Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2022-46768

Опубликовано: 15 дек. 2022
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS3: 5.9

Описание

Arbitrary file read vulnerability exists in Zabbix Web Service Report Generation, which listens on the port 10053. The service does not have proper validation for URL parameters before reading the files.

РелизСтатусПримечание
bionic

ignored

end of standard support, was needs-triage
devel

not-affected

1:6.0.29+dfsg-1
esm-apps/bionic

not-affected

code not present
esm-apps/focal

not-affected

code not present
esm-apps/jammy

not-affected

code not present
esm-apps/xenial

not-affected

code not present
esm-infra-legacy/trusty

not-affected

code not present
focal

not-affected

code not present
jammy

not-affected

code not present
kinetic

ignored

end of life, was needs-triage

Показывать по

EPSS

Процентиль: 87%
0.03607
Низкий

5.9 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.9
nvd
около 3 лет назад

Arbitrary file read vulnerability exists in Zabbix Web Service Report Generation, which listens on the port 10053. The service does not have proper validation for URL parameters before reading the files.

CVSS3: 5.9
debian
около 3 лет назад

Arbitrary file read vulnerability exists in Zabbix Web Service Report ...

CVSS3: 5.9
github
около 3 лет назад

Arbitrary file read vulnerability exists in Zabbix Web Service Report Generation, which listens on the port 10053. The service does not have proper validation for URL parameters before reading the files.

CVSS3: 5.9
fstec
больше 3 лет назад

Уязвимость универсальной системы мониторинга Zabbix, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю получить доступ к конфиденциальным данным

EPSS

Процентиль: 87%
0.03607
Низкий

5.9 Medium

CVSS3