ALT-BU-2017-3579-1
Branch c7 update bulletin.
Closed vulnerabilities
BDU:2018-00371
Уязвимость универсальной системы мониторинга Zabbix, связанная с неверным ограничением XML-ссылок на внешние объекты, позволяющая нарушителю выполнить произвольный код или прочитать произвольные файлы
BDU:2020-04792
Уязвимость универсальной системы мониторинга Zabbix, связанная с ошибками управления генерацией кода, позволяющая нарушителю выполнить произвольный код
Modified: 2024-11-21
CVE-2014-3005
XML external entity (XXE) vulnerability in Zabbix 1.8.x before 1.8.21rc1, 2.0.x before 2.0.13rc1, 2.2.x before 2.2.5rc1, and 2.3.x before 2.3.2 allows remote attackers to read arbitrary files or potentially execute arbitrary code via a crafted DTD in an XML request.
- http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134885.html
- http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134909.html
- http://seclists.org/fulldisclosure/2014/Jun/87
- http://www.securityfocus.com/bid/68075
- https://bugzilla.redhat.com/show_bug.cgi?id=1110496
- https://support.zabbix.com/browse/ZBX-8151
- https://web.archive.org/web/20140622034155/http://www.pnigos.com:80/?p=273
- http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134885.html
- http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134909.html
- http://seclists.org/fulldisclosure/2014/Jun/87
- http://www.securityfocus.com/bid/68075
- https://bugzilla.redhat.com/show_bug.cgi?id=1110496
- https://support.zabbix.com/browse/ZBX-8151
- https://web.archive.org/web/20140622034155/http://www.pnigos.com:80/?p=273
Modified: 2025-04-12
CVE-2014-9450
Multiple SQL injection vulnerabilities in chart_bar.php in the frontend in Zabbix before 1.8.22, 2.0.x before 2.0.14, and 2.2.x before 2.2.8 allow remote attackers to execute arbitrary SQL commands via the (1) itemid or (2) periods parameter.
- http://secunia.com/advisories/61554
- http://www.zabbix.com/rn1.8.22.php
- http://www.zabbix.com/rn2.0.14.php
- http://www.zabbix.com/rn2.2.8.php
- https://support.zabbix.com/browse/ZBX-8582
- http://secunia.com/advisories/61554
- http://www.zabbix.com/rn1.8.22.php
- http://www.zabbix.com/rn2.0.14.php
- http://www.zabbix.com/rn2.2.8.php
- https://support.zabbix.com/browse/ZBX-8582
Modified: 2025-04-20
CVE-2016-10134
SQL injection vulnerability in Zabbix before 2.2.14 and 3.0 before 3.0.4 allows remote attackers to execute arbitrary SQL commands via the toggle_ids array parameter in latest.php.
- http://www.debian.org/security/2017/dsa-3802
- http://www.openwall.com/lists/oss-security/2017/01/12/4
- http://www.openwall.com/lists/oss-security/2017/01/13/4
- http://www.securityfocus.com/bid/95423
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=850936
- https://code610.blogspot.com/2017/10/zbx-11023-quick-autopsy.html
- https://support.zabbix.com/browse/ZBX-11023
- http://www.debian.org/security/2017/dsa-3802
- http://www.openwall.com/lists/oss-security/2017/01/12/4
- http://www.openwall.com/lists/oss-security/2017/01/13/4
- http://www.securityfocus.com/bid/95423
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=850936
- https://code610.blogspot.com/2017/10/zbx-11023-quick-autopsy.html
- https://support.zabbix.com/browse/ZBX-11023
Modified: 2024-11-21
CVE-2016-10742
Zabbix before 2.2.21rc1, 3.x before 3.0.13rc1, 3.1.x and 3.2.x before 3.2.10rc1, and 3.3.x and 3.4.x before 3.4.4rc1 allows open redirect via the request parameter.
