CVE-2023-32725

EUVD-2023-36952
The website configured in the URL widget will receive a session cookie when testing or executing scheduled reports. The received session cookie can then be used to access the frontend as the particular user.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
9.6 CRITICAL
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
ZabbixCNA
9.6 CRITICAL
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 49%
Affected Products (NVD)
VendorProductVersion
zabbixzabbix_server
6.0.0 ≤
𝑥
≤ 6.0.21
zabbixzabbix_server
6.4.0 ≤
𝑥
≤ 6.4.6
zabbixzabbix_server
7.0.0:alpha1
zabbixzabbix_server
7.0.0:alpha2
zabbixzabbix_server
7.0.0:alpha3
zabbixfrontend
6.0.0 ≤
𝑥
≤ 6.0.21
zabbixfrontend
6.4.0 ≤
𝑥
≤ 6.4.6
zabbixfrontend
7.0.0:alpha1
zabbixfrontend
7.0.0:alpha2
zabbixfrontend
7.0.0:alpha3
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
zabbix
bookworm
vulnerable
bullseye
1:5.0.8+dfsg-1
not-affected
bullseye (security)
1:5.0.45+dfsg-1+deb11u1
fixed
buster
not-affected
sid
1:7.0.6+dfsg-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
zabbix
bionic
not-affected
focal
not-affected
jammy
not-affected
lunar
ignored
mantic
ignored
noble
dne
trusty
not-affected
xenial
not-affected