CVE-2022-24918
Published on: Not Yet Published
Last Modified on: 02/22/2023 05:43:00 PM UTC
Certain versions of Fedora from Fedoraproject contain the following vulnerability:
An authenticated user can create a link with reflected Javascript code inside it for items’ page and send it to other users. The payload can be executed only with a known CSRF token value of the victim, which is changed periodically and is difficult to predict. Malicious code has access to all the same objects as the rest of the web page and can make arbitrary modifications to the contents of the page being displayed to a victim during social engineering attacks.
- CVE-2022-24918 has been assigned by
[email protected] to track the vulnerability - currently rated as MEDIUM severity.
Vulnerability Patch/Work Around
- No workaround
CVSS3 Score: 4.4 - MEDIUM
Attack Vector ⓘ |
Attack Complexity |
Privileges Required |
User Interaction |
---|---|---|---|
NETWORK | HIGH | LOW | REQUIRED |
Scope | Confidentiality Impact |
Integrity Impact |
Availability Impact |
CHANGED | LOW | LOW | NONE |
CVSS2 Score: 2.1 - LOW
Access Vector ⓘ |
Access Complexity |
Authentication |
---|---|---|
NETWORK | HIGH | SINGLE |
Confidentiality Impact |
Integrity Impact |
Availability Impact |
NONE | PARTIAL | NONE |
CVE References
Description | Tags ⓘ | Link |
---|---|---|
[SECURITY] Fedora 35 Update: zabbix-5.0.21-1.fc35 - package-announce - Fedora Mailing-Lists | lists.fedoraproject.org text/html |
![]() |
[SECURITY] Fedora 34 Update: zabbix-5.0.21-1.fc34 - package-announce - Fedora Mailing-Lists | lists.fedoraproject.org text/html |
![]() |
[SECURITY] Fedora 36 Update: zabbix-5.0.21-1.fc36 - package-announce - Fedora Mailing-Lists | lists.fedoraproject.org text/html |
![]() |
[ZBX-20680] Reflected XSSes in Zabbix Frontend (CVE-2022-24349, CVE-2022-24917, CVE-2022-24918, CVE-2022-24919) - ZABBIX SUPPORT | support.zabbix.com text/html |
![]() |
Related QID Numbers
Known Affected Configurations (CPE V2.3)
Type | Vendor | Product | Version | Update | Edition | Language |
---|---|---|---|---|---|---|
Operating System | Fedoraproject | Fedora | 34 | All | All | All |
Operating System | Fedoraproject | Fedora | 35 | All | All | All |
Operating System | Fedoraproject | Fedora | 36 | All | All | All |
Application | Zabbix | Frontend | 6.0 | All | All | All |
Application | Zabbix | Frontend | 6.0.0 | All | All | All |
Application | Zabbix | Frontend | All | All | All | All |
Application | Zabbix | Frontend | All | All | All | All |
- cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*:
- cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*:
- cpe:2.3:o:fedoraproject:fedora:36:*:*:*:*:*:*:*:
- cpe:2.3:a:zabbix:frontend:6.0:*:*:*:*:*:*:*:
- cpe:2.3:a:zabbix:frontend:6.0.0:*:*:*:*:*:*:*:
- cpe:2.3:a:zabbix:frontend:*:*:*:*:*:*:*:*:
- cpe:2.3:a:zabbix:frontend:*:*:*:*:*:*:*:*:
Discovery Credit
internal research
Social Mentions
Source | Title | Posted (UTC) |
---|---|---|
![]() |
CVE-2022-24918 : An authenticated user can create a link with reflected Javascript code inside it for items’ page a… twitter.com/i/web/status/1… | 2022-03-09 19:36:00 |
![]() |
CVE-2022-24918 | 2022-03-09 20:38:37 |