[Git][security-tracker-team/security-tracker][master] CVE-2024-36464/zabbix not fixed upstream in 6.0.30c1

Tobias Frost (@tobi) tobi at debian.org
Sat Dec 7 12:35:30 GMT 2024



Tobias Frost pushed to branch master at Debian Security Tracker / security-tracker


Commits:
640cf95c by Tobias Frost at 2024-12-07T13:31:11+01:00
CVE-2024-36464/zabbix not fixed upstream in 6.0.30c1

(see
https://support.zabbix.com/browse/ZBX-25630?focusedCommentId=1026630&page=com.atlassian.jira.plugin.system.issuetabpanels%3Acomment-tabpanel#comment-1026630
upstream report)

Quote:
I've just installed 6.0.34 from your Debian repository, and I'm probably holding it wrong, but I *think* I still can reproduce this on 6.0.36

root at isildor2:/etc# dpkg -l 'zabbix*' | grep ^ii
ii  zabbix-agent        1:6.0.36-1+debian12 amd64        Zabbix network monitoring solution - agent
ii  zabbix-apache-conf  1:6.0.36-1+debian12 all          Zabbix network monitoring solution - apache configuration for front-end
ii  zabbix-frontend-php 1:6.0.36-1+debian12 all          Zabbix network monitoring solution - PHP front-end
ii  zabbix-release      1:6.0-5+debian12    all          Zabbix official repository configuration
ii  zabbix-server-mysql 1:6.0.36-1+debian12 amd64        Zabbix network monitoring solution - server (MySQL)
ii  zabbix-sql-scripts  1:6.0.36-1+debian12 all          Zabbix network monitoring solution - sql-scripts

Reproducer:

    Login as Admin
    Create a Media Type
        Type "Email"
        Set Authentication to "Username and Password"
        Enter Username (I've used "test-user")
        Enter Password (I've used "test-password")
        Save
    Select created entry
    Export it

Yields to:

zabbix_export:
  version: '6.0'
  date: '2024-12-07T12:21:30Z'
  media_types:
    - name: test-with-password
      type: EMAIL
      smtp_server: mail.example.com
      smtp_helo: example.com
      smtp_email: zabbix at example.com
      smtp_authentication: PASSWORD
      username: test-user
      password: test-password
      status: DISABLED

- - - - -


1 changed file:

- data/CVE/list


Changes:

=====================================
data/CVE/list
=====================================
@@ -2121,6 +2121,8 @@ CVE-2024-36468 (The reported vulnerability is a stack buffer overflow in the zbx
 CVE-2024-36464 (When exporting media types, the password is exported in the YAML in pl ...)
 	- zabbix <unfixed> (bug #1088689)
 	NOTE: https://support.zabbix.com/browse/ZBX-25630
+	NOTE: Despite upstream claiming fixed in 6.0.30rc1, can reproduce with 6.0.36 (package from upstream)
+	NOTE: Can also reproduce it in 5.0.45 and 7.0.6+dfsg-1.
 CVE-2024-31976 (EnGenius EWS356-FIR 1.1.30 and earlier devices allow a remote attacker ...)
 	NOT-FOR-US: EnGenius EWS356-FIR
 CVE-2024-21703 (This Medium severity Security Misconfiguration vulnerability was intro ...)



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/640cf95c02dc6525dfb27118109529ab7bccce39

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/640cf95c02dc6525dfb27118109529ab7bccce39
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20241207/f4e9cedc/attachment.htm>


More information about the debian-security-tracker-commits mailing list