CVE-2023-32725
Leak of zbx_session cookie when using a scheduled report that includes a dashboard with a URL widget.
Severity Score
8.8
*CVSS v3.1
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
0
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
The website configured in the URL widget will receive a session cookie when testing or executing scheduled reports. The received session cookie can then be used to access the frontend as the particular user.
El sitio web configurado en el widget de la URL recibirá una cookie de sesión al probar o ejecutar informes programados. La cookie de sesión recibida se puede utilizar para acceder a la interfaz como usuario particular.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2023-05-11 CVE Reserved
- 2023-12-18 CVE Published
- 2024-08-02 CVE Updated
- 2024-11-17 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-565: Reliance on Cookies without Validation and Integrity Checking
CAPEC
- CAPEC-233: Privilege Escalation
- CAPEC-593: Session Hijacking
References (1)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://support.zabbix.com/browse/ZBX-23854 | 2023-12-22 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Zabbix Search vendor "Zabbix" | Zabbix Server Search vendor "Zabbix" for product "Zabbix Server" | >= 6.0.0 <= 6.0.21 Search vendor "Zabbix" for product "Zabbix Server" and version " >= 6.0.0 <= 6.0.21" | - |
Affected
| ||||||
Zabbix Search vendor "Zabbix" | Zabbix Server Search vendor "Zabbix" for product "Zabbix Server" | >= 6.4.0 <= 6.4.6 Search vendor "Zabbix" for product "Zabbix Server" and version " >= 6.4.0 <= 6.4.6" | - |
Affected
| ||||||
Zabbix Search vendor "Zabbix" | Zabbix Server Search vendor "Zabbix" for product "Zabbix Server" | 7.0.0 Search vendor "Zabbix" for product "Zabbix Server" and version "7.0.0" | alpha1 |
Affected
| ||||||
Zabbix Search vendor "Zabbix" | Zabbix Server Search vendor "Zabbix" for product "Zabbix Server" | 7.0.0 Search vendor "Zabbix" for product "Zabbix Server" and version "7.0.0" | alpha2 |
Affected
| ||||||
Zabbix Search vendor "Zabbix" | Zabbix Server Search vendor "Zabbix" for product "Zabbix Server" | 7.0.0 Search vendor "Zabbix" for product "Zabbix Server" and version "7.0.0" | alpha3 |
Affected
| ||||||
Zabbix Search vendor "Zabbix" | Frontend Search vendor "Zabbix" for product "Frontend" | >= 6.0.0 <= 6.0.21 Search vendor "Zabbix" for product "Frontend" and version " >= 6.0.0 <= 6.0.21" | - |
Affected
| ||||||
Zabbix Search vendor "Zabbix" | Frontend Search vendor "Zabbix" for product "Frontend" | >= 6.4.0 <= 6.4.6 Search vendor "Zabbix" for product "Frontend" and version " >= 6.4.0 <= 6.4.6" | - |
Affected
| ||||||
Zabbix Search vendor "Zabbix" | Frontend Search vendor "Zabbix" for product "Frontend" | 7.0.0 Search vendor "Zabbix" for product "Frontend" and version "7.0.0" | alpha1 |
Affected
| ||||||
Zabbix Search vendor "Zabbix" | Frontend Search vendor "Zabbix" for product "Frontend" | 7.0.0 Search vendor "Zabbix" for product "Frontend" and version "7.0.0" | alpha2 |
Affected
| ||||||
Zabbix Search vendor "Zabbix" | Frontend Search vendor "Zabbix" for product "Frontend" | 7.0.0 Search vendor "Zabbix" for product "Frontend" and version "7.0.0" | alpha3 |
Affected
|