URL Validation Scheme Vulnerability: Untrusted Input Parsing
CVE-2023-29456 Published on July 13, 2023

Inefficient URL schema validation
URL validation scheme receives input from a user and then parses it to identify its various components. The validation scheme can ensure that all URL components comply with internet standards.

NVD

Vulnerability Analysis

CVE-2023-29456 is exploitable with network access, requires user interaction and user privileges. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to have a high impact on confidentiality, with no impact on integrity and availability.

Attack Vector:
NETWORK
Attack Complexity:
LOW
Privileges Required:
HIGH
User Interaction:
REQUIRED
Scope:
UNCHANGED
Confidentiality Impact:
HIGH
Integrity Impact:
LOW
Availability Impact:
LOW

Weakness Type

Improper Input Validation

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.


Products Associated with CVE-2023-29456

stack.watch emails you whenever new vulnerabilities are published in Zabbix Frontend or Zabbix. Just hit a watch button to start following.

 
 

Affected Versions

Zabbix:

Exploit Probability

EPSS
0.12%
Percentile
31.49%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.