An authenticated user can create a link with reflected Javascript code inside it for the discovery page and send it to other users. The payload can be executed only with a known CSRF token value of the victim, which is changed periodically and is difficult to predict.
Solution:
Workaround:
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://support.zabbix.com/browse/ZBX-21306 | issue tracking patch vendor advisory |
https://lists.debian.org/debian-lts-announce/2023/04/msg00013.html | mailing list |
https://lists.debian.org/debian-lts-announce/2023/08/msg00027.html | mailing list |