6.1 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
4.3 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:N/I:P/A:N
0.081 Low
EPSS
Percentile
94.2%
From: Sylvain Beucler <[email protected]>
To: [email protected]
Subject: [SECURITY] [DLA 2631-1] zabbix security update
Debian LTS Advisory DLA-2631-1 [email protected]
https://www.debian.org/lts/security/
April 21, 2021 https://wiki.debian.org/LTS
Package : zabbix
Version : 1:3.0.32+dfsg-0+deb9u1
CVE ID : CVE-2019-15132 CVE-2020-15803
Debian Bug : 935027 966146
Multiple vulnerabilities were discovered in Zabbix, a network
monitoring solution. An attacker may enumerate valid users and
redirect to external links through the zabbix web frontend.
CVE-2019-15132
Zabbix allows User Enumeration. With login requests, it is
possible to enumerate application usernames based on the
variability of server responses (e.g., the "Login name or password
is incorrect" and "No permissions for system access" messages, or
just blocking for a number of seconds). This affects both
api_jsonrpc.php and index.php.
CVE-2020-15803
Zabbix allows stored XSS in the URL Widget. This fix was
mistakenly dropped in previous upload 1:3.0.31+dfsg-0+deb9u1.
This update also includes several other bug fixes and
improvements. For more information please refer to the upstream
changelog file.
For Debian 9 stretch, these problems have been fixed in version
1:3.0.32+dfsg-0+deb9u1.
We recommend that you upgrade your zabbix packages.
For the detailed security status of zabbix please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/zabbix
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
6.1 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
4.3 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:N/I:P/A:N
0.081 Low
EPSS
Percentile
94.2%