Description
An authenticated user can create a link with reflected Javascript code inside it for items’ page and send it to other users. The payload can be executed only with a known CSRF token value of the victim, which is changed periodically and is difficult to predict. Malicious code has access to all the same objects as the rest of the web page and can make arbitrary modifications to the contents of the page being displayed to a victim during social engineering attacks.
No analysis available yet.
Remediation
Vendor Solution
To remediate this vulnerability, apply the updates
Vendor Workaround
No workaround
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3909-1 | zabbix security update |
EUVD |
EUVD-2022-29673 | An authenticated user can create a link with reflected Javascript code inside it for items’ page and send it to other users. The payload can be executed only with a known CSRF token value of the victim, which is changed periodically and is difficult to predict. Malicious code has access to all the same objects as the rest of the web page and can make arbitrary modifications to the contents of the page being displayed to a victim during social engineering attacks. |
References
History
Mon, 03 Nov 2025 22:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Status: PUBLISHED
Assigner: Zabbix
Published:
Updated: 2025-11-03T21:46:09.598Z
Reserved: 2022-02-10T00:00:00.000Z
Link: CVE-2022-24918
No data.
Status : Modified
Published: 2022-03-09T20:15:08.737
Modified: 2025-11-03T22:15:57.613
Link: CVE-2022-24918
No data.
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
EUVD