First published: Thu Jan 13 2022(Updated: )
During Zabbix installation from RPM, DAC_OVERRIDE SELinux capability is in use to access PID files in [/var/run/zabbix] folder. In this case, Zabbix Proxy or Server processes can bypass file read, write and execute permissions check on the file system level
Credit: security@zabbix.com
Affected Software | Affected Version | How to fix |
---|---|---|
Zabbix Server | >=4.0.0<=4.0.36 | |
Zabbix Server | >=5.0.0<=5.0.18 | |
Zabbix Server | >=5.4.0<=5.4.8 | |
Zabbix Server | =6.0.0-alpha1 | |
Zabbix Server | =6.0.0-alpha2 | |
Zabbix Server | =6.0.0-alpha3 | |
Zabbix Server | =6.0.0-alpha4 | |
Zabbix Server | =6.0.0-alpha5 | |
Zabbix Server | =6.0.0-alpha6 | |
Zabbix Server | =6.0.0-alpha7 | |
Fedora | =34 | |
Fedora | =35 |
To remediate this vulnerability, apply the updates.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-23132 is a vulnerability that allows Zabbix Proxy or Server processes to bypass file permissions check on the file system level during Zabbix installation from RPM.
CVE-2022-23132 affects Zabbix versions 4.0.0 to 4.0.36, 5.0.0 to 5.0.18, and 5.4.0 to 5.4.8.
CVE-2022-23132 has a severity score of 7.3 (high).
To fix CVE-2022-23132, it is recommended to upgrade to a patched version of Zabbix that addresses the vulnerability.
You can find more information about CVE-2022-23132 on the following references: [reference 1](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6SZYHXINBKCY42ITFSNCYE7KCSF33VRA/), [reference 2](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VB6W556GVXOKUYTASTDGL3AI7S3SJHX7/), [reference 3](https://support.zabbix.com/browse/ZBX-20341).