Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2022-35230

Опубликовано: 06 июл. 2022
Источник: debian
EPSS Низкий

Описание

An authenticated user can create a link with reflected Javascript code inside it for the graphs page and send it to other users. The payload can be executed only with a known CSRF token value of the victim, which is changed periodically and is difficult to predict.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
zabbixfixed1:6.0.6+dfsg-1experimentalpackage
zabbixfixed1:6.0.7+dfsg-2package

Примечания

  • https://support.zabbix.com/browse/ZBX-21305

  • Fixed in: https://git.zabbix.com/projects/ZBX/repos/zabbix/commits/3b47a97676ee9ca4e16566f1931c456459108eae (5.0.25rc1)

EPSS

Процентиль: 68%
0.00559
Низкий

Связанные уязвимости

CVSS3: 3.7
ubuntu
больше 3 лет назад

An authenticated user can create a link with reflected Javascript code inside it for the graphs page and send it to other users. The payload can be executed only with a known CSRF token value of the victim, which is changed periodically and is difficult to predict.

CVSS3: 3.7
nvd
больше 3 лет назад

An authenticated user can create a link with reflected Javascript code inside it for the graphs page and send it to other users. The payload can be executed only with a known CSRF token value of the victim, which is changed periodically and is difficult to predict.

suse-cvrf
больше 3 лет назад

Security update for zabbix

CVSS3: 5.4
github
больше 3 лет назад

An authenticated user can create a link with reflected Javascript code inside it for the graphs page and send it to other users. The payload can be executed only with a known CSRF token value of the victim, which is changed periodically and is difficult to predict.

CVSS3: 5.4
fstec
больше 3 лет назад

Уязвимость универсальной системы мониторинга Zabbix, связанная с непринятием мер по защите структуры веб-страницы, позволяющая нарушителю оказать воздействие на целостность данных

EPSS

Процентиль: 68%
0.00559
Низкий