CVE-2023-29450
13.07.2023, 09:15
JavaScript pre-processing can be used by the attacker to gain access to the file system (read-only access on behalf of user "zabbix") on the Zabbix Server or Zabbix Proxy, potentially leading to unauthorized access to sensitive data.Enginsight
Vendor | Product | Version |
---|---|---|
zabbix | zabbix | 𝑥 ≤ 5.0.33 |
zabbix | zabbix | 6.0.0 ≤ 𝑥 ≤ 6.0.15 |
zabbix | zabbix | 6.4.0 ≤ 𝑥 ≤ 6.4.1 |
zabbix | zabbix | 6.4.3 ≤ 𝑥 ≤ 6.4.4 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Common Weakness Enumeration
- CWE-200 - Exposure of Sensitive Information to an Unauthorized ActorThe product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
- CWE-552 - Files or Directories Accessible to External PartiesThe product makes files or directories accessible to unauthorized actors, even though they should not be.