CVE-2022-23134

After the initial setup process, some steps of setup.php file are reachable not only by super-administrators, but by unauthenticated users as well. Malicious actor can pass step checks and potentially change the configuration of Zabbix Frontend.
Configurations

Configuration 1

cpe:2.3:a:zabbix:zabbix:6.0.0:alpha2:*:*:*:*:*:*
cpe:2.3:a:zabbix:zabbix:6.0.0:alpha3:*:*:*:*:*:*
cpe:2.3:a:zabbix:zabbix:6.0.0:alpha4:*:*:*:*:*:*
cpe:2.3:a:zabbix:zabbix:6.0.0:alpha5:*:*:*:*:*:*
cpe:2.3:a:zabbix:zabbix:6.0.0:alpha6:*:*:*:*:*:*
cpe:2.3:a:zabbix:zabbix:6.0.0:alpha7:*:*:*:*:*:*
cpe:2.3:a:zabbix:zabbix:6.0.0:beta1:*:*:*:*:*:*
cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*
cpe:2.3:a:zabbix:zabbix:6.0.0:alpha1:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

Information

Published : 2022-01-13 04:15

Updated : 2022-02-10 07:53


NVD link : CVE-2022-23134

Mitre link : CVE-2022-23134

Products Affected
No products.
CWE