CVE-2022-23132
13.01.2022, 16:15
During Zabbix installation from RPM, DAC_OVERRIDE SELinux capability is in use to access PID files in [/var/run/zabbix] folder. In this case, Zabbix Proxy or Server processes can bypass file read, write and execute permissions check on the file system levelEnginsight
| Vendor | Product | Version |
|---|---|---|
| zabbix | zabbix | 4.0.0 ≤ 𝑥 ≤ 4.0.36 |
| zabbix | zabbix | 5.0.0 ≤ 𝑥 ≤ 5.0.18 |
| zabbix | zabbix | 5.4.0 ≤ 𝑥 ≤ 5.4.8 |
| zabbix | zabbix | 6.0.0:alpha1 |
| zabbix | zabbix | 6.0.0:alpha2 |
| zabbix | zabbix | 6.0.0:alpha3 |
| zabbix | zabbix | 6.0.0:alpha4 |
| zabbix | zabbix | 6.0.0:alpha5 |
| zabbix | zabbix | 6.0.0:alpha6 |
| zabbix | zabbix | 6.0.0:alpha7 |
𝑥
= Vulnerable software versions
Debian Releases
Ubuntu Releases
Common Weakness Enumeration
- CWE-284 - Improper Access ControlThe software does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
- CWE-732 - Incorrect Permission Assignment for Critical ResourceThe product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.
References