The endpoint /zabbix.php?action=export.valuemaps suffers from a Cross-Site Scripting vulnerability via the backurl parameter. This is caused by the reflection of user-supplied data without appropriate HTML escaping or output encoding. As a result, a JavaScript payload may be injected into the above endpoint causing it to be executed within the context of the victim's browser.
[
{
"source": "https://github.com/zabbix/zabbix/commit/ba81419771e13671f487f460587ba6b44b8a38bb",
"deprecated": false,
"signature_version": "v1",
"signature_type": "Line",
"digest": {
"threshold": 0.9,
"line_hashes": [
"195514718859809000358301802219281012230",
"51124480710887780062975113423557880969",
"332272145517161978226090846588150270362",
"79969020919049438165179474254006750396",
"43325251037359491260513668163672702023",
"91179429342009451467044206663561981771"
]
},
"target": {
"file": "src/zabbix_java/src/com/zabbix/gateway/GeneralInformation.java"
},
"id": "CVE-2024-45699-a00919fb"
}
]