ALT-BU-2017-3579-1
Branch c7 update bulletin.
Closed vulnerabilities
BDU:2018-00371
Уязвимость универсальной системы мониторинга Zabbix, связанная с неверным ограничением XML-ссылок на внешние объекты, позволяющая нарушителю выполнить произвольный код или прочитать произвольные файлы
BDU:2020-04792
Уязвимость универсальной системы мониторинга Zabbix, связанная с ошибками управления генерацией кода, позволяющая нарушителю выполнить произвольный код
Modified: 2024-11-21
CVE-2014-3005
XML external entity (XXE) vulnerability in Zabbix 1.8.x before 1.8.21rc1, 2.0.x before 2.0.13rc1, 2.2.x before 2.2.5rc1, and 2.3.x before 2.3.2 allows remote attackers to read arbitrary files or potentially execute arbitrary code via a crafted DTD in an XML request.
- FEDORA-2014-7594
- FEDORA-2014-7594
- FEDORA-2014-7603
- FEDORA-2014-7603
- 20140617 [CVE-2014-3005]Zabbix 1.8.x-2.2.x Local File Inclusion via XXE Attack
- 20140617 [CVE-2014-3005]Zabbix 1.8.x-2.2.x Local File Inclusion via XXE Attack
- 68075
- 68075
- https://bugzilla.redhat.com/show_bug.cgi?id=1110496
- https://bugzilla.redhat.com/show_bug.cgi?id=1110496
- https://support.zabbix.com/browse/ZBX-8151
- https://support.zabbix.com/browse/ZBX-8151
- https://web.archive.org/web/20140622034155/http://www.pnigos.com:80/?p=273
- https://web.archive.org/web/20140622034155/http://www.pnigos.com:80/?p=273
Modified: 2024-11-21
CVE-2014-9450
Multiple SQL injection vulnerabilities in chart_bar.php in the frontend in Zabbix before 1.8.22, 2.0.x before 2.0.14, and 2.2.x before 2.2.8 allow remote attackers to execute arbitrary SQL commands via the (1) itemid or (2) periods parameter.
- 61554
- 61554
- http://www.zabbix.com/rn1.8.22.php
- http://www.zabbix.com/rn1.8.22.php
- http://www.zabbix.com/rn2.0.14.php
- http://www.zabbix.com/rn2.0.14.php
- http://www.zabbix.com/rn2.2.8.php
- http://www.zabbix.com/rn2.2.8.php
- https://support.zabbix.com/browse/ZBX-8582
- https://support.zabbix.com/browse/ZBX-8582
Modified: 2024-11-21
CVE-2016-10134
SQL injection vulnerability in Zabbix before 2.2.14 and 3.0 before 3.0.4 allows remote attackers to execute arbitrary SQL commands via the toggle_ids array parameter in latest.php.
- DSA-3802
- DSA-3802
- [oss-security] 20170112 CVE Request: Zabbix: SQL injection vulnerabilities in "Latest data"
- [oss-security] 20170112 CVE Request: Zabbix: SQL injection vulnerabilities in "Latest data"
- [oss-security] 20170112 Re: CVE Request: Zabbix: SQL injection vulnerabilities in "Latest data"
- [oss-security] 20170112 Re: CVE Request: Zabbix: SQL injection vulnerabilities in "Latest data"
- 95423
- 95423
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=850936
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=850936
- https://code610.blogspot.com/2017/10/zbx-11023-quick-autopsy.html
- https://code610.blogspot.com/2017/10/zbx-11023-quick-autopsy.html
- https://support.zabbix.com/browse/ZBX-11023
- https://support.zabbix.com/browse/ZBX-11023
Modified: 2024-11-21
CVE-2016-10742
Zabbix before 2.2.21rc1, 3.x before 3.0.13rc1, 3.1.x and 3.2.x before 3.2.10rc1, and 3.3.x and 3.4.x before 3.4.4rc1 allows open redirect via the request parameter.
