vulnerability
SUSE: CVE-2022-23134: SUSE Linux Security Advisory
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
5 | (AV:N/AC:L/Au:N/C:N/I:P/A:N) | Jan 13, 2022 | Feb 17, 2022 | Oct 26, 2022 |
Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:P/A:N)
Published
Jan 13, 2022
Added
Feb 17, 2022
Modified
Oct 26, 2022
Description
After the initial setup process, some steps of setup.php file are reachable not only by super-administrators, but by unauthenticated users as well. Malicious actor can pass step checks and potentially change the configuration of Zabbix Frontend.
Solution(s)
suse-upgrade-zabbix-agentsuse-upgrade-zabbix-java-gatewaysuse-upgrade-zabbix-phpfrontendsuse-upgrade-zabbix-proxysuse-upgrade-zabbix-proxy-mysqlsuse-upgrade-zabbix-proxy-postgresqlsuse-upgrade-zabbix-proxy-sqlitesuse-upgrade-zabbix-serversuse-upgrade-zabbix-server-mysqlsuse-upgrade-zabbix-server-postgresql

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.