:6.0.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760391", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:6.0.1:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760399", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:6.0.10:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760400", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:6.0.11:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760401", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:6.0.12:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760402", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:6.0.13:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760403", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:6.0.14:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760404", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:6.0.15:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760405", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:6.0.16:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-248454", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:6.0.17:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760406", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:6.0.18:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760407", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:6.0.19:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760392", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:6.0.2:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760408", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:6.0.20:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760409", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:6.0.21:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760678", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:6.0.22:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760681", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:6.0.23:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-1611361", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:6.0.24:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-1611362", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:6.0.25:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-1611363", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:6.0.26:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-966694", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:6.0.27:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-1611364", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:6.0.28:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-1611365", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:6.0.29:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760393", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:6.0.3:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-1611366", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:6.0.30:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-401441", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:6.0.4:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760394", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:6.0.5:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760395", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:6.0.6:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760396", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:6.0.7:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760397", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:6.0.8:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760398", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:6.0.9:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760410", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:6.4.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760411", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:6.4.1:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-1611368", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:6.4.10:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-1611369", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:6.4.11:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-966695", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:6.4.12:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-1611370", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:6.4.13:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-1611371", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:6.4.14:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-1611372", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:6.4.15:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-248455", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:6.4.2:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760412", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:6.4.3:*:*:*:*:*:*:*", }, }, }, ], category: "vendor", name: "zabbix", }, ], }, vulnerabilities: [ { cve: "CVE-2024-22116", cwe: { id: "CWE-94", name: "Improper Control of Generation of Code ('Code Injection')", }, notes: [ { category: "other", text: "Improper Control of Generation of Code ('Code Injection')", title: "CWE-94", }, ], product_status: { known_affected: [ "CSAFPID-760410", "CSAFPID-248455", "CSAFPID-760412", "CSAFPID-760414", "CSAFPID-760415", "CSAFPID-760679", "CSAFPID-760682", "CSAFPID-966695", "CSAFPID-1611372", "CSAFPID-966696", "CSAFPID-1611915", ], }, references: [ { category: "self", summary: "CVE-2024-22116", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22116.json", }, ], scores: [ { cvss_v3: { baseScore: 9.9, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "CSAFPID-760410", "CSAFPID-248455", "CSAFPID-760412", "CSAFPID-760414", "CSAFPID-760415", "CSAFPID-760679", "CSAFPID-760682", "CSAFPID-966695", "CSAFPID-1611372", "CSAFPID-966696", "CSAFPID-1611915", ], }, ], title: "CVE-2024-22116", }, { cve: "CVE-2024-36460", cwe: { id: "CWE-256", name: "Plaintext Storage of a Password", }, notes: [ { category: "other", text: "Plaintext Storage of a Password", title: "CWE-256", }, ], product_status: { known_affected: [ "CSAFPID-760677", "CSAFPID-760410", "CSAFPID-760673", "CSAFPID-760414", "CSAFPID-760642", "CSAFPID-966695", "CSAFPID-1611360", "CSAFPID-760681", "CSAFPID-248453", "CSAFPID-760390", "CSAFPID-760406", "CSAFPID-760684", "CSAFPID-760415", "CSAFPID-760674", "CSAFPID-1611366", "CSAFPID-760408", "CSAFPID-760403", "CSAFPID-760679", "CSAFPID-248454", "CSAFPID-760671", "CSAFPID-760402", "CSAFPID-248455", "CSAFPID-1611372", "CSAFPID-760409", "CSAFPID-760675", "CSAFPID-760682", "CSAFPID-760678", "CSAFPID-760412", "CSAFPID-966694", "CSAFPID-760405", "CSAFPID-1532245", "CSAFPID-401440", "CSAFPID-966696", "CSAFPID-1611915", ], }, references: [ { category: "self", summary: "CVE-2024-36460", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-36460.json", }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "CSAFPID-760677", "CSAFPID-760410", "CSAFPID-760673", "CSAFPID-760414", "CSAFPID-760642", "CSAFPID-966695", "CSAFPID-1611360", "CSAFPID-760681", "CSAFPID-248453", "CSAFPID-760390", "CSAFPID-760406", "CSAFPID-760684", "CSAFPID-760415", "CSAFPID-760674", "CSAFPID-1611366", "CSAFPID-760408", "CSAFPID-760403", "CSAFPID-760679", "CSAFPID-248454", "CSAFPID-760671", "CSAFPID-760402", "CSAFPID-248455", "CSAFPID-1611372", "CSAFPID-760409", "CSAFPID-760675", "CSAFPID-760682", "CSAFPID-760678", "CSAFPID-760412", "CSAFPID-966694", "CSAFPID-760405", "CSAFPID-1532245", "CSAFPID-401440", "CSAFPID-966696", "CSAFPID-1611915", ], }, ], title: "CVE-2024-36460", }, { cve: "CVE-2024-36461", cwe: { id: "CWE-822", name: "Untrusted Pointer Dereference", }, notes: [ { category: "other", text: "Untrusted Pointer Dereference", title: "CWE-822", }, ], product_status: { known_affected: [ "CSAFPID-760402", "CSAFPID-760403", "CSAFPID-760405", "CSAFPID-248454", "CSAFPID-760406", "CSAFPID-760408", "CSAFPID-760409", "CSAFPID-760678", "CSAFPID-760681", "CSAFPID-966694", "CSAFPID-1611366", "CSAFPID-760390", "CSAFPID-760410", "CSAFPID-248455", "CSAFPID-760412", "CSAFPID-760414", "CSAFPID-760415", "CSAFPID-760679", "CSAFPID-760682", "CSAFPID-966695", "CSAFPID-1611372", "CSAFPID-401440", "CSAFPID-966696", "CSAFPID-1533343", ], }, references: [ { category: "self", summary: "CVE-2024-36461", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-36461.json", }, ], scores: [ { cvss_v3: { baseScore: 9.1, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H", version: "3.1", }, products: [ "CSAFPID-760402", "CSAFPID-760403", "CSAFPID-760405", "CSAFPID-248454", "CSAFPID-760406", "CSAFPID-760408", "CSAFPID-760409", "CSAFPID-760678", "CSAFPID-760681", "CSAFPID-966694", "CSAFPID-1611366", "CSAFPID-760390", "CSAFPID-760410", "CSAFPID-248455", "CSAFPID-760412", "CSAFPID-760414", "CSAFPID-760415", "CSAFPID-760679", "CSAFPID-760682", "CSAFPID-966695", "CSAFPID-1611372", "CSAFPID-401440", "CSAFPID-966696", "CSAFPID-1533343", ], }, ], title: "CVE-2024-36461", }, { cve: "CVE-2024-36462", cwe: { id: "CWE-770", name: "Allocation of Resources Without Limits or Throttling", }, notes: [ { category: "other", text: "Allocation of Resources Without Limits or Throttling", title: "CWE-770", }, ], product_status: { known_affected: [ "CSAFPID-966696", "CSAFPID-1611915", ], }, references: [ { category: "self", summary: "CVE-2024-36462", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-36462.json", }, ], title: "CVE-2024-36462", }, ], }
ncsc-2024-0331
Vulnerability from csaf_ncscnl
Published
2024-08-12 10:34
Modified
2024-08-12 10:34
Summary
Kwetsbaarheden verholpen in Zabbix
Notes
The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:
NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.
NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.
This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings.
Feiten
Er zijn kwetsbaarheden verholpen in Zabbix.
Interpretaties
Een kwaadwillende kan de kwetsbaarheden misbruiken om een Denial-of-Service te veroorzaken, om toegang te krijgen tot gevoelige gegevens, of mogelijk willekeurige code uit te voeren met rechten van de applicatie.
Voor uitvoer van willekeurige code heeft de kwaadwillende voorafgaande verhoogde rechten nodig.
Oplossingen
De ontwikkelaars van Zabbix hebben updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.
Kans
medium
Schade
high
CWE-256
Plaintext Storage of a Password
CWE-770
Allocation of Resources Without Limits or Throttling
CWE-822
Untrusted Pointer Dereference
CWE-94
Improper Control of Generation of Code ('Code Injection')
{ document: { category: "csaf_security_advisory", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", }, }, lang: "nl", notes: [ { category: "legal_disclaimer", text: "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings.", }, { category: "description", text: "Er zijn kwetsbaarheden verholpen in Zabbix.", title: "Feiten", }, { category: "description", text: "Een kwaadwillende kan de kwetsbaarheden misbruiken om een Denial-of-Service te veroorzaken, om toegang te krijgen tot gevoelige gegevens, of mogelijk willekeurige code uit te voeren met rechten van de applicatie.\n\nVoor uitvoer van willekeurige code heeft de kwaadwillende voorafgaande verhoogde rechten nodig.", title: "Interpretaties", }, { category: "description", text: "De ontwikkelaars van Zabbix hebben updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.", title: "Oplossingen", }, { category: "general", text: "medium", title: "Kans", }, { category: "general", text: "high", title: "Schade", }, { category: "general", text: "Plaintext Storage of a Password", title: "CWE-256", }, { category: "general", text: "Allocation of Resources Without Limits or Throttling", title: "CWE-770", }, { category: "general", text: "Untrusted Pointer Dereference", title: "CWE-822", }, { category: "general", text: "Improper Control of Generation of Code ('Code Injection')", title: "CWE-94", }, ], publisher: { category: "coordinator", contact_details: "cert@ncsc.nl", name: "Nationaal Cyber Security Centrum", namespace: "https://www.ncsc.nl/", }, references: [ { category: "external", summary: "Reference - cveprojectv5", url: "https://support.zabbix.com/browse/ZBX-25016", }, { category: "external", summary: "Reference - cveprojectv5", url: "https://support.zabbix.com/browse/ZBX-25017", }, { category: "external", summary: "Reference - cveprojectv5", url: "https://support.zabbix.com/browse/ZBX-25018", }, { category: "external", summary: "Reference - cveprojectv5", url: "https://support.zabbix.com/browse/ZBX-25019", }, ], title: "Kwetsbaarheden verholpen in Zabbix", tracking: { current_release_date: "2024-08-12T10:34:15.273912Z", id: "NCSC-2024-0331", initial_release_date: "2024-08-12T10:34:15.273912Z", revision_history: [ { date: "2024-08-12T10:34:15.273912Z", number: "0", summary: "Initiele versie", }, ], status: "final", version: "1.0.0", }, }, product_tree: { branches: [ { branches: [ { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760413", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:6.4.4:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760414", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:6.4.5:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760415", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:6.4.6:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760679", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:6.4.7:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760682", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:6.4.8:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-1611367", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:6.4.9:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-1611463", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:7.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-1533343", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:7.0.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-966696", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:7.0.0alpha1:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-1611915", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:7.0.0rc2:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-1611373", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:7.0rc1:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-1611374", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:7.0rc2:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-1532245", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:5_0_0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760642", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:5.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-468065", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:5.0.1:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760650", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:5.0.10:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760651", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:5.0.11:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760652", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:5.0.12:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760653", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:5.0.13:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760654", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:5.0.14:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760655", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:5.0.15:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760656", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:5.0.16:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760657", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:5.0.17:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760658", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:5.0.18:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760659", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:5.0.19:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760643", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:5.0.2:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760660", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:5.0.20:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760661", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:5.0.21:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760662", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:5.0.22:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760663", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:5.0.23:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760664", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:5.0.24:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760665", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:5.0.25:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760666", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:5.0.26:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760667", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:5.0.27:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760668", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:5.0.28:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760669", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:5.0.29:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760644", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:5.0.3:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760670", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:5.0.30:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760671", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:5.0.31:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760672", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:5.0.32:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760673", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:5.0.33:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-248453", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:5.0.34:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760674", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:5.0.35:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760675", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:5.0.36:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760676", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:5.0.37:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760677", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:5.0.38:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760684", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:5.0.39:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760645", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:5.0.4:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-1611358", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:5.0.40:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-1611359", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:5.0.41:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-1611360", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:5.0.42:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760646", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:5.0.5:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760647", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:5.0.6:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760648", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:5.0.7:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760649", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:5.0.8:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-430572", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:5.0.9:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760390", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:6.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-401440", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:6.0.