CVE-2024-42330 Affecting zabbix package, versions <1:5.0.45+dfsg-1+deb11u1


Severity

Recommended
low

Based on default assessment until relevant scores are available.

Threat Intelligence

EPSS
0.04% (11th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIAN11-ZABBIX-8442169
  • published28 Nov 2024
  • disclosed27 Nov 2024

Introduced: 27 Nov 2024

NewCVE-2024-42330  (opens in a new tab)

How to fix?

Upgrade Debian:11 zabbix to version 1:5.0.45+dfsg-1+deb11u1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream zabbix package and not the zabbix package as distributed by Debian. See How to fix? for Debian:11 relevant fixed versions and status.

The HttpRequest object allows to get the HTTP headers from the server's response after sending the request. The problem is that the returned strings are created directly from the data returned by the server and are not correctly encoded for JavaScript. This allows to create internal strings that can be used to access hidden properties of objects.