CVE-2022-40626

Source
https://cve.org/CVERecord?id=CVE-2022-40626
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-40626.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-40626
Downstream
Published
2022-09-14T11:15:53.473Z
Modified
2026-03-14T11:53:49.046179Z
Severity
  • 6.1 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
[none]
Details

An unauthenticated user can create a link with reflected Javascript code inside the backurl parameter and send it to other authenticated users in order to create a fake account with predefined login, password and role in Zabbix Frontend.

References

Affected packages

Git / github.com/zabbix/zabbix

Affected ranges

Type
GIT
Repo
https://github.com/zabbix/zabbix
Events
Database specific
{
    "versions": [
        {
            "introduced": "6.0.0"
        },
        {
            "last_affected": "6.0.6"
        }
    ]
}

Affected versions

6.*
6.0.0
6.0.1
6.0.1rc1
6.0.1rc2
6.0.1rc3
6.0.1rc4
6.0.2
6.0.2rc1
6.0.3
6.0.3rc1
6.0.4
6.0.4rc1
6.0.5
6.0.5rc1
6.0.6
6.0.6rc1

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-40626.json"
unresolved_ranges
[
    {
        "events": [
            {
                "introduced": "0"
            },
            {
                "last_affected": "6.2.0"
            }
        ]
    },
    {
        "events": [
            {
                "introduced": "0"
            },
            {
                "last_affected": "37"
            }
        ]
    }
]