Security
Headlines
HeadlinesLatestCVEs

Headline

Ubuntu Security Notice USN-6751-1

Ubuntu Security Notice 6751-1 - It was discovered that Zabbix incorrectly handled input data in the discovery and graphs pages. A remote authenticated attacker could possibly use this issue to perform reflected cross-site scripting attacks.

Packet Storm
#sql#xss#vulnerability#ubuntu#java#php#auth

==========================================================================

Ubuntu Security Notice USN-6751-1

April 25, 2024

zabbix vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 20.04 LTS (Available with Ubuntu Pro)
  • Ubuntu 18.04 LTS (Available with Ubuntu Pro)
  • Ubuntu 16.04 LTS (Available with Ubuntu Pro)
  • Ubuntu 14.04 LTS (Available with Ubuntu Pro)

Summary:

Zabbix could allow reflected cross-site scripting (XSS) attacks.

Software Description:

  • zabbix: Open-source monitoring software tool for diverse IT components

Details:

It was discovered that Zabbix incorrectly handled input data in the
discovery and graphs pages. A remote authenticated attacker could possibly
use this issue to perform reflected cross-site scripting (XSS) attacks.
(CVE-2022-35229, CVE-2022-35230)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 20.04 LTS (Available with Ubuntu Pro):
zabbix-agent 1:4.0.17+dfsg-1ubuntu0.1~esm1
zabbix-frontend-php 1:4.0.17+dfsg-1ubuntu0.1~esm1
zabbix-java-gateway 1:4.0.17+dfsg-1ubuntu0.1~esm1
zabbix-proxy-mysql 1:4.0.17+dfsg-1ubuntu0.1~esm1
zabbix-proxy-pgsql 1:4.0.17+dfsg-1ubuntu0.1~esm1
zabbix-proxy-sqlite3 1:4.0.17+dfsg-1ubuntu0.1~esm1
zabbix-server-mysql 1:4.0.17+dfsg-1ubuntu0.1~esm1
zabbix-server-pgsql 1:4.0.17+dfsg-1ubuntu0.1~esm1

Ubuntu 18.04 LTS (Available with Ubuntu Pro):
zabbix-agent 1:3.0.12+dfsg-1ubuntu0.1~esm3
zabbix-frontend-php 1:3.0.12+dfsg-1ubuntu0.1~esm3
zabbix-java-gateway 1:3.0.12+dfsg-1ubuntu0.1~esm3
zabbix-proxy-mysql 1:3.0.12+dfsg-1ubuntu0.1~esm3
zabbix-proxy-pgsql 1:3.0.12+dfsg-1ubuntu0.1~esm3
zabbix-proxy-sqlite3 1:3.0.12+dfsg-1ubuntu0.1~esm3
zabbix-server-mysql 1:3.0.12+dfsg-1ubuntu0.1~esm3
zabbix-server-pgsql 1:3.0.12+dfsg-1ubuntu0.1~esm3

Ubuntu 16.04 LTS (Available with Ubuntu Pro):
zabbix-agent 1:2.4.7+dfsg-2ubuntu2.1+esm3
zabbix-frontend-php 1:2.4.7+dfsg-2ubuntu2.1+esm3
zabbix-java-gateway 1:2.4.7+dfsg-2ubuntu2.1+esm3
zabbix-proxy-mysql 1:2.4.7+dfsg-2ubuntu2.1+esm3
zabbix-proxy-pgsql 1:2.4.7+dfsg-2ubuntu2.1+esm3
zabbix-proxy-sqlite3 1:2.4.7+dfsg-2ubuntu2.1+esm3
zabbix-server-mysql 1:2.4.7+dfsg-2ubuntu2.1+esm3
zabbix-server-pgsql 1:2.4.7+dfsg-2ubuntu2.1+esm3

Ubuntu 14.04 LTS (Available with Ubuntu Pro):
zabbix-agent 1:2.2.2+dfsg-1ubuntu1+esm5
zabbix-frontend-php 1:2.2.2+dfsg-1ubuntu1+esm5
zabbix-java-gateway 1:2.2.2+dfsg-1ubuntu1+esm5
zabbix-proxy-mysql 1:2.2.2+dfsg-1ubuntu1+esm5
zabbix-proxy-pgsql 1:2.2.2+dfsg-1ubuntu1+esm5
zabbix-proxy-sqlite3 1:2.2.2+dfsg-1ubuntu1+esm5
zabbix-server-mysql 1:2.2.2+dfsg-1ubuntu1+esm5
zabbix-server-pgsql 1:2.2.2+dfsg-1ubuntu1+esm5

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-6751-1
https://ubuntu.com/security/notices/USN-6751-1
CVE-2022-35229, CVE-2022-35230

Related news

CVE-2022-35229: [ZBX-21306] Reflected XSS in discovery page of Zabbix Frontend [CVE-2022-35229]

An authenticated user can create a link with reflected Javascript code inside it for the discovery page and send it to other users. The payload can be executed only with a known CSRF token value of the victim, which is changed periodically and is difficult to predict.

CVE-2022-35230: [ZBX-21305] Reflected XSS in graphs page of Zabbix Frontend [CVE-2022-35230]

An authenticated user can create a link with reflected Javascript code inside it for the graphs page and send it to other users. The payload can be executed only with a known CSRF token value of the victim, which is changed periodically and is difficult to predict.

Packet Storm: Latest News

Acronis Cyber Protect/Backup Remote Code Execution