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760391", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:6.0.1:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760399", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:6.0.10:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760400", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:6.0.11:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760401", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:6.0.12:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760402", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:6.0.13:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760403", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:6.0.14:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760404", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:6.0.15:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760405", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:6.0.16:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-248454", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:6.0.17:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760406", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:6.0.18:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760407", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:6.0.19:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760392", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:6.0.2:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760408", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:6.0.20:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760409", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:6.0.21:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760678", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:6.0.22:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760681", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:6.0.23:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-1611361", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:6.0.24:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-1611362", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:6.0.25:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-1611363", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:6.0.26:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-966694", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:6.0.27:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-1611364", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:6.0.28:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-1611365", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:6.0.29:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760393", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:6.0.3:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-1611366", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:6.0.30:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-401441", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:6.0.4:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760394", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:6.0.5:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760395", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:6.0.6:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760396", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:6.0.7:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760397", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:6.0.8:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760398", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:6.0.9:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760410", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:6.4.0:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760411", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:6.4.1:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-1611368", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:6.4.10:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-1611369", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:6.4.11:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-966695", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:6.4.12:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-1611370", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:6.4.13:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-1611371", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:6.4.14:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-1611372", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:6.4.15:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-248455", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:6.4.2:*:*:*:*:*:*:*", }, }, }, { category: "product_name", name: "zabbix", product: { name: "zabbix", product_id: "CSAFPID-760412", product_identification_helper: { cpe: "cpe:2.3:a:zabbix:zabbix:6.4.3:*:*:*:*:*:*:*", }, }, }, ], category: "vendor", name: "zabbix", }, ], }, vulnerabilities: [ { cve: "CVE-2024-22116", cwe: { id: "CWE-94", name: "Improper Control of Generation of Code ('Code Injection')", }, notes: [ { category: "other", text: "Improper Control of Generation of Code ('Code Injection')", title: "CWE-94", }, ], product_status: { known_affected: [ "CSAFPID-760410", "CSAFPID-248455", "CSAFPID-760412", "CSAFPID-760414", "CSAFPID-760415", "CSAFPID-760679", "CSAFPID-760682", "CSAFPID-966695", "CSAFPID-1611372", "CSAFPID-966696", "CSAFPID-1611915", ], }, references: [ { category: "self", summary: "CVE-2024-22116", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22116.json", }, ], scores: [ { cvss_v3: { baseScore: 9.9, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, products: [ "CSAFPID-760410", "CSAFPID-248455", "CSAFPID-760412", "CSAFPID-760414", "CSAFPID-760415", "CSAFPID-760679", "CSAFPID-760682", "CSAFPID-966695", "CSAFPID-1611372", "CSAFPID-966696", "CSAFPID-1611915", ], }, ], title: "CVE-2024-22116", }, { cve: "CVE-2024-36460", cwe: { id: "CWE-256", name: "Plaintext Storage of a Password", }, notes: [ { category: "other", text: "Plaintext Storage of a Password", title: "CWE-256", }, ], product_status: { known_affected: [ "CSAFPID-760677", "CSAFPID-760410", "CSAFPID-760673", "CSAFPID-760414", "CSAFPID-760642", "CSAFPID-966695", "CSAFPID-1611360", "CSAFPID-760681", "CSAFPID-248453", "CSAFPID-760390", "CSAFPID-760406", "CSAFPID-760684", "CSAFPID-760415", "CSAFPID-760674", "CSAFPID-1611366", "CSAFPID-760408", "CSAFPID-760403", "CSAFPID-760679", "CSAFPID-248454", "CSAFPID-760671", "CSAFPID-760402", "CSAFPID-248455", "CSAFPID-1611372", "CSAFPID-760409", "CSAFPID-760675", "CSAFPID-760682", "CSAFPID-760678", "CSAFPID-760412", "CSAFPID-966694", "CSAFPID-760405", "CSAFPID-1532245", "CSAFPID-401440", "CSAFPID-966696", "CSAFPID-1611915", ], }, references: [ { category: "self", summary: "CVE-2024-36460", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-36460.json", }, ], scores: [ { cvss_v3: { baseScore: 8.1, baseSeverity: "HIGH", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", version: "3.1", }, products: [ "CSAFPID-760677", "CSAFPID-760410", "CSAFPID-760673", "CSAFPID-760414", "CSAFPID-760642", "CSAFPID-966695", "CSAFPID-1611360", "CSAFPID-760681", "CSAFPID-248453", "CSAFPID-760390", "CSAFPID-760406", "CSAFPID-760684", "CSAFPID-760415", "CSAFPID-760674", "CSAFPID-1611366", "CSAFPID-760408", "CSAFPID-760403", "CSAFPID-760679", "CSAFPID-248454", "CSAFPID-760671", "CSAFPID-760402", "CSAFPID-248455", "CSAFPID-1611372", "CSAFPID-760409", "CSAFPID-760675", "CSAFPID-760682", "CSAFPID-760678", "CSAFPID-760412", "CSAFPID-966694", "CSAFPID-760405", "CSAFPID-1532245", "CSAFPID-401440", "CSAFPID-966696", "CSAFPID-1611915", ], }, ], title: "CVE-2024-36460", }, { cve: "CVE-2024-36461", cwe: { id: "CWE-822", name: "Untrusted Pointer Dereference", }, notes: [ { category: "other", text: "Untrusted Pointer Dereference", title: "CWE-822", }, ], product_status: { known_affected: [ "CSAFPID-760402", "CSAFPID-760403", "CSAFPID-760405", "CSAFPID-248454", "CSAFPID-760406", "CSAFPID-760408", "CSAFPID-760409", "CSAFPID-760678", "CSAFPID-760681", "CSAFPID-966694", "CSAFPID-1611366", "CSAFPID-760390", "CSAFPID-760410", "CSAFPID-248455", "CSAFPID-760412", "CSAFPID-760414", "CSAFPID-760415", "CSAFPID-760679", "CSAFPID-760682", "CSAFPID-966695", "CSAFPID-1611372", "CSAFPID-401440", "CSAFPID-966696", "CSAFPID-1533343", ], }, references: [ { category: "self", summary: "CVE-2024-36461", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-36461.json", }, ], scores: [ { cvss_v3: { baseScore: 9.1, baseSeverity: "CRITICAL", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H", version: "3.1", }, products: [ "CSAFPID-760402", "CSAFPID-760403", "CSAFPID-760405", "CSAFPID-248454", "CSAFPID-760406", "CSAFPID-760408", "CSAFPID-760409", "CSAFPID-760678", "CSAFPID-760681", "CSAFPID-966694", "CSAFPID-1611366", "CSAFPID-760390", "CSAFPID-760410", "CSAFPID-248455", "CSAFPID-760412", "CSAFPID-760414", "CSAFPID-760415", "CSAFPID-760679", "CSAFPID-760682", "CSAFPID-966695", "CSAFPID-1611372", "CSAFPID-401440", "CSAFPID-966696", "CSAFPID-1533343", ], }, ], title: "CVE-2024-36461", }, { cve: "CVE-2024-36462", cwe: { id: "CWE-770", name: "Allocation of Resources Without Limits or Throttling", }, notes: [ { category: "other", text: "Allocation of Resources Without Limits or Throttling", title: "CWE-770", }, ], product_status: { known_affected: [ "CSAFPID-966696", "CSAFPID-1611915", ], }, references: [ { category: "self", summary: "CVE-2024-36462", url: "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-36462.json", }, ], title: "CVE-2024-36462", }, ], }
gsd-2024-22116
Vulnerability from gsd
Modified
2024-01-06 06:02
Details
** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
Aliases
{ gsd: { metadata: { exploitCode: "unknown", remediation: "unknown", reportConfidence: "confirmed", type: "vulnerability", }, osvSchema: { aliases: [ "CVE-2024-22116", ], id: "GSD-2024-22116", modified: "2024-01-06T06:02:13.760965Z", schema_version: "1.4.0", }, }, namespaces: { "cve.org": { CVE_data_meta: { ASSIGNER: "cve@mitre.org", ID: "CVE-2024-22116", STATE: "RESERVED", }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.", }, ], }, }, }, }
fkie_cve-2024-22116
Vulnerability from fkie_nvd
Published
2024-08-12 13:38
Modified
2024-12-04 15:21
Severity ?
