An authenticated user can exploit a reflected XSS vulnerability in Zabbix Frontend, affecting versions 4.0.0-4.0.38, 5.0.0-5.0.20, and 5.4.0-5.4.10. Learn about the impact, technical details, and mitigation steps.
An authenticated user can create a link with reflected Javascript code inside it for services’ page and send it to other users. The payload can be executed only with a known CSRF token value of the victim. The vulnerability affects Zabbix Frontend versions 4.0.0 to 4.0.38, 5.0.0 to 5.0.20, and 5.4.0 to 5.4.10.
Understanding CVE-2022-24917
A reflected Cross-site Scripting (XSS) vulnerability in the service configuration window of Zabbix Frontend.
What is CVE-2022-24917?
It allows an authenticated user to execute malicious JavaScript code on the victim's browser using a crafted link in the services’ page.
The Impact of CVE-2022-24917
The attacker can manipulate the victim's web page content, leading to potential social engineering attacks.
Technical Details of CVE-2022-24917
Vulnerability Description
The vulnerability allows the execution of arbitrary code on the victim's browser by reflecting Javascript code in a crafted link.
Affected Systems and Versions
Zabbix Frontend versions 4.0.0 to 4.0.38, 5.0.0 to 5.0.20, and 5.4.0 to 5.4.10 are affected.
Exploitation Mechanism
An authenticated user sends a link with malicious Javascript code to other users to execute the payload with a known CSRF token value.
Mitigation and Prevention
Immediate Steps to Take
No known workarounds are available. Apply the security updates to remediate the vulnerability.
Long-Term Security Practices
Regularly update Zabbix Frontend to the latest version and educate users about the risks of clicking on unknown links.
Patching and Updates
To mitigate this vulnerability, apply the security updates provided by Zabbix to ensure protection against reflected XSS attacks.