First published: Mon Dec 18 2023(Updated: )
The website configured in the URL widget will receive a session cookie when testing or executing scheduled reports. The received session cookie can then be used to access the frontend as the particular user.
Credit: security@zabbix.com
Affected Software | Affected Version | How to fix |
---|---|---|
Zabbix | >=6.0.0<=6.0.21 | |
Zabbix | >=6.4.0<=6.4.6 | |
Zabbix | =7.0.0-alpha1 | |
Zabbix | =7.0.0-alpha2 | |
Zabbix | =7.0.0-alpha3 | |
Zabbix | >=6.0.0<=6.0.21 | |
Zabbix | >=6.4.0<=6.4.6 | |
Zabbix | =7.0.0-alpha1 | |
Zabbix | =7.0.0-alpha2 | |
Zabbix | =7.0.0-alpha3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-32725 is considered a medium severity vulnerability due to its potential to allow unauthorized access to user sessions.
To mitigate CVE-2023-32725, ensure that you are using updated versions of Zabbix Server and Frontend, at least version 6.0.21 or higher.
CVE-2023-32725 affects Zabbix Server versions from 6.0.0 up to 6.0.21, as well as from 6.4.0 to 6.4.6, plus various alpha versions of 7.0.0.
The impact of CVE-2023-32725 allows potential attackers to access the frontend as the specific user through a stolen session cookie.
CVE-2023-32725 is a server-side vulnerability affecting the Zabbix Server and Frontend configurations.