9.9 (Critical) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
7.2 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
7.2 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Summary
An administrator with restricted permissions can exploit the script execution functionality within the Monitoring Hosts section. The lack of default escaping for script parameters enabled this user ability to execute arbitrary code via the Ping script, thereby compromising infrastructure.
References
▼ | URL | Tags | |
---|---|---|---|
security@zabbix.com | https://support.zabbix.com/browse/ZBX-25016 | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
zabbix | zabbix | * | |
zabbix | zabbix | 7.0.0 | |
zabbix | zabbix | 7.0.0 | |
zabbix | zabbix | 7.0.0 | |
zabbix | zabbix | 7.0.0 | |
zabbix | zabbix | 7.0.0 | |
zabbix | zabbix | 7.0.0 | |
zabbix | zabbix | 7.0.0 | |
zabbix | zabbix | 7.0.0 | |
zabbix | zabbix | 7.0.0 | |
zabbix | zabbix | 7.0.0 | |
zabbix | zabbix | 7.0.0 | |
zabbix | zabbix | 7.0.0 | |
zabbix | zabbix | 7.0.0 | |
zabbix | zabbix | 7.0.0 |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*", matchCriteriaId: "F6048A1B-69B0-40A5-8E50-00DECE750C58", versionEndIncluding: "6.4.15", versionStartIncluding: "6.4.9", vulnerable: true, }, { criteria: "cpe:2.3:a:zabbix:zabbix:7.0.0:alpha1:*:*:*:*:*:*", matchCriteriaId: "93EB5757-7F98-4428-9616-C30A647A6612", vulnerable: true, }, { criteria: "cpe:2.3:a:zabbix:zabbix:7.0.0:alpha2:*:*:*:*:*:*", matchCriteriaId: "DA00BDB5-433F-44E5-87AC-DA01C64B5DB3", vulnerable: true, }, { criteria: "cpe:2.3:a:zabbix:zabbix:7.0.0:alpha3:*:*:*:*:*:*", matchCriteriaId: "98C46C92-9D86-45CD-88FE-DFBB5502BB88", vulnerable: true, }, { criteria: "cpe:2.3:a:zabbix:zabbix:7.0.0:alpha4:*:*:*:*:*:*", matchCriteriaId: "B568E6DD-A6D1-4402-BB40-7DA2596A5BC8", vulnerable: true, }, { criteria: "cpe:2.3:a:zabbix:zabbix:7.0.0:alpha5:*:*:*:*:*:*", matchCriteriaId: "B9C3673B-8459-4C63-8E90-724D1D42A8BB", vulnerable: true, }, { criteria: "cpe:2.3:a:zabbix:zabbix:7.0.0:alpha6:*:*:*:*:*:*", matchCriteriaId: "7C9F6957-7526-4852-A579-DE556DBFAA97", vulnerable: true, }, { criteria: "cpe:2.3:a:zabbix:zabbix:7.0.0:alpha7:*:*:*:*:*:*", matchCriteriaId: "81A7A191-93DE-4C5D-963E-E8890FF7AACA", vulnerable: true, }, { criteria: "cpe:2.3:a:zabbix:zabbix:7.0.0:alpha8:*:*:*:*:*:*", matchCriteriaId: "AEE202D5-3C88-43A5-9328-FC78D0B9B8CF", vulnerable: true, }, { criteria: "cpe:2.3:a:zabbix:zabbix:7.0.0:alpha9:*:*:*:*:*:*", matchCriteriaId: "F88BFB75-7951-47D5-941F-3839E9E31FFA", vulnerable: true, }, { criteria: "cpe:2.3:a:zabbix:zabbix:7.0.0:beta1:*:*:*:*:*:*", matchCriteriaId: "8216247E-C160-4D2C-906E-9D8CD731B5C2", vulnerable: true, }, { criteria: "cpe:2.3:a:zabbix:zabbix:7.0.0:beta2:*:*:*:*:*:*", matchCriteriaId: "06548219-0DC3-4B5B-85D1-B1EE0FA30CD2", vulnerable: true, }, { criteria: "cpe:2.3:a:zabbix:zabbix:7.0.0:beta3:*:*:*:*:*:*", matchCriteriaId: "4D23985B-2F4D-41F6-B9D6-7B184FC7E447", vulnerable: true, }, { criteria: "cpe:2.3:a:zabbix:zabbix:7.0.0:rc1:*:*:*:*:*:*", matchCriteriaId: "97964B9B-6A5E-4547-8886-E81B0849A876", vulnerable: true, }, { criteria: "cpe:2.3:a:zabbix:zabbix:7.0.0:rc2:*:*:*:*:*:*", matchCriteriaId: "40992B5F-0D83-4D5C-9188-E84C369FF92F", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "An administrator with restricted permissions can exploit the script execution functionality within the Monitoring Hosts section. The lack of default escaping for script parameters enabled this user ability to execute arbitrary code via the Ping script, thereby compromising infrastructure.", }, { lang: "es", value: "Un administrador con permisos restringidos puede aprovechar la funcionalidad de ejecución de scripts dentro de la sección Monitoreo de hosts. La falta de un escape predeterminado para los parámetros del script permitió a este usuario ejecutar código arbitrario a través del script Ping, comprometiendo así la infraestructura.", }, ], id: "CVE-2024-22116", lastModified: "2024-12-04T15:21:51.983", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 9.9, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 3.1, impactScore: 6, source: "security@zabbix.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.2, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 1.2, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2024-08-12T13:38:15.863", references: [ { source: "security@zabbix.com", tags: [ "Vendor Advisory", ], url: "https://support.zabbix.com/browse/ZBX-25016", }, ], sourceIdentifier: "security@zabbix.com", vulnStatus: "Analyzed", weaknesses: [ { description: [ { lang: "en", value: "CWE-94", }, ], source: "security@zabbix.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-94", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
wid-sec-w-2024-1811
Vulnerability from csaf_certbund
Published
2024-08-11 22:00
Modified
2024-12-01 23:00
Summary
Zabbix: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Zabbix ist ein Open-Source Netzwerk-Monitoringsystem.
