An authenticated user can create a link with reflected Javascript code inside it for services’ page and send it to other users. The payload can be executed only with a known CSRF token value of the victim, which is changed periodically and is difficult to predict. Malicious code has access to all the same objects as the rest of the web page and can make arbitrary modifications to the contents of the page being displayed to a victim during social engineering attacks.
Advisories
Source ID Title
Debian DLA Debian DLA DLA-2980-1 zabbix security update
Debian DLA Debian DLA DLA-3390-1 zabbix security update
Debian DLA Debian DLA DLA-3909-1 zabbix security update
EUVD EUVD EUVD-2022-29672 An authenticated user can create a link with reflected Javascript code inside it for services’ page and send it to other users. The payload can be executed only with a known CSRF token value of the victim, which is changed periodically and is difficult to predict. Malicious code has access to all the same objects as the rest of the web page and can make arbitrary modifications to the contents of the page being displayed to a victim during social engineering attacks.
Fixes

Solution

To remediate this vulnerability, apply the updates


Workaround

No workaround

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: Zabbix

Published:

Updated: 2024-09-17T03:42:34.180Z

Reserved: 2022-02-10T00:00:00

Link: CVE-2022-24917

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-03-09T20:15:08.687

Modified: 2024-11-21T06:51:23.127

Link: CVE-2022-24917

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.