Source: zabbix
X-Debbugs-CC: t...@security.debian.org
Severity: normal
Tags: security

Hi,

The following vulnerabilities were published for zabbix.

CVE-2022-46768[0]:
| Arbitrary file read vulnerability exists in Zabbix Web Service Report
| Generation, which listens on the port 10053. The service does not have
| proper validation for URL parameters before reading the files.

https://support.zabbix.com/browse/ZBX-22087

CVE-2022-43515[1]:
| Zabbix Frontend provides a feature that allows admins to maintain the
| installation and ensure that only certain IP addresses can access it.
| In this way, any user will not be able to access the Zabbix Frontend
| while it is being maintained and possible sensitive data will be
| prevented from being disclosed. An attacker can bypass this protection
| and access the instance using IP address not listed in the defined
| range.

https://support.zabbix.com/browse/ZBX-22050

If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2022-46768
    https://www.cve.org/CVERecord?id=CVE-2022-46768
[1] https://security-tracker.debian.org/tracker/CVE-2022-43515
    https://www.cve.org/CVERecord?id=CVE-2022-43515

Please adjust the affected versions in the BTS as needed.

Reply via email to