Lucene search

K
cvelistZabbixCVELIST:CVE-2022-23132
HistoryDec 01, 2021 - 12:00 a.m.

CVE-2022-23132 Incorrect permissions of [/var/run/zabbix] forces dac_override

2021-12-0100:00:00
CWE-284
Zabbix
www.cve.org
1

3.3 Low

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N

7.6 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

45.2%

During Zabbix installation from RPM, DAC_OVERRIDE SELinux capability is in use to access PID files in [/var/run/zabbix] folder. In this case, Zabbix Proxy or Server processes can bypass file read, write and execute permissions check on the file system level

CNA Affected

[
  {
    "product": "Proxy, Server",
    "vendor": "Zabbix",
    "versions": [
      {
        "status": "affected",
        "version": "4.0.0 - 4.0.36"
      },
      {
        "status": "affected",
        "version": "5.0.0 – 5.0.18"
      },
      {
        "status": "affected",
        "version": "5.4.0 – 5.4.8"
      },
      {
        "lessThan": "5.0.19*",
        "status": "unaffected",
        "version": "5.0.19",
        "versionType": "custom"
      },
      {
        "lessThan": "5.4.9*",
        "status": "unaffected",
        "version": "5.4.9",
        "versionType": "custom"
      }
    ]
  }
]

3.3 Low

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N

7.6 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

45.2%