First published: Thu Jul 13 2023(Updated: )
JavaScript pre-processing can be used by the attacker to gain access to the file system (read-only access on behalf of user "zabbix") on the Zabbix Server or Zabbix Proxy, potentially leading to unauthorized access to sensitive data.
Credit: security@zabbix.com
Affected Software | Affected Version | How to fix |
---|---|---|
Zabbix Server | <=5.0.33 | |
Zabbix Server | >=6.0.0<=6.0.15 | |
Zabbix Server | >=6.4.0<=6.4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-29450 is a vulnerability that allows an attacker to gain read-only access to the file system on the Zabbix Server or Zabbix Proxy, potentially leading to unauthorized access to sensitive data.
CVE-2023-29450 affects Zabbix versions 5.0.33, 6.0.0 to 6.0.15, and 6.4.0 to 6.4.1.
CVE-2023-29450 has a severity rating of 7.5 (High).
An attacker can exploit CVE-2023-29450 by using JavaScript pre-processing to gain read-only access to the file system on the Zabbix Server or Zabbix Proxy.
Yes, you can find more information about CVE-2023-29450 in the following references: [Link 1](https://support.zabbix.com/browse/ZBX-22588), [Link 2](https://lists.debian.org/debian-lts-announce/2023/08/msg00027.html).