Leak of zbx_session cookie when using a scheduled report that includes a dashboard with a URL widget.
CVE-2023-32725

9.6CRITICAL

Key Information:

Vendor

Zabbix

Status
Vendor
CVE Published:
18 December 2023

What is CVE-2023-32725?

A vulnerability in the Zabbix Web Interface allows session cookies to be improperly handled when testing or executing scheduled reports. When a website is configured in the URL widget, the application sends a session cookie to that URL, enabling unauthorized access to the frontend as the authentic user. This situation poses significant security risks, as it can lead to session hijacking and unauthorized actions within the system.

Affected Version(s)

Zabbix 6.0.0 <= 6.0.21

Zabbix 6.4.0 <= 6.4.6

Zabbix 7.0.0alpha1 <= 7.0.0alpha3

References

CVSS V3.1

Score:
9.6
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.