First published: Wed Sep 21 2022(Updated: )
Arbitrary file read vulnerability exists in Zabbix Web Service Report Generation, which listens on the port 10053. The service does not have proper validation for URL parameters before reading the files.
Credit: security@zabbix.com security@zabbix.com
Affected Software | Affected Version | How to fix |
---|---|---|
Zabbix Web Service Report Generation | >=6.0.0<=6.0.11 | |
Zabbix Web Service Report Generation | >=6.2.0<=6.2.5 | |
Zabbix Zabbix-agent2 | <6.0.12 | |
Zabbix Zabbix-agent2 | >=6.2.0<6.2.6 | |
>=6.0.0<=6.0.11 | ||
>=6.2.0<=6.2.5 | ||
<6.0.12 | ||
>=6.2.0<6.2.6 |
To remediate this vulnerability, apply updates to the appropriate products or use the workaround
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this arbitrary file read vulnerability is CVE-2022-46768.
The affected software for this vulnerability is Zabbix Web Service Report Generation and Zabbix Zabbix-agent2.
The severity rating of CVE-2022-46768 is medium with a CVSS score of 5.9.
To fix the arbitrary file read vulnerability in Zabbix Web Service Report Generation, upgrade to a version between 6.0.0 and 6.0.11.
To fix the arbitrary file read vulnerability in Zabbix Zabbix-agent2, upgrade to a version between 6.2.0 and 6.2.5.