Angriff
Ein Angreifer kann mehrere Schwachstellen in Zabbix ausnutzen, um Informationen offenzulegen, Dateien zu manipulieren, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand zu verursachen oder beliebigen Code auszuführen.
Betroffene Betriebssysteme
- Linux
- Sonstiges
{ document: { aggregate_severity: { text: "hoch", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "Zabbix ist ein Open-Source Netzwerk-Monitoringsystem.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein Angreifer kann mehrere Schwachstellen in Zabbix ausnutzen, um Informationen offenzulegen, Dateien zu manipulieren, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand zu verursachen oder beliebigen Code auszuführen.", title: "Angriff", }, { category: "general", text: "- Linux\n- Sonstiges", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2024-1811 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1811.json", }, { category: "self", summary: "WID-SEC-2024-1811 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1811", }, { category: "external", summary: "Zabbix Bugs ans Issues vom 2024-08-11", url: "https://support.zabbix.com/browse/ZBX-25011", }, { category: "external", summary: "Zabbix Bugs ans Issues vom 2024-08-11", url: "https://support.zabbix.com/browse/ZBX-25012", }, { category: "external", summary: "Zabbix Bugs ans Issues vom 2024-08-11", url: "https://support.zabbix.com/browse/ZBX-25013", }, { category: "external", summary: "Zabbix Bugs ans Issues vom 2024-08-11", url: "https://support.zabbix.com/browse/ZBX-25015", }, { category: "external", summary: "Zabbix Bugs ans Issues vom 2024-08-11", url: "https://support.zabbix.com/browse/ZBX-25016", }, { category: "external", summary: "Zabbix Bugs ans Issues vom 2024-08-11", url: "https://support.zabbix.com/browse/ZBX-25017", }, { category: "external", summary: "Zabbix Bugs ans Issues vom 2024-08-11", url: "https://support.zabbix.com/browse/ZBX-25018", }, { category: "external", summary: "Zabbix Bugs ans Issues vom 2024-08-11", url: "https://support.zabbix.com/browse/ZBX-25019", }, { category: "external", summary: "Fedora Security Advisory FEDORA-EPEL-2024-0214E32CB7 vom 2024-08-15", url: "https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2024-0214e32cb7", }, { category: "external", summary: "Fedora Security Advisory FEDORA-2024-8382D1B267 vom 2024-08-15", url: "https://bodhi.fedoraproject.org/updates/FEDORA-2024-8382d1b267", }, { category: "external", summary: "Fedora Security Advisory FEDORA-EPEL-2024-E76322A49B vom 2024-08-15", url: "https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2024-e76322a49b", }, { category: "external", summary: "Fedora Security Advisory FEDORA-2024-C89D2ECDEA vom 2024-08-15", url: "https://bodhi.fedoraproject.org/updates/FEDORA-2024-c89d2ecdea", }, { category: "external", summary: "openSUSE Security Update OPENSUSE-SU-2024:14356-1 vom 2024-09-22", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3PD6B3LKRPYC75TREXWUSOIW63MKTVPM/", }, { category: "external", summary: "Debian Security Advisory DLA-3909 vom 2024-10-03", url: "https://lists.debian.org/debian-lts-announce/2024/10/msg00000.html", }, { category: "external", summary: "openSUSE Security Update OPENSUSE-SU-2024:0384-1 vom 2024-12-01", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C6HFPCXWPBUGZ3BE7T5OXXTSGEHUCHFU/", }, ], source_lang: "en-US", title: "Zabbix: Mehrere Schwachstellen", tracking: { current_release_date: "2024-12-01T23:00:00.000+00:00", generator: { date: "2024-12-02T09:04:00.950+00:00", engine: { name: "BSI-WID", version: "1.3.8", }, }, id: "WID-SEC-W-2024-1811", initial_release_date: "2024-08-11T22:00:00.000+00:00", revision_history: [ { date: "2024-08-11T22:00:00.000+00:00", number: "1", summary: "Initiale Fassung", }, { date: "2024-08-15T22:00:00.000+00:00", number: "2", summary: "Neue Updates von Fedora aufgenommen", }, { date: "2024-09-22T22:00:00.000+00:00", number: "3", summary: "Neue Updates von openSUSE aufgenommen", }, { date: "2024-10-03T22:00:00.000+00:00", number: "4", summary: "Neue Updates von Debian aufgenommen", }, { date: "2024-12-01T23:00:00.000+00:00", number: "5", summary: "Neue Updates von openSUSE aufgenommen", }, ], status: "final", version: "5", }, }, product_tree: { branches: [ { branches: [ { category: "product_name", name: "Debian Linux", product: { name: "Debian Linux", product_id: "2951", product_identification_helper: { cpe: "cpe:/o:debian:debian_linux:-", }, }, }, ], category: "vendor", name: "Debian", }, { branches: [ { category: "product_name", name: "Fedora Linux", product: { name: "Fedora Linux", product_id: "74185", product_identification_helper: { cpe: "cpe:/o:fedoraproject:fedora:-", }, }, }, ], category: "vendor", name: "Fedora", }, { branches: [ { category: "product_name", name: "SUSE openSUSE", product: { name: "SUSE openSUSE", product_id: "T027843", product_identification_helper: { cpe: "cpe:/o:suse:opensuse:-", }, }, }, ], category: "vendor", name: "SUSE", }, { branches: [ { branches: [ { category: "product_version_range", name: "<5.0.43rc1", product: { name: "Zabbix Zabbix <5.0.43rc1", product_id: "T036718", }, }, { category: "product_version", name: "5.0.43rc1", product: { name: "Zabbix Zabbix 5.0.43rc1", product_id: "T036718-fixed", product_identification_helper: { cpe: "cpe:/a:zabbix:zabbix:5.0.43rc1", }, }, }, { category: "product_version_range", name: "<6.0.31rc1", product: { name: "Zabbix Zabbix <6.0.31rc1", product_id: "T036719", }, }, { category: "product_version", name: "6.0.31rc1", product: { name: "Zabbix Zabbix 6.0.31rc1", product_id: "T036719-fixed", product_identification_helper: { cpe: "cpe:/a:zabbix:zabbix:6.0.31rc1", }, }, }, { category: "product_version_range", name: "<6.4.16rc1", product: { name: "Zabbix Zabbix <6.4.16rc1", product_id: "T036720", }, }, { category: "product_version", name: "6.4.16rc1", product: { name: "Zabbix Zabbix 6.4.16rc1", product_id: "T036720-fixed", product_identification_helper: { cpe: "cpe:/a:zabbix:zabbix:6.4.16rc1", }, }, }, { category: "product_version_range", name: "<7.0.0rc3", product: { name: "Zabbix Zabbix <7.0.0rc3", product_id: "T036721", }, }, { category: "product_version", name: "7.0.0rc3", product: { name: "Zabbix Zabbix 7.0.0rc3", product_id: "T036721-fixed", product_identification_helper: { cpe: "cpe:/a:zabbix:zabbix:7.0.0rc3", }, }, }, ], category: "product_name", name: "Zabbix", }, ], category: "vendor", name: "Zabbix", }, ], }, vulnerabilities: [ { cve: "CVE-2024-22114", notes: [ { category: "description", text: "Es besteht eine Schwachstelle in Zabbix. Dieser Fehler besteht im Systeminformations-Widget im Global View Dashboard, mit dem die Anzahl der Hosts und andere Statistiken angezeigt werden können. Ein entfernter authentifizierter Angreifer kann diese Schwachstelle ausnutzen, um vertrauliche Informationen offenzulegen.", }, ], product_status: { known_affected: [ "T036718", "2951", "T027843", "T036720", "T036721", "T036719", "74185", ], }, release_date: "2024-08-11T22:00:00.000+00:00", title: "CVE-2024-22114", }, { cve: "CVE-2024-22116", notes: [ { category: "description", text: "Es besteht eine Schwachstelle in Zabbix. Dieser Fehler besteht in der Sektion Monitoring Hosts aufgrund eines Code-Injektionsproblems. Ein entfernter authentifizierter Angreifer kann diese Schwachstelle zur Ausführung von beliebigem Code ausnutzen.", }, ], product_status: { known_affected: [ "T036718", "2951", "T027843", "T036720", "T036721", "T036719", "74185", ], }, release_date: "2024-08-11T22:00:00.000+00:00", title: "CVE-2024-22116", }, { cve: "CVE-2024-22121", notes: [ { category: "description", text: "Es besteht eine Schwachstelle in Zabbix. Dieser Fehler besteht im Agent MSI Installer und erlaubt es, wichtige Funktionen zu verändern oder zu entfernen. Ein lokaler Angreifer kann diese Schwachstelle ausnutzen, um Daten zu manipulieren.", }, ], product_status: { known_affected: [ "T036718", "2951", "T027843", "T036720", "T036721", "T036719", "74185", ], }, release_date: "2024-08-11T22:00:00.000+00:00", title: "CVE-2024-22121", }, { cve: "CVE-2024-22122", notes: [ { category: "description", text: "Es besteht eine Schwachstelle in Zabbix. Dieser Fehler besteht aufgrund einer fehlenden Validierung des Feldes \"Number\", die es ermöglicht, einen SMS-Test mit einer speziell gestalteten Telefonnummer durchzuführen und zusätzliche AT-Befehle auf dem Modem auszuführen. Ein entfernter authentifizierter Angreifer kann diese Schwachstelle ausnutzen, um Sicherheitsmaßnahmen zu umgehen.", }, ], product_status: { known_affected: [ "T036718", "2951", "T027843", "T036720", "T036721", "T036719", "74185", ], }, release_date: "2024-08-11T22:00:00.000+00:00", title: "CVE-2024-22122", }, { cve: "CVE-2024-22123", notes: [ { category: "description", text: "Es besteht eine Schwachstelle in Zabbix. Dieser Fehler besteht aufgrund einer unsachgemäßen Struktur von Linux-Geräten, die es erlaubt, eine andere Datei als Server festzulegen, was dazu führt, dass Teile des Inhalts von Protokolldateien an die Benutzeroberfläche weitergegeben werden. Ein entfernter authentifizierter Angreifer kann diese Schwachstelle ausnutzen, um vertrauliche Informationen offenzulegen.", }, ], product_status: { known_affected: [ "T036718", "2951", "T027843", "T036720", "T036721", "T036719", "74185", ], }, release_date: "2024-08-11T22:00:00.000+00:00", title: "CVE-2024-22123", }, { cve: "CVE-2024-36460", notes: [ { category: "description", text: "Es besteht eine Schwachstelle in Zabbix. Dieser Fehler besteht in den Front-End-Audit-Protokollen, da sie Passwörter ungeschützt im Klartext speichern. Ein entfernter authentifizierter Angreifer kann diese Schwachstelle ausnutzen, um vertrauliche Informationen offenzulegen.", }, ], product_status: { known_affected: [ "T036718", "2951", "T027843", "T036720", "T036721", "T036719", "74185", ], }, release_date: "2024-08-11T22:00:00.000+00:00", title: "CVE-2024-36460", }, { cve: "CVE-2024-36461", notes: [ { category: "description", text: "Es besteht eine Schwachstelle in Zabbix. Dieser Fehler besteht aufgrund einer nicht vertrauenswürdigen Zeiger-Dereferenz, die es erlaubt, Speicherzeiger in der JavaScript-Engine zu verändern. Ein entfernter authentifizierter Angreifer kann diese Schwachstelle zur Ausführung von beliebigem Code ausnutzen.", }, ], product_status: { known_affected: [ "T036718", "2951", "T027843", "T036720", "T036721", "T036719", "74185", ], }, release_date: "2024-08-11T22:00:00.000+00:00", title: "CVE-2024-36461", }, { cve: "CVE-2024-36462", notes: [ { category: "description", text: "Es besteht eine Schwachstelle in Zabbix, die auf einen unkontrollierten Ressourcenverbrauch zurückzuführen ist. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen.", }, ], product_status: { known_affected: [ "T036718", "2951", "T027843", "T036720", "T036721", "T036719", "74185", ], }, release_date: "2024-08-11T22:00:00.000+00:00", title: "CVE-2024-36462", }, ], }
WID-SEC-W-2024-1811
Vulnerability from csaf_certbund
Published
2024-08-11 22:00
Modified
2024-12-01 23:00
Summary
Zabbix: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Zabbix ist ein Open-Source Netzwerk-Monitoringsystem.
Angriff
Ein Angreifer kann mehrere Schwachstellen in Zabbix ausnutzen, um Informationen offenzulegen, Dateien zu manipulieren, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand zu verursachen oder beliebigen Code auszuführen.
