Source: zabbix
X-Debbugs-CC: t...@security.debian.org
Severity: grave
Tags: security

Hi,

The following vulnerabilities were published for zabbix.

CVE-2024-36464[0]:
| When exporting media types, the password is exported in the YAML in
| plain text. This appears to be a best practices type issue and may
| have no actual impact. The user would need to have permissions to
| access the media types and therefore would be expected to have
| access to these passwords.

https://support.zabbix.com/browse/ZBX-25630

CVE-2024-36467[1]:
| An authenticated user with API access (e.g.: user with default User
| role), more specifically a user with access to the user.update API
| endpoint is enough to be able to add themselves to any group (e.g.:
| Zabbix Administrators), except to groups that are disabled or having
| restricted GUI access.

https://support.zabbix.com/browse/ZBX-25614

CVE-2024-36468[2]:
| The reported vulnerability is a stack buffer overflow in the
| zbx_snmp_cache_handle_engineid function within the Zabbix
| server/proxy code. This issue occurs when copying data from
| session->securityEngineID to local_record.engineid without proper
| bounds checking.

https://support.zabbix.com/browse/ZBX-25621

CVE-2024-42326[3]:
| There was discovered a use after free bug in browser.c in the
| es_browser_get_variant function

https://support.zabbix.com/browse/ZBX-25622

CVE-2024-42327[4]:
| A non-admin user account on the Zabbix frontend with the default
| User role, or with any other role that gives API access can exploit
| this vulnerability. An SQLi exists in the CUser class in the
| addRelatedObjects function, this function is being called from the
| CUser.get function which is available for every user who has API
| access.

https://support.zabbix.com/browse/ZBX-25623

CVE-2024-42328[5]:
| When the webdriver for the Browser object downloads data from a HTTP
| server, the data pointer is set to NULL and is allocated only in
| curl_write_cb when receiving data. If the server's response is an
| empty document, then wd->data in the code below will remain NULL and
| an attempt to read from it will result in a crash.

https://support.zabbix.com/browse/ZBX-25624

CVE-2024-42329[6]:
| The webdriver for the Browser object expects an error object to be
| initialized when the webdriver_session_query function fails. But
| this function can fail for various reasons without an error
| description and then the wd->error will be NULL and trying to read
| from it will result in a crash.

https://support.zabbix.com/browse/ZBX-25625

CVE-2024-42330[7]:
| The HttpRequest object allows to get the HTTP headers from the
| server's response after sending the request. The problem is that the
| returned strings are created directly from the data returned by the
| server and are not correctly encoded for JavaScript. This allows to
| create internal strings that can be used to access hidden properties
| of objects.

https://support.zabbix.com/browse/ZBX-25626

CVE-2024-42331[8]:
| In the src/libs/zbxembed/browser.c file, the es_browser_ctor method
| retrieves a heap pointer from the Duktape JavaScript engine. This
| heap pointer is subsequently utilized by the browser_push_error
| method in the src/libs/zbxembed/browser_error.c file. A use-after-
| free bug can occur at this stage if the wd->browser heap pointer is
| freed by garbage collection.

https://support.zabbix.com/browse/ZBX-25627

CVE-2024-42332[9]:
| The researcher is showing that due to the way the SNMP trap log is
| parsed, an attacker can craft an SNMP trap with additional lines of
| information and have forged data show in the Zabbix UI. This attack
| requires SNMP auth to be off and/or the attacker to know the
| community/auth details. The attack requires an SNMP item to be
| configured as text on the target host.

https://support.zabbix.com/browse/ZBX-25628

CVE-2024-42333[10]:
| The researcher is showing that it is possible to leak a small amount
| of Zabbix Server memory using an out of bounds read in
| src/libs/zbxmedia/email.c

https://support.zabbix.com/browse/ZBX-25629

If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2024-36464
    https://www.cve.org/CVERecord?id=CVE-2024-36464
[1] https://security-tracker.debian.org/tracker/CVE-2024-36467
    https://www.cve.org/CVERecord?id=CVE-2024-36467
[2] https://security-tracker.debian.org/tracker/CVE-2024-36468
    https://www.cve.org/CVERecord?id=CVE-2024-36468
[3] https://security-tracker.debian.org/tracker/CVE-2024-42326
    https://www.cve.org/CVERecord?id=CVE-2024-42326
[4] https://security-tracker.debian.org/tracker/CVE-2024-42327
    https://www.cve.org/CVERecord?id=CVE-2024-42327
[5] https://security-tracker.debian.org/tracker/CVE-2024-42328
    https://www.cve.org/CVERecord?id=CVE-2024-42328
[6] https://security-tracker.debian.org/tracker/CVE-2024-42329
    https://www.cve.org/CVERecord?id=CVE-2024-42329
[7] https://security-tracker.debian.org/tracker/CVE-2024-42330
    https://www.cve.org/CVERecord?id=CVE-2024-42330
[8] https://security-tracker.debian.org/tracker/CVE-2024-42331
    https://www.cve.org/CVERecord?id=CVE-2024-42331
[9] https://security-tracker.debian.org/tracker/CVE-2024-42332
    https://www.cve.org/CVERecord?id=CVE-2024-42332
[10] https://security-tracker.debian.org/tracker/CVE-2024-42333
    https://www.cve.org/CVERecord?id=CVE-2024-42333

Please adjust the affected versions in the BTS as needed.

Reply via email to