After the initial setup process, some steps of setup.php file are reachable not only by super-administrators, but by unauthenticated users as well. Malicious actor can pass step checks and potentially change the configuration of Zabbix Frontend.
2022-01-13T16:15:08.227
2025-03-12T21:01:25.843
Analyzed
CVSSv3.1: 3.7 (LOW)
AV:N/AC:L/Au:N/C:N/I:P/A:N
10.0
2.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | zabbix | zabbix | ≤ 5.4.8 | Yes |
Application | zabbix | zabbix | 6.0.0 | Yes |
Application | zabbix | zabbix | 6.0.0 | Yes |
Application | zabbix | zabbix | 6.0.0 | Yes |
Application | zabbix | zabbix | 6.0.0 | Yes |
Application | zabbix | zabbix | 6.0.0 | Yes |
Application | zabbix | zabbix | 6.0.0 | Yes |
Application | zabbix | zabbix | 6.0.0 | Yes |
Application | zabbix | zabbix | 6.0.0 | Yes |
Operating System | fedoraproject | fedora | 34 | Yes |
Operating System | fedoraproject | fedora | 35 | Yes |
Operating System | debian | debian_linux | 9.0 | Yes |