First published: Sat Aug 17 2019(Updated: )
Zabbix through 4.4.0alpha1 allows User Enumeration. With login requests, it is possible to enumerate application usernames based on the variability of server responses (e.g., the "Login name or password is incorrect" and "No permissions for system access" messages, or just blocking for a number of seconds). This affects both api_jsonrpc.php and index.php.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Zabbix Zabbix | <=4.0.26 | |
Zabbix Zabbix | >=5.0.0<=5.0.5 | |
Zabbix Zabbix | =4.4.0-alpha1 | |
Debian Debian Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-15132 is a vulnerability in Zabbix through 4.4.0alpha1 that allows user enumeration.
CVE-2019-15132 allows user enumeration by exploiting the variability of server responses to login requests.
The severity of CVE-2019-15132 is medium, with a severity value of 5.3.
CVE-2019-15132 affects Zabbix versions 4.0.26, 4.4.0-alpha1, and 5.0.0 to 5.0.5, as well as Debian Linux 9.0.
To fix CVE-2019-15132, upgrade Zabbix to a version beyond 4.4.0alpha1 or apply the necessary patches.