First published: Fri Feb 09 2024(Updated: )
The cause of vulnerability is improper validation of form input field “Name” on Graph page in Items section.
Credit: security@zabbix.com
Affected Software | Affected Version | How to fix |
---|---|---|
Zabbix Server | >=5.0.0<5.0.40 | |
Zabbix Server | >=6.0.0<6.0.24 | |
Zabbix Server | >=6.4.0<6.4.9 | |
Zabbix Server | =7.0.0-alpha1 | |
Zabbix Server | =7.0.0-alpha2 | |
Zabbix Server | =7.0.0-alpha3 | |
Zabbix Server | =7.0.0-alpha4 | |
Zabbix Server | =7.0.0-alpha5 | |
Zabbix Server | =7.0.0-alpha6 | |
Zabbix Server | =7.0.0-alpha7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-22119 is not explicitly rated but is linked to improper validation which can lead to security risks.
To fix CVE-2024-22119, ensure that proper input validation is implemented for the 'Name' form field on the Graph page.
CVE-2024-22119 affects Zabbix versions from 5.0.0 to 5.0.40, from 6.0.0 to 6.0.24, from 6.4.0 to 6.4.9, and various alpha versions of 7.0.0.
There are no documented workarounds for CVE-2024-22119, so applying the fix is the recommended action.
CVE-2024-22119 was reported in the context of an analysis by Zabbix, with further details outlined in their issue tracking system.