Betroffene Betriebssysteme
- Linux
- Sonstiges
{ document: { aggregate_severity: { text: "hoch", }, category: "csaf_base", csaf_version: "2.0", distribution: { tlp: { label: "WHITE", url: "https://www.first.org/tlp/", }, }, lang: "de-DE", notes: [ { category: "legal_disclaimer", text: "Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.", }, { category: "description", text: "Zabbix ist ein Open-Source Netzwerk-Monitoringsystem.", title: "Produktbeschreibung", }, { category: "summary", text: "Ein Angreifer kann mehrere Schwachstellen in Zabbix ausnutzen, um Informationen offenzulegen, Dateien zu manipulieren, Sicherheitsmaßnahmen zu umgehen, einen Denial-of-Service-Zustand zu verursachen oder beliebigen Code auszuführen.", title: "Angriff", }, { category: "general", text: "- Linux\n- Sonstiges", title: "Betroffene Betriebssysteme", }, ], publisher: { category: "other", contact_details: "csaf-provider@cert-bund.de", name: "Bundesamt für Sicherheit in der Informationstechnik", namespace: "https://www.bsi.bund.de", }, references: [ { category: "self", summary: "WID-SEC-W-2024-1811 - CSAF Version", url: "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1811.json", }, { category: "self", summary: "WID-SEC-2024-1811 - Portal Version", url: "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1811", }, { category: "external", summary: "Zabbix Bugs ans Issues vom 2024-08-11", url: "https://support.zabbix.com/browse/ZBX-25011", }, { category: "external", summary: "Zabbix Bugs ans Issues vom 2024-08-11", url: "https://support.zabbix.com/browse/ZBX-25012", }, { category: "external", summary: "Zabbix Bugs ans Issues vom 2024-08-11", url: "https://support.zabbix.com/browse/ZBX-25013", }, { category: "external", summary: "Zabbix Bugs ans Issues vom 2024-08-11", url: "https://support.zabbix.com/browse/ZBX-25015", }, { category: "external", summary: "Zabbix Bugs ans Issues vom 2024-08-11", url: "https://support.zabbix.com/browse/ZBX-25016", }, { category: "external", summary: "Zabbix Bugs ans Issues vom 2024-08-11", url: "https://support.zabbix.com/browse/ZBX-25017", }, { category: "external", summary: "Zabbix Bugs ans Issues vom 2024-08-11", url: "https://support.zabbix.com/browse/ZBX-25018", }, { category: "external", summary: "Zabbix Bugs ans Issues vom 2024-08-11", url: "https://support.zabbix.com/browse/ZBX-25019", }, { category: "external", summary: "Fedora Security Advisory FEDORA-EPEL-2024-0214E32CB7 vom 2024-08-15", url: "https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2024-0214e32cb7", }, { category: "external", summary: "Fedora Security Advisory FEDORA-2024-8382D1B267 vom 2024-08-15", url: "https://bodhi.fedoraproject.org/updates/FEDORA-2024-8382d1b267", }, { category: "external", summary: "Fedora Security Advisory FEDORA-EPEL-2024-E76322A49B vom 2024-08-15", url: "https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2024-e76322a49b", }, { category: "external", summary: "Fedora Security Advisory FEDORA-2024-C89D2ECDEA vom 2024-08-15", url: "https://bodhi.fedoraproject.org/updates/FEDORA-2024-c89d2ecdea", }, { category: "external", summary: "openSUSE Security Update OPENSUSE-SU-2024:14356-1 vom 2024-09-22", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3PD6B3LKRPYC75TREXWUSOIW63MKTVPM/", }, { category: "external", summary: "Debian Security Advisory DLA-3909 vom 2024-10-03", url: "https://lists.debian.org/debian-lts-announce/2024/10/msg00000.html", }, { category: "external", summary: "openSUSE Security Update OPENSUSE-SU-2024:0384-1 vom 2024-12-01", url: "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/C6HFPCXWPBUGZ3BE7T5OXXTSGEHUCHFU/", }, ], source_lang: "en-US", title: "Zabbix: Mehrere Schwachstellen", tracking: { current_release_date: "2024-12-01T23:00:00.000+00:00", generator: { date: "2024-12-02T09:04:00.950+00:00", engine: { name: "BSI-WID", version: "1.3.8", }, }, id: "WID-SEC-W-2024-1811", initial_release_date: "2024-08-11T22:00:00.000+00:00", revision_history: [ { date: "2024-08-11T22:00:00.000+00:00", number: "1", summary: "Initiale Fassung", }, { date: "2024-08-15T22:00:00.000+00:00", number: "2", summary: "Neue Updates von Fedora aufgenommen", }, { date: "2024-09-22T22:00:00.000+00:00", number: "3", summary: "Neue Updates von openSUSE aufgenommen", }, { date: "2024-10-03T22:00:00.000+00:00", number: "4", summary: "Neue Updates von Debian aufgenommen", }, { date: "2024-12-01T23:00:00.000+00:00", number: "5", summary: "Neue Updates von openSUSE aufgenommen", }, ], status: "final", version: "5", }, }, product_tree: { branches: [ { branches: [ { category: "product_name", name: "Debian Linux", product: { name: "Debian Linux", product_id: "2951", product_identification_helper: { cpe: "cpe:/o:debian:debian_linux:-", }, }, }, ], category: "vendor", name: "Debian", }, { branches: [ { category: "product_name", name: "Fedora Linux", product: { name: "Fedora Linux", product_id: "74185", product_identification_helper: { cpe: "cpe:/o:fedoraproject:fedora:-", }, }, }, ], category: "vendor", name: "Fedora", }, { branches: [ { category: "product_name", name: "SUSE openSUSE", product: { name: "SUSE openSUSE", product_id: "T027843", product_identification_helper: { cpe: "cpe:/o:suse:opensuse:-", }, }, }, ], category: "vendor", name: "SUSE", }, { branches: [ { branches: [ { category: "product_version_range", name: "<5.0.43rc1", product: { name: "Zabbix Zabbix <5.0.43rc1", product_id: "T036718", }, }, { category: "product_version", name: "5.0.43rc1", product: { name: "Zabbix Zabbix 5.0.43rc1", product_id: "T036718-fixed", product_identification_helper: { cpe: "cpe:/a:zabbix:zabbix:5.0.43rc1", }, }, }, { category: "product_version_range", name: "<6.0.31rc1", product: { name: "Zabbix Zabbix <6.0.31rc1", product_id: "T036719", }, }, { category: "product_version", name: "6.0.31rc1", product: { name: "Zabbix Zabbix 6.0.31rc1", product_id: "T036719-fixed", product_identification_helper: { cpe: "cpe:/a:zabbix:zabbix:6.0.31rc1", }, }, }, { category: "product_version_range", name: "<6.4.16rc1", product: { name: "Zabbix Zabbix <6.4.16rc1", product_id: "T036720", }, }, { category: "product_version", name: "6.4.16rc1", product: { name: "Zabbix Zabbix 6.4.16rc1", product_id: "T036720-fixed", product_identification_helper: { cpe: "cpe:/a:zabbix:zabbix:6.4.16rc1", }, }, }, { category: "product_version_range", name: "<7.0.0rc3", product: { name: "Zabbix Zabbix <7.0.0rc3", product_id: "T036721", }, }, { category: "product_version", name: "7.0.0rc3", product: { name: "Zabbix Zabbix 7.0.0rc3", product_id: "T036721-fixed", product_identification_helper: { cpe: "cpe:/a:zabbix:zabbix:7.0.0rc3", }, }, }, ], category: "product_name", name: "Zabbix", }, ], category: "vendor", name: "Zabbix", }, ], }, vulnerabilities: [ { cve: "CVE-2024-22114", notes: [ { category: "description", text: "Es besteht eine Schwachstelle in Zabbix. Dieser Fehler besteht im Systeminformations-Widget im Global View Dashboard, mit dem die Anzahl der Hosts und andere Statistiken angezeigt werden können. Ein entfernter authentifizierter Angreifer kann diese Schwachstelle ausnutzen, um vertrauliche Informationen offenzulegen.", }, ], product_status: { known_affected: [ "T036718", "2951", "T027843", "T036720", "T036721", "T036719", "74185", ], }, release_date: "2024-08-11T22:00:00.000+00:00", title: "CVE-2024-22114", }, { cve: "CVE-2024-22116", notes: [ { category: "description", text: "Es besteht eine Schwachstelle in Zabbix. Dieser Fehler besteht in der Sektion Monitoring Hosts aufgrund eines Code-Injektionsproblems. Ein entfernter authentifizierter Angreifer kann diese Schwachstelle zur Ausführung von beliebigem Code ausnutzen.", }, ], product_status: { known_affected: [ "T036718", "2951", "T027843", "T036720", "T036721", "T036719", "74185", ], }, release_date: "2024-08-11T22:00:00.000+00:00", title: "CVE-2024-22116", }, { cve: "CVE-2024-22121", notes: [ { category: "description", text: "Es besteht eine Schwachstelle in Zabbix. Dieser Fehler besteht im Agent MSI Installer und erlaubt es, wichtige Funktionen zu verändern oder zu entfernen. Ein lokaler Angreifer kann diese Schwachstelle ausnutzen, um Daten zu manipulieren.", }, ], product_status: { known_affected: [ "T036718", "2951", "T027843", "T036720", "T036721", "T036719", "74185", ], }, release_date: "2024-08-11T22:00:00.000+00:00", title: "CVE-2024-22121", }, { cve: "CVE-2024-22122", notes: [ { category: "description", text: "Es besteht eine Schwachstelle in Zabbix. Dieser Fehler besteht aufgrund einer fehlenden Validierung des Feldes \"Number\", die es ermöglicht, einen SMS-Test mit einer speziell gestalteten Telefonnummer durchzuführen und zusätzliche AT-Befehle auf dem Modem auszuführen. Ein entfernter authentifizierter Angreifer kann diese Schwachstelle ausnutzen, um Sicherheitsmaßnahmen zu umgehen.", }, ], product_status: { known_affected: [ "T036718", "2951", "T027843", "T036720", "T036721", "T036719", "74185", ], }, release_date: "2024-08-11T22:00:00.000+00:00", title: "CVE-2024-22122", }, { cve: "CVE-2024-22123", notes: [ { category: "description", text: "Es besteht eine Schwachstelle in Zabbix. Dieser Fehler besteht aufgrund einer unsachgemäßen Struktur von Linux-Geräten, die es erlaubt, eine andere Datei als Server festzulegen, was dazu führt, dass Teile des Inhalts von Protokolldateien an die Benutzeroberfläche weitergegeben werden. Ein entfernter authentifizierter Angreifer kann diese Schwachstelle ausnutzen, um vertrauliche Informationen offenzulegen.", }, ], product_status: { known_affected: [ "T036718", "2951", "T027843", "T036720", "T036721", "T036719", "74185", ], }, release_date: "2024-08-11T22:00:00.000+00:00", title: "CVE-2024-22123", }, { cve: "CVE-2024-36460", notes: [ { category: "description", text: "Es besteht eine Schwachstelle in Zabbix. Dieser Fehler besteht in den Front-End-Audit-Protokollen, da sie Passwörter ungeschützt im Klartext speichern. Ein entfernter authentifizierter Angreifer kann diese Schwachstelle ausnutzen, um vertrauliche Informationen offenzulegen.", }, ], product_status: { known_affected: [ "T036718", "2951", "T027843", "T036720", "T036721", "T036719", "74185", ], }, release_date: "2024-08-11T22:00:00.000+00:00", title: "CVE-2024-36460", }, { cve: "CVE-2024-36461", notes: [ { category: "description", text: "Es besteht eine Schwachstelle in Zabbix. Dieser Fehler besteht aufgrund einer nicht vertrauenswürdigen Zeiger-Dereferenz, die es erlaubt, Speicherzeiger in der JavaScript-Engine zu verändern. Ein entfernter authentifizierter Angreifer kann diese Schwachstelle zur Ausführung von beliebigem Code ausnutzen.", }, ], product_status: { known_affected: [ "T036718", "2951", "T027843", "T036720", "T036721", "T036719", "74185", ], }, release_date: "2024-08-11T22:00:00.000+00:00", title: "CVE-2024-36461", }, { cve: "CVE-2024-36462", notes: [ { category: "description", text: "Es besteht eine Schwachstelle in Zabbix, die auf einen unkontrollierten Ressourcenverbrauch zurückzuführen ist. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen.", }, ], product_status: { known_affected: [ "T036718", "2951", "T027843", "T036720", "T036721", "T036719", "74185", ], }, release_date: "2024-08-11T22:00:00.000+00:00", title: "CVE-2024-36462", }, ], }
ghsa-3wch-5xm2-547f
Vulnerability from github
Published
2024-08-12 15:30
Modified
2024-08-12 15:30
Severity ?
Details
An administrator with restricted permissions can exploit the script execution functionality within the Monitoring Hosts section. The lack of default escaping for script parameters enabled this user ability to execute arbitrary code via the Ping script, thereby compromising infrastructure.
{ affected: [], aliases: [ "CVE-2024-22116", ], database_specific: { cwe_ids: [ "CWE-94", ], github_reviewed: false, github_reviewed_at: null, nvd_published_at: "2024-08-12T13:38:15Z", severity: "CRITICAL", }, details: "An administrator with restricted permissions can exploit the script execution functionality within the Monitoring Hosts section. The lack of default escaping for script parameters enabled this user ability to execute arbitrary code via the Ping script, thereby compromising infrastructure.", id: "GHSA-3wch-5xm2-547f", modified: "2024-08-12T15:30:49Z", published: "2024-08-12T15:30:48Z", references: [ { type: "ADVISORY", url: "https://nvd.nist.gov/vuln/detail/CVE-2024-22116", }, { type: "WEB", url: "https://support.zabbix.com/browse/ZBX-25016", }, ], schema_version: "1.4.0", severity: [ { score: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", type: "CVSS_V3", }, ], }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.