Reflected XSS in action configuration window of Zabbix Frontend
CVE-2022-24349

4.6MEDIUM

Key Information:

Vendor

Zabbix

Status
Vendor
CVE Published:
9 March 2022

What is CVE-2022-24349?

An authenticated user can create a link with reflected XSS payload for actions’ pages, and send it to other users. Malicious code has access to all the same objects as the rest of the web page and can make arbitrary modifications to the contents of the page being displayed to a victim. This attack can be implemented with the help of social engineering and expiration of a number of factors - an attacker should have authorized access to the Zabbix Frontend and allowed network connection between a malicious server and victim’s computer, understand attacked infrastructure, be recognized by the victim as a trustee and use trusted communication channel.

Affected Version(s)

Frontend 4.0.0-4.0.38

Frontend 5.0.0-5.0.20

Frontend 5.4.0-5.4.10

References

CVSS V3.1

Score:
4.6
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
Low
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

internal research
.
CVE-2022-24349 : Reflected XSS in action configuration window of Zabbix Frontend