CVE-2021-27927
Summary
| CVE | CVE-2021-27927 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2021-03-03 17:15:00 UTC |
| Updated | 2023-04-12 16:15:00 UTC |
| Description | In Zabbix from 4.0.x before 4.0.28rc1, 5.0.0alpha1 before 5.0.10rc1, 5.2.x before 5.2.6rc1, and 5.4.0alpha1 before 5.4.0beta2, the CControllerAuthenticationUpdate controller lacks a CSRF protection mechanism. The code inside this controller calls diableSIDValidation inside the init() method. An attacker doesn't have to know Zabbix user login credentials, but has to know the correct Zabbix URL and contact information of an existing user with sufficient privileges. |
Risk And Classification
Problem Types: CWE-352
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| [ZBX-18942] CControllerAuthenticationUpdate controller is not protected by a CSRF token (CVE-2021-27927) - ZABBIX SUPPORT | MISC | support.zabbix.com | Issue Tracking, Patch, Vendor Advisory |
| [SECURITY] [DLA 3390-1] zabbix security update | MLIST | lists.debian.org | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 174907 SUSE Enterprise Linux Security Update for zabbix (SUSE-SU-2021:0990-1)
- 180546 Debian Security Update for zabbix (CVE-2021-27927)
- 181729 Debian Security Update for zabbix (DLA 3390-1)
- 181731 Debian Security Update for zabbix (DLA 3390-1)
- 501335 Alpine Linux Security Update for zabbix
- 501726 Alpine Linux Security Update for zabbix
- 505596 Alpine Linux Security Update for zabbix
- 751719 OpenSUSE Security Update for zabbix (openSUSE-SU-2022:0036-1)