After the initial setup process, some steps of setup.php file are reachable not only by super-administrators, but by unauthenticated users as well. Malicious actor can pass step checks and potentially change the configuration of Zabbix Frontend.
{
"versions": [
{
"introduced": "0"
},
{
"last_affected": "6.0.0-alpha1"
},
{
"introduced": "0"
},
{
"last_affected": "6.0.0-alpha2"
},
{
"introduced": "0"
},
{
"last_affected": "6.0.0-alpha3"
},
{
"introduced": "0"
},
{
"last_affected": "6.0.0-alpha4"
},
{
"introduced": "0"
},
{
"last_affected": "6.0.0-alpha5"
},
{
"introduced": "0"
},
{
"last_affected": "6.0.0-alpha6"
},
{
"introduced": "0"
},
{
"last_affected": "6.0.0-alpha7"
},
{
"introduced": "0"
},
{
"last_affected": "6.0.0-beta1"
}
]
}"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-23134.json"
[
{
"events": [
{
"introduced": "5.4.0"
},
{
"last_affected": "5.4.8"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "34"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "35"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "9.0"
}
]
}
]