CVE-2022-23134
Possible view of the setup pages by unauthenticated users if config file already exists
Basic Information
- CVE State
- PUBLISHED
- Reserved Date
- January 11, 2022
- Published Date
- January 13, 2022
- Last Updated
- January 29, 2025
- Vendor
- Zabbix
- Product
- Frontend
- Description
- After the initial setup process, some steps of setup.php file are reachable not only by super-administrators, but by unauthenticated users as well. Malicious actor can pass step checks and potentially change the configuration of Zabbix Frontend.
CVSS Scores
CVSS v3.1
3.7 - LOW
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
SSVC Information
- Exploitation
- active
- Technical Impact
- partial
Exploit Status
- Exploited in the Wild
- Yes (added 2022-02-22 00:00:00 UTC) Source
References
https://support.zabbix.com/browse/ZBX-20384
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6SZYHXINBKCY42ITFSNCYE7KCSF33VRA/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VB6W556GVXOKUYTASTDGL3AI7S3SJHX7/
https://lists.debian.org/debian-lts-announce/2022/02/msg00008.html
Known Exploited Vulnerability Information
Source | Added Date |
---|---|
CISA | 2022-02-22 00:00:00 UTC |
Scanner Integrations
Scanner | URL | Date Detected |
---|---|---|
Nuclei | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2022/CVE-2022-23134.yaml | 2025-04-26 00:00:00 UTC |