Total vulnerabilities in the database
After the initial setup process, some steps of setup.php file are reachable not only by super-administrators, but by unauthenticated users as well. Malicious actor can pass step checks and potentially change the configuration of Zabbix Frontend.
Software | From | Fixed in |
---|---|---|
zabbix / zabbix | 6.0.0-alpha2 | 6.0.0-alpha2.x |
zabbix / zabbix | 6.0.0-alpha3 | 6.0.0-alpha3.x |
zabbix / zabbix | 6.0.0-alpha4 | 6.0.0-alpha4.x |
zabbix / zabbix | 6.0.0-alpha5 | 6.0.0-alpha5.x |
zabbix / zabbix | 6.0.0-alpha6 | 6.0.0-alpha6.x |
zabbix / zabbix | 6.0.0-alpha7 | 6.0.0-alpha7.x |
zabbix / zabbix | 6.0.0-beta1 | 6.0.0-beta1.x |
zabbix / zabbix | 5.4.0 | 5.4.8.x |
zabbix / zabbix | 6.0.0-alpha1 | 6.0.0-alpha1.x |
fedoraproject / fedora | 34 | 34.x |
fedoraproject / fedora | 35 | 35.x |
debian / debian_linux | 9.0 | 9.0.x |