Metrics
Affected Vendors & Products
Link | Providers |
---|---|
https://support.zabbix.com/browse/ZBX-25614 |
Wed, 04 Dec 2024 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Zabbix
Zabbix zabbix |
|
CPEs | cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:* | |
Vendors & Products |
Zabbix
Zabbix zabbix |
|
Metrics |
ssvc
|
ssvc
|
Wed, 27 Nov 2024 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 27 Nov 2024 06:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | An authenticated user with API access (e.g.: user with default User role), more specifically a user with access to the user.update API endpoint is enough to be able to add themselves to any group (e.g.: Zabbix Administrators), except to groups that are disabled or having restricted GUI access. | |
Title | Authentication privilege escalation via user groups due to missing authorization checks | |
Weaknesses | CWE-285 | |
References |
| |
Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Zabbix
Published: 2024-11-27T06:16:30.381Z
Updated: 2024-12-04T14:36:54.043Z
Reserved: 2024-05-28T11:21:24.947Z
Link: CVE-2024-36467
Updated: 2024-11-27T14:58:23.765Z
Status : Received
Published: 2024-11-27T07:15:09.080
Modified: 2024-11-27T07:15:09.080
Link: CVE-2024-36467
No data.