CVE-2022-35229

Source
https://cve.org/CVERecord?id=CVE-2022-35229
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-35229.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2022-35229
Downstream
Published
2022-07-06T11:15:08.967Z
Modified
2026-04-11T12:40:42.297109Z
Severity
  • 5.4 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
[none]
Details

An authenticated user can create a link with reflected Javascript code inside it for the discovery page and send it to other users. The payload can be executed only with a known CSRF token value of the victim, which is changed periodically and is difficult to predict.

Database specific
{
    "unresolved_ranges": [
        {
            "cpe": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "fixed": "4.0.0"
                },
                {
                    "introduced": "5.0.0"
                },
                {
                    "fixed": "5.0.25"
                }
            ]
        },
        {
            "cpe": "cpe:2.3:a:zabbix:zabbix:5.0.25:-:*:*:*:*:*:*",
            "source": "CPE_FIELD",
            "extracted_events": [
                {
                    "last_affected": "5.0.25-NA"
                }
            ]
        }
    ]
}
References

Affected packages

Git / github.com/zabbix/zabbix

Affected ranges

Type
GIT
Repo
https://github.com/zabbix/zabbix
Events
Database specific
{
    "cpe": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
    "source": "CPE_FIELD",
    "extracted_events": [
        {
            "introduced": "6.0.0"
        },
        {
            "last_affected": "6.0.4"
        }
    ]
}

Affected versions

6.*
6.0.0
6.0.1
6.0.1rc1
6.0.1rc2
6.0.1rc3
6.0.1rc4
6.0.2
6.0.2rc1
6.0.3
6.0.3rc1
6.0.4
6.0.4rc1

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-35229.json"