An authenticated user can create a link with reflected Javascript code inside it for the discovery page and send it to other users. The payload can be executed only with a known CSRF token value of the victim, which is changed periodically and is difficult to predict.
References
Link | Resource |
---|---|
https://lists.debian.org/debian-lts-announce/2023/04/msg00013.html | |
https://lists.debian.org/debian-lts-announce/2023/08/msg00027.html | |
https://support.zabbix.com/browse/ZBX-21306 | Issue Tracking Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2022-07-06 11:15
Updated : 2023-08-22 19:16
NVD link : CVE-2022-35229
Mitre link : CVE-2022-35229
CVE.ORG link : CVE-2022-35229
JSON object : View
Products Affected
zabbix
- zabbix
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')