Vulnerability Details : CVE-2022-24919
An authenticated user can create a link with reflected Javascript code inside it for graphs’ page and send it to other users. The payload can be executed only with a known CSRF token value of the victim, which is changed periodically and is difficult to predict. Malicious code has access to all the same objects as the rest of the web page and can make arbitrary modifications to the contents of the page being displayed to a victim during social engineering attacks.
Vulnerability category: Cross site scripting (XSS)Cross-site request forgery (CSRF)
Products affected by CVE-2022-24919
- cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
- cpe:2.3:a:zabbix:frontend:*:*:*:*:*:*:*:*
- cpe:2.3:a:zabbix:frontend:*:*:*:*:*:*:*:*
- cpe:2.3:a:zabbix:frontend:*:*:*:*:*:*:*:*
- cpe:2.3:a:zabbix:frontend:6.0.0:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-24919
0.20%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 58 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-24919
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
2.1
|
LOW | AV:N/AC:H/Au:S/C:N/I:P/A:N |
3.9
|
2.9
|
NIST | |
4.4
|
MEDIUM | CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:N |
1.3
|
2.7
|
NIST | |
3.7
|
LOW | CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N |
1.2
|
2.5
|
Zabbix |
CWE ids for CVE-2022-24919
-
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.Assigned by:
- nvd@nist.gov (Primary)
- security@zabbix.com (Secondary)
References for CVE-2022-24919
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2V4N22R3QVTYAJMWFK2U2O6QXAZYM35Z/
[SECURITY] Fedora 34 Update: zabbix-5.0.21-1.fc34 - package-announce - Fedora Mailing-ListsMailing List;Third Party Advisory
-
https://support.zabbix.com/browse/ZBX-20680
[ZBX-20680] Reflected XSSes in Zabbix Frontend (CVE-2022-24349, CVE-2022-24917, CVE-2022-24918, CVE-2022-24919) - ZABBIX SUPPORTIssue Tracking;Patch;Vendor Advisory
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SWDZONUHDYKBXTAIAGHSYQDEGORD2QT7/
[SECURITY] Fedora 35 Update: zabbix-5.0.21-1.fc35 - package-announce - Fedora Mailing-ListsMailing List;Third Party Advisory
-
https://lists.debian.org/debian-lts-announce/2022/04/msg00011.html
[SECURITY] [DLA 2980-1] zabbix security updateThird Party Advisory
-
https://lists.debian.org/debian-lts-announce/2023/04/msg00013.html
[SECURITY] [DLA 3390-1] zabbix security update
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QWP6UBFA5T6MOQPY2VDUG5YAJBFPYRFF/
[SECURITY] Fedora 36 Update: zabbix-5.0.21-1.fc36 - package-announce - Fedora Mailing-ListsMailing List;Third Party Advisory
Jump to