Vulnerability Details : CVE-2023-32725
The website configured in the URL widget will receive a session cookie when testing or executing scheduled reports. The received session cookie can then be used to access the frontend as the particular user.
Products affected by CVE-2023-32725
- cpe:2.3:a:zabbix:frontend:*:*:*:*:*:*:*:*
- cpe:2.3:a:zabbix:frontend:*:*:*:*:*:*:*:*
- cpe:2.3:a:zabbix:frontend:7.0.0:alpha1:*:*:*:*:*:*
- cpe:2.3:a:zabbix:frontend:7.0.0:alpha2:*:*:*:*:*:*
- cpe:2.3:a:zabbix:frontend:7.0.0:alpha3:*:*:*:*:*:*
- cpe:2.3:a:zabbix:zabbix_server:*:*:*:*:*:*:*:*
- cpe:2.3:a:zabbix:zabbix_server:*:*:*:*:*:*:*:*
- cpe:2.3:a:zabbix:zabbix_server:7.0.0:alpha1:*:*:*:*:*:*
- cpe:2.3:a:zabbix:zabbix_server:7.0.0:alpha2:*:*:*:*:*:*
- cpe:2.3:a:zabbix:zabbix_server:7.0.0:alpha3:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-32725
0.17%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 54 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-32725
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
8.8
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
NIST | |
9.6
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H |
2.8
|
6.0
|
Zabbix |
CWE ids for CVE-2023-32725
-
The product relies on the existence or values of cookies when performing security-critical operations, but it does not properly ensure that the setting is valid for the associated user.Assigned by:
- nvd@nist.gov (Primary)
- security@zabbix.com (Secondary)
References for CVE-2023-32725
-
https://support.zabbix.com/browse/ZBX-23854
[ZBX-23854] Leak of zbx_session cookie when using a scheduled report that includes a dashboard with a URL widget (CVE-2023-32725) - ZABBIX SUPPORTVendor Advisory
Jump to