JavaScript pre-processing can be used by the attacker to gain access to the file system (read-only access on behalf of user "zabbix") on the Zabbix Server or Zabbix Proxy, potentially leading to unauthorized access to sensitive data.
{
"binaries": [
{
"binary_version": "1:5.0.17+dfsg-1ubuntu0.1~esm1",
"binary_name": "zabbix-agent"
},
{
"binary_version": "1:5.0.17+dfsg-1ubuntu0.1~esm1",
"binary_name": "zabbix-frontend-php"
},
{
"binary_version": "1:5.0.17+dfsg-1ubuntu0.1~esm1",
"binary_name": "zabbix-java-gateway"
},
{
"binary_version": "1:5.0.17+dfsg-1ubuntu0.1~esm1",
"binary_name": "zabbix-proxy-mysql"
},
{
"binary_version": "1:5.0.17+dfsg-1ubuntu0.1~esm1",
"binary_name": "zabbix-proxy-pgsql"
},
{
"binary_version": "1:5.0.17+dfsg-1ubuntu0.1~esm1",
"binary_name": "zabbix-proxy-sqlite3"
},
{
"binary_version": "1:5.0.17+dfsg-1ubuntu0.1~esm1",
"binary_name": "zabbix-server-mysql"
},
{
"binary_version": "1:5.0.17+dfsg-1ubuntu0.1~esm1",
"binary_name": "zabbix-server-pgsql"
}
]
}