The endpoint /zabbix.php?action=export.valuemaps suffers from a Cross-Site Scripting vulnerability via the backurl parameter. This is caused by the reflection of user-supplied data without appropriate HTML escaping or output encoding. As a result, a JavaScript payload may be injected into the above endpoint causing it to be executed within the context of the victim's browser.
{ "vanir_signatures": [ { "digest": { "line_hashes": [ "195514718859809000358301802219281012230", "51124480710887780062975113423557880969", "332272145517161978226090846588150270362", "79969020919049438165179474254006750396", "43325251037359491260513668163672702023", "91179429342009451467044206663561981771" ], "threshold": 0.9 }, "target": { "file": "src/zabbix_java/src/com/zabbix/gateway/GeneralInformation.java" }, "signature_type": "Line", "source": "https://github.com/zabbix/zabbix/commit/ba81419771e13671f487f460587ba6b44b8a38bb", "deprecated": false, "signature_version": "v1", "id": "CVE-2024-45699-a00919fb" } ] }