Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2025-49643

Опубликовано: 01 дек. 2025
Источник: debian

Описание

An authenticated Zabbix user (including Guest) is able to cause disproportionate CPU load on the webserver by sending specially crafted parameters to /imgstore.php, leading to potential denial of service.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
zabbixfixed1:7.0.22+dfsg-1package
zabbixignoredtrixiepackage
zabbixignoredbookwormpackage
zabbixignoredbullseyepackage

Примечания

  • https://support.zabbix.com/browse/ZBX-27284

  • Fixed by: https://github.com/zabbix/zabbix/commit/b4757c1eaa571abbf0aa6fa2fe2e77ccf4c205f8 (7.0.19rc1)

  • Fixed by: https://github.com/zabbix/zabbix/commit/aeada86d3c8231e1e173c6a7ac19ea60bf899b86 (6.0.42rc1)

  • Fixed in: 6.0.42, 7.0.19, 7.2.13, 7.4.3

Связанные уязвимости

ubuntu
2 месяца назад

An authenticated Zabbix user (including Guest) is able to cause disproportionate CPU load on the webserver by sending specially crafted parameters to /imgstore.php, leading to potential denial of service.

nvd
2 месяца назад

An authenticated Zabbix user (including Guest) is able to cause disproportionate CPU load on the webserver by sending specially crafted parameters to /imgstore.php, leading to potential denial of service.

CVSS3: 6.5
github
2 месяца назад

An authenticated Zabbix user (including Guest) is able to cause disproportionate CPU load on the webserver by sending specially crafted parameters to /imgstore.php, leading to potential denial of service.

CVSS3: 6.5
fstec
2 месяца назад

Уязвимость сценария imgstore.php системы мониторинга ИТ-инфраструктуры Zabbix, позволяющая нарушителю вызвать отказ в обслуживании