Lucene search

K
cvelistZabbixCVELIST:CVE-2022-40626
HistoryJul 08, 2022 - 12:00 a.m.

CVE-2022-40626 Reflected XSS in the backurl parameter of Zabbix Frontend

2022-07-0800:00:00
CWE-79
Zabbix
www.cve.org

4.8 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:L/A:N

6.6 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

35.5%

An unauthenticated user can create a link with reflected Javascript code inside the backurl parameter and send it to other authenticated users in order to create a fake account with predefined login, password and role in Zabbix Frontend.

CNA Affected

[
  {
    "product": "Frontend",
    "vendor": "Zabbix",
    "versions": [
      {
        "status": "affected",
        "version": "6.0.0-6.0.6"
      },
      {
        "status": "affected",
        "version": "6.2.0"
      },
      {
        "lessThan": "unspecified",
        "status": "unaffected",
        "version": "6.0.7rc1",
        "versionType": "custom"
      },
      {
        "lessThan": "unspecified",
        "status": "unaffected",
        "version": "6.2.1rc1",
        "versionType": "custom"
      }
    ]
  }
]

4.8 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:L/A:N

6.6 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

35.5%