Session cookie leakage via URL widget in scheduled reports
CVE-2023-32725 Published on December 18, 2023
Leak of zbx_session cookie when using a scheduled report that includes a dashboard with a URL widget.
The website configured in the URL widget will receive a session cookie when testing or executing scheduled reports. The received session cookie can then be used to access the frontend as the particular user.
Vulnerability Analysis
CVE-2023-32725 can be exploited with network access, requires user interaction. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to be critical as this vulnerability has a high impact to the confidentiality, integrity and availability of this component.
Weakness Type
Reliance on Cookies without Validation and Integrity Checking
The application relies on the existence or values of cookies when performing security-critical operations, but it does not properly ensure that the setting is valid for the associated user. Attackers can easily modify cookies, within the browser or by implementing the client-side code outside of the browser. Reliance on cookies without detailed validation and integrity checking can allow attackers to bypass authentication, conduct injection attacks such as SQL injection and cross-site scripting, or otherwise modify inputs in unexpected ways.
Products Associated with CVE-2023-32725
stack.watch emails you whenever new vulnerabilities are published in Zabbix Server or Zabbix Frontend. Just hit a watch button to start following.
Affected Versions
Zabbix:- Version 6.0.0 , <= 6.0.21 is affected.
- Version 6.4.0, <= 6.4.6 is affected.
- Version 7.0.0alpha1 , <= 7.0.0alpha3 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.