CVE-2022-23133

See a problem?
Source
https://nvd.nist.gov/vuln/detail/CVE-2022-23133
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-23133.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-23133
Related
Published
2022-01-13T16:15:08Z
Modified
2024-10-03T19:55:01.245620Z
Severity
  • 5.4 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
[none]
Details

An authenticated user can create a hosts group from the configuration with XSS payload, which will be available for other users. When XSS is stored by an authenticated malicious actor and other users try to search for groups during new host creation, the XSS payload will fire and the actor can steal session cookies and perform session hijacking to impersonate users or take over their accounts.

References

Affected packages

Debian:11 / zabbix

Package

Name
zabbix
Purl
pkg:deb/debian/zabbix?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:5.0.44+dfsg-1+deb11u1

Affected versions

1:5.*

1:5.0.8+dfsg-1
1:5.0.14+dfsg-1~bpo11+1
1:5.0.14+dfsg-1
1:5.0.17+dfsg-1~bpo11+1
1:5.0.17+dfsg-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / zabbix

Package

Name
zabbix
Purl
pkg:deb/debian/zabbix?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:6.0.7+dfsg-2

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / zabbix

Package

Name
zabbix
Purl
pkg:deb/debian/zabbix?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:6.0.7+dfsg-2

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Git / github.com/zabbix/zabbix

Affected ranges

Type
GIT
Repo
https://github.com/zabbix/zabbix
Events

Affected versions

5.*

5.0.0
5.0.1
5.0.10
5.0.10rc1
5.0.11
5.0.11rc1
5.0.12
5.0.12rc1
5.0.13
5.0.13rc1
5.0.14
5.0.14rc1
5.0.15
5.0.15rc1
5.0.16
5.0.16rc1
5.0.16rc2
5.0.17
5.0.17rc1
5.0.18
5.0.18rc1
5.0.1rc1
5.0.2
5.0.2rc1
5.0.3
5.0.3.rc2
5.0.3rc1
5.0.3rc2
5.0.4
5.0.4rc1
5.0.5
5.0.5rc1
5.0.6
5.0.6rc1
5.0.7
5.0.7rc1
5.0.8
5.0.8rc1
5.0.9
5.0.9rc1
5.0.9rc2

6.*

6.0.0alpha1