CVE-2022-35229

Source
https://cve.org/CVERecord?id=CVE-2022-35229
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-35229.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-35229
Downstream
Published
2022-07-06T11:15:08.967Z
Modified
2026-03-13T05:51:51.484321Z
Severity
  • 5.4 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
[none]
Details

An authenticated user can create a link with reflected Javascript code inside it for the discovery page and send it to other users. The payload can be executed only with a known CSRF token value of the victim, which is changed periodically and is difficult to predict.

References

Affected packages

Git / github.com/zabbix/zabbix

Affected ranges

Type
GIT
Repo
https://github.com/zabbix/zabbix
Events
Database specific
{
    "versions": [
        {
            "introduced": "6.0.0"
        },
        {
            "last_affected": "6.0.4"
        }
    ]
}

Affected versions

6.*
6.0.0
6.0.1
6.0.1rc1
6.0.1rc2
6.0.1rc3
6.0.1rc4
6.0.2
6.0.2rc1
6.0.3
6.0.3rc1
6.0.4
6.0.4rc1

Database specific

unresolved_ranges
[
    {
        "events": [
            {
                "introduced": "0"
            },
            {
                "fixed": "4.0.0"
            }
        ]
    },
    {
        "events": [
            {
                "introduced": "5.0.0"
            },
            {
                "fixed": "5.0.25"
            }
        ]
    },
    {
        "events": [
            {
                "introduced": "0"
            },
            {
                "last_affected": "5.0.25-NA"
            }
        ]
    }
]
source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-35229.json"