An authenticated user can create a link with reflected Javascript code inside it for the discovery page and send it to other users. The payload can be executed only with a known CSRF token value of the victim, which is changed periodically and is difficult to predict.
References
Link | Resource |
---|---|
https://support.zabbix.com/browse/ZBX-21306 | Issue Tracking Patch Vendor Advisory |
https://lists.debian.org/debian-lts-announce/2023/04/msg00013.html | |
https://lists.debian.org/debian-lts-announce/2023/08/msg00027.html |
Configurations
Configuration 1 (hide)
|
History
22 Aug 2023, 19:16
Type | Values Removed | Values Added |
---|---|---|
References |
|
12 Apr 2023, 16:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
Information
Published : 2022-07-06 11:15
Updated : 2023-08-22 19:16
NVD link : CVE-2022-35229
Mitre link : CVE-2022-35229
JSON object : View
Products Affected
zabbix
- zabbix
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')