Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2022-23131

Опубликовано: 13 янв. 2022
Источник: ubuntu
Приоритет: medium
CVSS2: 5.1
CVSS3: 9.1

Описание

In the case of instances where the SAML SSO authentication is enabled (non-default), session data can be modified by a malicious actor, because a user login stored in the session was not verified. Malicious unauthenticated actor may exploit this issue to escalate privileges and gain admin access to Zabbix Frontend. To perform the attack, SAML authentication is required to be enabled and the actor has to know the username of Zabbix user (or use the guest account, which is disabled by default).

РелизСтатусПримечание
bionic

ignored

end of standard support, was needs-triage
devel

not-affected

1:6.0.29+dfsg-1
esm-apps/bionic

not-affected

code not present
esm-apps/focal

not-affected

code not present
esm-apps/jammy

not-affected

code not present
esm-apps/xenial

not-affected

code not present
esm-infra-legacy/trusty

not-affected

code not present
focal

not-affected

code not present
hirsute

ignored

end of life
impish

ignored

end of life

Показывать по

5.1 Medium

CVSS2

9.1 Critical

CVSS3

Связанные уязвимости

CVSS3: 9.1
nvd
около 4 лет назад

In the case of instances where the SAML SSO authentication is enabled (non-default), session data can be modified by a malicious actor, because a user login stored in the session was not verified. Malicious unauthenticated actor may exploit this issue to escalate privileges and gain admin access to Zabbix Frontend. To perform the attack, SAML authentication is required to be enabled and the actor has to know the username of Zabbix user (or use the guest account, which is disabled by default).

CVSS3: 9.1
debian
около 4 лет назад

In the case of instances where the SAML SSO authentication is enabled ...

CVSS3: 9.8
github
около 4 лет назад

In the case of instances where the SAML SSO authentication is enabled (non-default), session data can be modified by a malicious actor, because a user login stored in the session was not verified. Malicious unauthenticated actor may exploit this issue to escalate privileges and gain admin access to Zabbix Frontend. To perform the attack, SAML authentication is required to be enabled and the actor has to know the username of Zabbix user (or use the guest account, which is disabled by default).

CVSS3: 9.8
fstec
около 4 лет назад

Уязвимость универсальной системы мониторинга Zabbix , связанная с обходом аутентификации посредством спуфинга, позволяющая нарушителю повысить свои привилегии

5.1 Medium

CVSS2

9.1 Critical

CVSS3