Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).
CVE-2019-17382 — Authorization Bypass Through User-Controlled Key in Zabbix
Severity
9.1CRITICALNVD
EPSS
93.7%
top 0.15%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedOct 9
Latest updateMay 24
Description
An issue was discovered in zabbix.php?action=dashboard.view&dashboardid=1 in Zabbix through 4.4. An attacker can bypass the login page and access the dashboard page, and then create a Dashboard, Report, Screen, or Map without any Username/Password (i.e., anonymously). All created elements (Dashboard/Report/Screen/Map) are accessible by other users and by an admin.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:NExploitability: 3.9 | Impact: 5.2
Affected Packages3 packages
🔴Vulnerability Details
2💥Exploits & PoCs
2Nuclei▶
Zabbix <=4.4 - Authentication Bypass
📋Vendor Advisories
1Debian▶
CVE-2019-17382: zabbix - An issue was discovered in zabbix.php?action=dashboard.view&dashboardid=1 in Zab...↗2019
💬Community
5Bugzilla
▶
Bugzilla▶
CVE-2019-17382 zabbix: authentication bypass allows access to dashboard page [fedora-all]↗2019-11-18
Bugzilla
▶
Bugzilla
▶