CVE-2024-36466Authentication Bypass by Spoofing in Zabbix

Severity
8.8HIGHNVD
EPSS
0.2%
top 59.44%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedNov 28

Description

A bug in the code allows an attacker to sign a forged zbx_session cookie, which then allows them to sign in with admin permissions.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages3 packages

NVDzabbix/zabbix6.0.06.0.32+2
Debianzabbix/zabbix< 1:7.0.1+dfsg-1+1
CVEListV5zabbix/zabbix6.0.06.0.31+2

🔴Vulnerability Details

3
OSV
CVE-2024-36466: A bug in the code allows an attacker to sign a forged zbx_session cookie, which then allows them to sign in with admin permissions2024-11-28
CVEList
Unauthenticated Zabbix frontend takeover when SSO is being used2024-11-28
GHSA
GHSA-23gg-m473-8fr9: A bug in the code allows an attacker to sign a forged zbx_session cookie, which then allows them to sign in with admin permissions2024-11-28

📋Vendor Advisories

1
Debian
CVE-2024-36466: zabbix - A bug in the code allows an attacker to sign a forged zbx_session cookie, which ...2024