
CVE-2024-36467 – Authentication privilege escalation via user groups due to missing authorization checks
https://notcve.org/view.php?id=CVE-2024-36467
27 Nov 2024 — An authenticated user with API access (e.g.: user with default User role), more specifically a user with access to the user.update API endpoint is enough to be able to add themselves to any group (e.g.: Zabbix Administrators), except to groups that are disabled or having restricted GUI access. • https://support.zabbix.com/browse/ZBX-25614 • CWE-285: Improper Authorization •

CVE-2024-36463
https://notcve.org/view.php?id=CVE-2024-36463
26 Nov 2024 — The implementation of atob in "Zabbix JS" allows to create a string with arbitrary content and use it to access internal properties of objects. • https://support.zabbix.com/browse/ZBX-25611 • CWE-767: Access to Critical Private Variable via Public Method •

CVE-2024-22123 – Zabbix Arbitrary File Read
https://notcve.org/view.php?id=CVE-2024-22123
09 Aug 2024 — Setting SMS media allows to set GSM modem file. Later this file is used as Linux device. But due everything is a file for Linux, it is possible to set another file, e.g. log file and zabbix_server will try to communicate with it as modem. As a result, log file will be broken with AT commands and small part for log file content will be leaked to UI. • https://support.zabbix.com/browse/ZBX-25013 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVE-2024-22122 – AT(GSM) Command Injection
https://notcve.org/view.php?id=CVE-2024-22122
09 Aug 2024 — Zabbix allows to configure SMS notifications. AT command injection occurs on "Zabbix Server" because there is no validation of "Number" field on Web nor on Zabbix server side. Attacker can run test of SMS providing specially crafted phone number and execute additional AT commands on modem. • https://support.zabbix.com/browse/ZBX-25012 • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •

CVE-2024-22121 – Zabbix Agent MSI Installer Allows Non-Admin User to Access Change Option via msiexec.exe
https://notcve.org/view.php?id=CVE-2024-22121
09 Aug 2024 — A non-admin user can change or remove important features within the Zabbix Agent application, thus impacting the integrity and availability of the application. • https://support.zabbix.com/browse/ZBX-25011 • CWE-281: Improper Preservation of Permissions •

CVE-2024-22119 – Stored XSS in graph items select form
https://notcve.org/view.php?id=CVE-2024-22119
09 Feb 2024 — The cause of vulnerability is improper validation of form input field “Name” on Graph page in Items section. La causa de la vulnerabilidad es la validación inadecuada del campo de entrada del formulario "Nombre" en la página Gráfico en la sección Elementos. • https://lists.debian.org/debian-lts-announce/2024/04/msg00020.html • CWE-20: Improper Input Validation CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2023-32724 – JavaScript engine memory pointers are directly available for Zabbix users for modification
https://notcve.org/view.php?id=CVE-2023-32724
12 Oct 2023 — Memory pointer is in a property of the Ducktape object. This leads to multiple vulnerabilities related to direct memory access and manipulation. El puntero de memoria está en una propiedad del objeto Ducktape. Esto conduce a múltiples vulnerabilidades relacionadas con el acceso directo y la manipulación de la memoria. • https://support.zabbix.com/browse/ZBX-23391 • CWE-732: Incorrect Permission Assignment for Critical Resource •

CVE-2023-32723 – Inefficient permission check in class CControllerAuthenticationUpdate
https://notcve.org/view.php?id=CVE-2023-32723
12 Oct 2023 — Request to LDAP is sent before user permissions are checked. La solicitud a LDAP se envía antes de que se verifiquen los permisos del usuario. • https://lists.debian.org/debian-lts-announce/2024/01/msg00012.html • CWE-732: Incorrect Permission Assignment for Critical Resource •

CVE-2023-32721 – Stored XSS in Maps element
https://notcve.org/view.php?id=CVE-2023-32721
12 Oct 2023 — A stored XSS has been found in the Zabbix web application in the Maps element if a URL field is set with spaces before URL. Se ha encontrado Cross-Site Scripting (XSS) almacenado en la aplicación web Zabbix en el elemento Maps si un campo URL está configurado con espacios antes de la URL. • https://lists.debian.org/debian-lts-announce/2024/01/msg00012.html • CWE-20: Improper Input Validation CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2023-29451 – Denial of service caused by a bug in the JSON parser
https://notcve.org/view.php?id=CVE-2023-29451
13 Jul 2023 — Specially crafted string can cause a buffer overrun in the JSON parser library leading to a crash of the Zabbix Server or a Zabbix Proxy. • https://lists.debian.org/debian-lts-announce/2023/08/msg00027.html • CWE-20: Improper Input Validation CWE-787: Out-of-bounds Write •