MGASA-2014-0433

Source
https://advisories.mageia.org/MGASA-2014-0433.html
Import Source
https://advisories.mageia.org/MGASA-2014-0433.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2014-0433
Related
Published
2014-10-29T11:30:40Z
Modified
2014-10-29T09:40:27Z
Summary
Updated zabbix package fixes security vulnerability
Details

It was reported that the Zabbix frontend supported an XML data import feature, where on the server it used DOMDocument to parse the XML. By default, DOMDocument also parses the external DTD, which could allow a remote attacker to use a crafted XML file causing Zabbix to read an arbitrary local file, and send the contents of the specified file to a remote server (CVE-2014-3005).

References
Credits

Affected packages