DEBIAN-CVE-2024-36466

Source
https://security-tracker.debian.org/tracker/CVE-2024-36466
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2024-36466.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2024-36466
Upstream
Published
2024-11-28T08:15:05Z
Modified
2025-10-10T19:30:47.597601Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

A bug in the code allows an attacker to sign a forged zbx_session cookie, which then allows them to sign in with admin permissions.

References

Affected packages

Debian:12 / zabbix

Package

Name
zabbix
Purl
pkg:deb/debian/zabbix?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1:6.*

1:6.0.14+dfsg-1
1:6.0.23+dfsg-1~bpo12+1
1:6.0.23+dfsg-1
1:6.0.24+dfsg-1
1:6.0.25+dfsg-1
1:6.0.29+dfsg-1

1:7.*

1:7.0.0+dfsg-1
1:7.0.0+dfsg-2~bpo12+1
1:7.0.0+dfsg-2
1:7.0.1+dfsg-1~bpo12+1
1:7.0.1+dfsg-1
1:7.0.2+dfsg-1~bpo12+1
1:7.0.2+dfsg-1
1:7.0.3+dfsg-1
1:7.0.5+dfsg-1~bpo12+1
1:7.0.5+dfsg-1
1:7.0.6+dfsg-1
1:7.0.9+dfsg-1~bpo12+1
1:7.0.9+dfsg-1
1:7.0.10+dfsg-1
1:7.0.10+dfsg-2

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / zabbix

Package

Name
zabbix
Purl
pkg:deb/debian/zabbix?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:7.0.1+dfsg-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:14 / zabbix

Package

Name
zabbix
Purl
pkg:deb/debian/zabbix?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:7.0.1+dfsg-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}