CVE-2022-24349Cross-site Scripting in Frontend

Severity
4.4MEDIUMNVD
CNA4.6
EPSS
0.8%
top 25.10%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 9
Latest updateMar 10

Description

An authenticated user can create a link with reflected XSS payload for actions’ pages, and send it to other users. Malicious code has access to all the same objects as the rest of the web page and can make arbitrary modifications to the contents of the page being displayed to a victim. This attack can be implemented with the help of social engineering and expiration of a number of factors - an attacker should have authorized access to the Zabbix Frontend and allowed network connection between a

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:NExploitability: 1.3 | Impact: 2.7

Affected Packages3 packages

NVDzabbix/frontend4.0.04.0.38+3
CVEListV5zabbix/frontend4 versions+3
Debianzabbix/zabbix< 1:5.0.44+dfsg-1+deb11u1+3

Also affects: Debian Linux 9.0, Fedora 34, 35

Patches

🔴Vulnerability Details

3
GHSA
GHSA-vv83-2f3m-pvxg: An authenticated user can create a link with reflected XSS payload for actions’ pages, and send it to other users2022-03-10
OSV
CVE-2022-24349: An authenticated user can create a link with reflected XSS payload for actions’ pages, and send it to other users2022-03-09
CVEList
Reflected XSS in action configuration window of Zabbix Frontend2022-03-09

📋Vendor Advisories

1
Debian
CVE-2022-24349: zabbix - An authenticated user can create a link with reflected XSS payload for actions’ ...2022
CVE-2022-24349 — Cross-site Scripting in Frontend | cvebase