CVE-2022-23134
13.01.2022, 16:15
After the initial setup process, some steps of setup.php file are reachable not only by super-administrators, but by unauthenticated users as well. Malicious actor can pass step checks and potentially change the configuration of Zabbix Frontend.Enginsight
Vendor | Product | Version |
---|---|---|
zabbix | zabbix | 5.4.0 ≤ 𝑥 ≤ 5.4.8 |
zabbix | zabbix | 6.0.0 |
zabbix | zabbix | 6.0.0 |
zabbix | zabbix | 6.0.0 |
zabbix | zabbix | 6.0.0 |
zabbix | zabbix | 6.0.0 |
zabbix | zabbix | 6.0.0 |
zabbix | zabbix | 6.0.0 |
zabbix | zabbix | 6.0.0 |
debian | debian_linux | 9.0 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Common Weakness Enumeration
References