- https://lists.debian.org/debian-lts-announce/2019/03/msg00010.html
- https://lists.debian.org/debian-lts-announce/2020/11/msg00039.html
- https://support.zabbix.com/browse/ZBX-10272
- https://support.zabbix.com/browse/ZBX-13133
- https://lists.debian.org/debian-lts-announce/2019/03/msg00010.html
- https://lists.debian.org/debian-lts-announce/2020/11/msg00039.html
- https://support.zabbix.com/browse/ZBX-10272
- https://support.zabbix.com/browse/ZBX-13133
Modified: 2025-04-20
CVE-2016-4338
The mysql user parameter configuration script (userparameter_mysql.conf) in the agent in Zabbix before 2.0.18, 2.2.x before 2.2.13, and 3.0.x before 3.0.3, when used with a shell other than bash, allows context-dependent attackers to execute arbitrary code or SQL commands via the mysql.size parameter.
- http://packetstormsecurity.com/files/136898/Zabbix-Agent-3.0.1-mysql.size-Shell-Command-Injection.html
- http://seclists.org/fulldisclosure/2016/May/9
- http://www.securityfocus.com/archive/1/538258/100/0/threaded
- http://www.securityfocus.com/bid/89631
- https://security.gentoo.org/glsa/201612-42
- https://support.zabbix.com/browse/ZBX-10741
- https://www.exploit-db.com/exploits/39769/
- https://www.zabbix.com/documentation/2.0/manual/introduction/whatsnew2018#miscellaneous_improvements
- https://www.zabbix.com/documentation/2.2/manual/introduction/whatsnew2213#miscellaneous_improvements
- https://www.zabbix.com/documentation/3.0/manual/introduction/whatsnew303#miscellaneous_improvements
- http://packetstormsecurity.com/files/136898/Zabbix-Agent-3.0.1-mysql.size-Shell-Command-Injection.html
- http://seclists.org/fulldisclosure/2016/May/9
- http://www.securityfocus.com/archive/1/538258/100/0/threaded
- http://www.securityfocus.com/bid/89631
- https://security.gentoo.org/glsa/201612-42
- https://support.zabbix.com/browse/ZBX-10741
- https://www.exploit-db.com/exploits/39769/
- https://www.zabbix.com/documentation/2.0/manual/introduction/whatsnew2018#miscellaneous_improvements
- https://www.zabbix.com/documentation/2.2/manual/introduction/whatsnew2213#miscellaneous_improvements
- https://www.zabbix.com/documentation/3.0/manual/introduction/whatsnew303#miscellaneous_improvements
Modified: 2024-11-21
CVE-2020-11800
Zabbix Server 2.2.x and 3.0.x before 3.0.31, and 3.2 allows remote attackers to execute arbitrary code.
- http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00007.html
- https://lists.debian.org/debian-lts-announce/2020/11/msg00039.html
- https://support.zabbix.com/browse/DEV-1538
- https://support.zabbix.com/browse/ZBX-17600
- https://support.zabbix.com/browse/ZBXSEC-30
- http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00007.html
- https://lists.debian.org/debian-lts-announce/2020/11/msg00039.html
- https://support.zabbix.com/browse/DEV-1538
- https://support.zabbix.com/browse/ZBX-17600
- https://support.zabbix.com/browse/ZBXSEC-30
Modified: 2024-11-21
CVE-2020-15803
Zabbix before 3.0.32rc1, 4.x before 4.0.22rc1, 4.1.x through 4.4.x before 4.4.10rc1, and 5.x before 5.0.2rc1 allows stored XSS in the URL Widget.
- http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00007.html
- https://lists.debian.org/debian-lts-announce/2020/08/msg00007.html
- https://lists.debian.org/debian-lts-announce/2021/04/msg00018.html
- https://lists.debian.org/debian-lts-announce/2023/04/msg00013.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2ZHHIUYIVA5GZYLKW6A5G6HRELPOBZFE/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TIRIMOXH6GSBAANDCB3ANLJK4CRLWRXT/
- https://support.zabbix.com/browse/ZBX-18057
- http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00007.html
- https://lists.debian.org/debian-lts-announce/2020/08/msg00007.html
- https://lists.debian.org/debian-lts-announce/2021/04/msg00018.html
- https://lists.debian.org/debian-lts-announce/2023/04/msg00013.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2ZHHIUYIVA5GZYLKW6A5G6HRELPOBZFE/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TIRIMOXH6GSBAANDCB3ANLJK4CRLWRXT/
- https://support.zabbix.com/browse/ZBX-18057