// For flags

CVE-2022-24349

Reflected XSS in action configuration window of Zabbix Frontend

Severity Score

4.4
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

An authenticated user can create a link with reflected XSS payload for actions’ pages, and send it to other users. Malicious code has access to all the same objects as the rest of the web page and can make arbitrary modifications to the contents of the page being displayed to a victim. This attack can be implemented with the help of social engineering and expiration of a number of factors - an attacker should have authorized access to the Zabbix Frontend and allowed network connection between a malicious server and victim’s computer, understand attacked infrastructure, be recognized by the victim as a trustee and use trusted communication channel.

Un usuario autenticado puede crear un enlace con carga útil XSS reflejada para las páginas de acciones, y enviarlo a otros usuarios. El código malicioso tiene acceso a todos los mismos objetos que el resto de la página web y puede realizar modificaciones arbitrarias en el contenido de la página que se muestra a la víctima. Este ataque puede ser implementado con la ayuda de la ingeniería social y la expiración de una serie de factores - un atacante debe tener acceso autorizado al Zabbix Frontend y permitir la conexión de red entre un servidor malicioso y el ordenador de la víctima, entender la infraestructura atacada, ser reconocido por la víctima como un administrador y utilizar el canal de comunicación de confianza

*Credits: internal research
CVSS Scores
Attack Vector
Network
Attack Complexity
High
Privileges Required
Low
User Interaction
Required
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
None
Attack Vector
Network
Attack Complexity
High
Privileges Required
Low
User Interaction
Required
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
Low
Attack Vector
Network
Attack Complexity
High
Authentication
Single
Confidentiality
None
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2022-02-02 CVE Reserved
  • 2022-03-09 CVE Published
  • 2024-05-31 EPSS Updated
  • 2024-09-16 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Zabbix
Search vendor "Zabbix"
Frontend
Search vendor "Zabbix" for product "Frontend"
>= 4.0.0 <= 4.0.38
Search vendor "Zabbix" for product "Frontend" and version " >= 4.0.0 <= 4.0.38"
-
Affected
Zabbix
Search vendor "Zabbix"
Frontend
Search vendor "Zabbix" for product "Frontend"
>= 5.0.0 <= 5.0.20
Search vendor "Zabbix" for product "Frontend" and version " >= 5.0.0 <= 5.0.20"
-
Affected
Zabbix
Search vendor "Zabbix"
Frontend
Search vendor "Zabbix" for product "Frontend"
>= 5.4.0 <= 5.4.10
Search vendor "Zabbix" for product "Frontend" and version " >= 5.4.0 <= 5.4.10"
-
Affected
Zabbix
Search vendor "Zabbix"
Frontend
Search vendor "Zabbix" for product "Frontend"
6.0.0
Search vendor "Zabbix" for product "Frontend" and version "6.0.0"
-
Affected
Debian
Search vendor "Debian"
Debian Linux
Search vendor "Debian" for product "Debian Linux"
9.0
Search vendor "Debian" for product "Debian Linux" and version "9.0"
-
Affected
Fedoraproject
Search vendor "Fedoraproject"
Fedora
Search vendor "Fedoraproject" for product "Fedora"
34
Search vendor "Fedoraproject" for product "Fedora" and version "34"
-
Affected
Fedoraproject
Search vendor "Fedoraproject"
Fedora
Search vendor "Fedoraproject" for product "Fedora"
35
Search vendor "Fedoraproject" for product "Fedora" and version "35"
-
Affected