CVE-2022-23134
13.01.2022, 16:15
After the initial setup process, some steps of setup.php file are reachable not only by super-administrators, but by unauthenticated users as well. Malicious actor can pass step checks and potentially change the configuration of Zabbix Frontend.Enginsight
Vendor | Product | Version |
---|---|---|
zabbix | zabbix | 5.4.0 ≤ 𝑥 ≤ 5.4.8 |
zabbix | zabbix | 6.0.0:alpha1 |
zabbix | zabbix | 6.0.0:alpha2 |
zabbix | zabbix | 6.0.0:alpha3 |
zabbix | zabbix | 6.0.0:alpha4 |
zabbix | zabbix | 6.0.0:alpha5 |
zabbix | zabbix | 6.0.0:alpha6 |
zabbix | zabbix | 6.0.0:alpha7 |
zabbix | zabbix | 6.0.0:beta1 |
debian | debian_linux | 9.0 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Common Weakness Enumeration
References