We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-45699

Reflected XSS vulnerability in /zabbix.php?action=export.valuemaps



Description

The endpoint /zabbix.php?action=export.valuemaps suffers from a Cross-Site Scripting vulnerability via the backurl parameter. This is caused by the reflection of user-supplied data without appropriate HTML escaping or output encoding. As a result, a JavaScript payload may be injected into the above endpoint causing it to be executed within the context of the victim's browser.

Reserved 2024-09-05 | Published 2025-04-02 | Updated 2025-04-02 | Assigner Zabbix


HIGH: 7.5CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting')

Product status

Default status
unaffected

6.0.0
affected

6.4.0
affected

7.0.0
affected

Credits

Zabbix wants to thank ginoah for submitting this report on the HackerOne bug bounty platform reporter

References

support.zabbix.com/browse/ZBX-26254

cve.org (CVE-2024-45699)

nvd.nist.gov (CVE-2024-45699)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2024-45699

Support options

Helpdesk Chat, Email, Knowledgebase