|
|||
Rule General Information |
---|
Release Date: | 2025-03-11 | |
Rule Name: | Zabbix Setup Configuration Authentication Bypass Vulnerability (CVE-2022-23134) | |
Severity: | ||
CVE ID: | ||
Rule Protection Details |
---|
Description: | After the initial setup process, some steps of setup.php file are reachable not only by super-administrators, but by unauthenticated users as well. Malicious actor can pass step checks and potentially change the configuration of Zabbix Frontend. | |
Impact: | An unauthorized remote attacker can bypass authentication and gain access to the application with specially crafted requests. | |
Affected OS: | Windows, Linux, Others | |
Reference: | https://lists.debian.org/debian-lts-announce/2022/02/msg00008.html https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6SZYHXINBKCY42ITFSNCYE7KCSF33VRA/ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VB6W556GVXOKUYTASTDGL3AI7S3SJHX7/ https://support.zabbix.com/browse/ZBX-20384 |
|
Solutions |
---|
Please refer to announcements or patches release by the vendor: https://support.zabbix.com/browse/ZBX-20384 |