Zabbix Frontend IP Bypass in Admin Maintenance Mode
CVE-2022-43515 Published on December 5, 2022
X-Forwarded-For header is active by default causes access to Zabbix sites in maintenance mode
Zabbix Frontend provides a feature that allows admins to maintain the installation and ensure that only certain IP addresses can access it. In this way, any user will not be able to access the Zabbix Frontend while it is being maintained and possible sensitive data will be prevented from being disclosed. An attacker can bypass this protection and access the instance using IP address not listed in the defined range.
Vulnerability Analysis
CVE-2022-43515 can be exploited with network access, and does not require authorization privileges or user interaction. This vulnerability is considered to have a low attack complexity. An automatable proof of concept (POC) exploit exists. The potential impact of an exploit of this vulnerability is considered to have no impact on confidentiality, with no impact on integrity, and no impact on availability.
Weakness Type
Improper Input Validation
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Products Associated with CVE-2022-43515
stack.watch emails you whenever new vulnerabilities are published in Zabbix Frontend or Zabbix. Just hit a watch button to start following.
Affected Versions
Zabbix Frontend:- Version 4.0.0-4.0.44 is affected.
- Version 5.0.0-5.0.29 is affected.
- Version 6.0.0-6.0.9 is affected.
- Version 6.2.0-6.2.4 is affected.
- Version 5.0.30rc1 and below unspecified is unaffected.
- Version 6.0.11rc1 and below unspecified is unaffected.
- Version 6.2.5rc1 and below unspecified is unaffected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.