CVE-2023-29450

JavaScript pre-processing can be used by the attacker to gain access to the file system (read-only access on behalf of user "zabbix") on the Zabbix Server or Zabbix Proxy, potentially leading to unauthorized access to sensitive data.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*
cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*
cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*
cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*

History

22 Aug 2023, 19:16

Type Values Removed Values Added
References
  • (MISC) https://lists.debian.org/debian-lts-announce/2023/08/msg00027.html -

25 Jul 2023, 14:55

Type Values Removed Values Added
First Time Zabbix zabbix
Zabbix
References (MISC) https://support.zabbix.com/browse/ZBX-22588 - (MISC) https://support.zabbix.com/browse/ZBX-22588 - Vendor Advisory
CWE CWE-552
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
CPE cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*

13 Jul 2023, 09:15

Type Values Removed Values Added
New CVE

Information

Published : 2023-07-13 09:15

Updated : 2023-12-10 15:14


NVD link : CVE-2023-29450

Mitre link : CVE-2023-29450

CVE.ORG link : CVE-2023-29450


JSON object : View

Products Affected

zabbix

  • zabbix
CWE
CWE-552

Files or Directories Accessible to External Parties

CWE-200

Exposure of Sensitive Information to an Unauthorized Actor