First published: Thu Jul 13 2023(Updated: )
JavaScript preprocessing, webhooks and global scripts can cause uncontrolled CPU, memory, and disk I/O utilization. Preprocessing/webhook/global script configuration and testing are only available to Administrative roles (Admin and Superadmin). Administrative privileges should be typically granted to users who need to perform tasks that require more control over the system. The security risk is limited because not all users have this level of access.
Credit: security@zabbix.com security@zabbix.com
Affected Software | Affected Version | How to fix |
---|---|---|
Zabbix Zabbix | <=5.0.31 | |
Zabbix Zabbix | >=6.0.0<=6.0.13 | |
Zabbix Zabbix | >=6.4.1<=6.4.4 | |
Zabbix Zabbix | =6.4.0-alpha1 | |
Zabbix Zabbix | =6.4.0-beta1 | |
Zabbix Zabbix | =6.4.0-beta2 | |
Zabbix Zabbix | =6.4.0-beta3 | |
Zabbix Zabbix | =6.4.0-beta4 | |
Zabbix Zabbix | =6.4.0-beta5 | |
Zabbix Zabbix | =6.4.0-beta6 | |
Zabbix Zabbix | =6.4.0-rc2 | |
Zabbix Zabbix | =6.4.0-rc3 | |
Zabbix Zabbix | =6.4.0-rc4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-29449 is a vulnerability that allows JavaScript preprocessing, webhooks, and global scripts to cause uncontrolled CPU, memory, and disk I/O utilization in Zabbix versions 5.0.31 up to and including 6.4.4.
CVE-2023-29449 has a severity score of 4.9, which is considered medium.
No, the configuration and testing of preprocessing, webhooks, and global scripts are only available to Administrative roles (Admin and Superadmin).
To fix CVE-2023-29449, it is recommended to upgrade to a Zabbix version higher than 6.4.4 or apply the necessary patches provided by Zabbix. Additionally, make sure to grant administrative privileges responsibly.
You can find more information about CVE-2023-29449 at the following reference link: [Support Ticket ZBX-22589](https://support.zabbix.com/browse/ZBX-22589).