CWE
94
Advisory Published
Updated

CVE-2023-29453: Agent 2 package are built with Go version affected by CVE-2023-24538

First published: Thu Oct 12 2023(Updated: )

Templates do not properly consider backticks (`) as Javascript string delimiters, and do not escape them as expected. Backticks are used, since ES6, for JS template literals. If a template contains a Go template action within a Javascript template literal, the contents of the action can be used to terminate the literal, injecting arbitrary Javascript code into the Go template. As ES6 template literals are rather complex, and themselves can do string interpolation, the decision was made to simply disallow Go template actions from being used inside of them (e.g., "var a = {{.}}"), since there is no obviously safe way to allow this behavior. This takes the same approach as github.com/google/safehtml. With fix, Template. Parse returns an Error when it encounters templates like this, with an ErrorCode of value 12. This ErrorCode is currently unexported but will be exported in the release of Go 1.21. Users who rely on the previous behavior can re-enable it using the GODEBUG flag jstmpllitinterp=1, with the caveat that backticks will now be escaped. This should be used with caution.

Credit: security@zabbix.com security@zabbix.com

Affected SoftwareAffected VersionHow to fix
Zabbix Zabbix-agent2>=5.0.0<5.0.35
Zabbix Zabbix-agent2>=6.0.0<6.0.18
Zabbix Zabbix-agent2>=6.4.0<6.4.3

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is CVE-2023-29453?

    CVE-2023-29453 is a vulnerability where templates do not properly consider backticks as Javascript string delimiters and do not escape them as expected.

  • How does CVE-2023-29453 affect Zabbix Zabbix-agent2?

    CVE-2023-29453 affects Zabbix Zabbix-agent2 versions 5.0.0 to 5.0.35, 6.0.0 to 6.0.18, and 6.4.0 to 6.4.3.

  • What is the severity of CVE-2023-29453?

    The severity of CVE-2023-29453 is critical with a CVSS score of 9.8.

  • How can I fix CVE-2023-29453?

    To fix CVE-2023-29453, update Zabbix Zabbix-agent2 to a version that is not affected (5.0.36 or higher, 6.0.19 or higher, or 6.4.4 or higher).

  • Where can I find more information about CVE-2023-29453?

    You can find more information about CVE-2023-29453 at the following reference: [link](https://support.zabbix.com/browse/ZBX-23388)

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203