Описание
The LDAP 'Bind password' value cannot be read after saving, but a Super Admin account can leak it by changing LDAP 'Host' to a rogue LDAP server. To mitigate this, the 'Bind password' value is now reset on 'Host' change.
Пакеты
| Пакет | Статус | Версия исправления | Релиз | Тип |
|---|---|---|---|---|
| zabbix | unfixed | package |
Примечания
https://support.zabbix.com/browse/ZBX-27062
Fixed by: https://github.com/zabbix/zabbix/commit/32ec2f59007abd5f4bae9b5c7a7f056e8d128776 (6.0.41rc1)
Fixed by: https://github.com/zabbix/zabbix/commit/4579a2432cab92b0ef61f0047c2446b9f77df342 (7.0.18rc1)
Fixed in: 6.0.41, 7.0.18, 7.2.12, 7.4.2
Связанные уязвимости
The LDAP 'Bind password' value cannot be read after saving, but a Super Admin account can leak it by changing LDAP 'Host' to a rogue LDAP server. To mitigate this, the 'Bind password' value is now reset on 'Host' change.
The LDAP 'Bind password' value cannot be read after saving, but a Super Admin account can leak it by changing LDAP 'Host' to a rogue LDAP server. To mitigate this, the 'Bind password' value is now reset on 'Host' change.
The LDAP 'Bind password' value cannot be read after saving, but a Super Admin account can leak it by changing LDAP 'Host' to a rogue LDAP server. To mitigate this, the 'Bind password' value is now reset on 'Host' change.
Уязвимость универсальной системы мониторинга Zabbix, связанная с предоставлением конфиденциальной информации неавторизованному лицу, позволяющая нарушителю получить доступ к конфиденциальной информации