Plaintext Storage of a Password Affecting zabbix/zabbix package, versions [,1.8.20-rc2)[2.0.0,2.0.11-rc1)[2.2.0,2.2.2-rc1)


Severity

Recommended
0.0
low
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of Concept
EPSS
7.82% (92nd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-ZABBIXZABBIX-2364980
  • published26 Jan 2022
  • disclosed1 Oct 2013
  • creditUnknown

Introduced: 1 Oct 2013

CVE-2013-5572  (opens in a new tab)
CWE-256  (opens in a new tab)

How to fix?

Upgrade zabbix/zabbix to version 1.8.20-rc2, 2.0.11-rc1, 2.2.2-rc1 or higher.

Overview

Affected versions of this package are vulnerable to Plaintext Storage of a Password. Zabbix 2.0.5 allows remote authenticated users to discover the LDAP bind password by leveraging management-console access and reading the ldap_bind_password value in the HTML source code.

CVSS Base Scores

version 3.1