- [debian-lts-announce] 20190311 [SECURITY] [DLA 1708-1] zabbix security update
- [debian-lts-announce] 20190311 [SECURITY] [DLA 1708-1] zabbix security update
- [debian-lts-announce] 20201121 [SECURITY] [DLA 2461-1] zabbix security update
- [debian-lts-announce] 20201121 [SECURITY] [DLA 2461-1] zabbix security update
- https://support.zabbix.com/browse/ZBX-10272
- https://support.zabbix.com/browse/ZBX-10272
- https://support.zabbix.com/browse/ZBX-13133
- https://support.zabbix.com/browse/ZBX-13133
Modified: 2024-11-21
CVE-2016-4338
The mysql user parameter configuration script (userparameter_mysql.conf) in the agent in Zabbix before 2.0.18, 2.2.x before 2.2.13, and 3.0.x before 3.0.3, when used with a shell other than bash, allows context-dependent attackers to execute arbitrary code or SQL commands via the mysql.size parameter.
- http://packetstormsecurity.com/files/136898/Zabbix-Agent-3.0.1-mysql.size-Shell-Command-Injection.html
- http://packetstormsecurity.com/files/136898/Zabbix-Agent-3.0.1-mysql.size-Shell-Command-Injection.html
- 20160503 CVE-2016-4338: Zabbix Agent 3.0.1 mysql.size shell command injection
- 20160503 CVE-2016-4338: Zabbix Agent 3.0.1 mysql.size shell command injection
- 20160503 CVE-2016-4338: Zabbix Agent 3.0.1 mysql.size shell command injection
- 20160503 CVE-2016-4338: Zabbix Agent 3.0.1 mysql.size shell command injection
- 89631
- 89631
- GLSA-201612-42
- GLSA-201612-42
- https://support.zabbix.com/browse/ZBX-10741
- https://support.zabbix.com/browse/ZBX-10741
- 39769
- 39769
- https://www.zabbix.com/documentation/2.0/manual/introduction/whatsnew2018#miscellaneous_improvements
- https://www.zabbix.com/documentation/2.0/manual/introduction/whatsnew2018#miscellaneous_improvements
- https://www.zabbix.com/documentation/2.2/manual/introduction/whatsnew2213#miscellaneous_improvements
- https://www.zabbix.com/documentation/2.2/manual/introduction/whatsnew2213#miscellaneous_improvements
- https://www.zabbix.com/documentation/3.0/manual/introduction/whatsnew303#miscellaneous_improvements
- https://www.zabbix.com/documentation/3.0/manual/introduction/whatsnew303#miscellaneous_improvements
Modified: 2024-11-21
CVE-2020-11800
Zabbix Server 2.2.x and 3.0.x before 3.0.31, and 3.2 allows remote attackers to execute arbitrary code.
- http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00007.html
- [debian-lts-announce] 20201121 [SECURITY] [DLA 2461-1] zabbix security update
- https://support.zabbix.com/browse/DEV-1538
- https://support.zabbix.com/browse/ZBX-17600
- https://support.zabbix.com/browse/ZBXSEC-30
- http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00007.html
- https://support.zabbix.com/browse/ZBXSEC-30
- https://support.zabbix.com/browse/ZBX-17600
- https://support.zabbix.com/browse/DEV-1538
- [debian-lts-announce] 20201121 [SECURITY] [DLA 2461-1] zabbix security update
Modified: 2024-11-21
CVE-2020-15803
Zabbix before 3.0.32rc1, 4.x before 4.0.22rc1, 4.1.x through 4.4.x before 4.4.10rc1, and 5.x before 5.0.2rc1 allows stored XSS in the URL Widget.
- openSUSE-SU-2020:1604
- openSUSE-SU-2020:1604
- [debian-lts-announce] 20200803 [SECURITY] [DLA 2311-1] zabbix security update
- [debian-lts-announce] 20200803 [SECURITY] [DLA 2311-1] zabbix security update
- [debian-lts-announce] 20210421 [SECURITY] [DLA 2631-1] zabbix security update
- [debian-lts-announce] 20210421 [SECURITY] [DLA 2631-1] zabbix security update
- [debian-lts-announce] 20230412 [SECURITY] [DLA 3390-1] zabbix security update
- [debian-lts-announce] 20230412 [SECURITY] [DLA 3390-1] zabbix security update
- FEDORA-2020-02cf7850ca
- FEDORA-2020-02cf7850ca
- FEDORA-2020-519516feec
- FEDORA-2020-519516feec
- https://support.zabbix.com/browse/ZBX-18057
- https://support.zabbix.com/browse/ZBX-18057