CVE-2022-23133: An authenticated user can create a hosts group from the configuration with XSS payload, which will be available for other users. When XSS is stored by an authenticated malicious actor and other users try to search for groups during new host creation, the XSS payload will fire and the actor can steal session cookies and perform session hijacking to impersonate users or take over their accounts. Seems fixed versions are 5.0.19, 5.4.9. Please bump.
The bug has been referenced in the following commit(s): https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=0b0802d7d7f124cd5e2b28f0babd925a3a6b2f27 commit 0b0802d7d7f124cd5e2b28f0babd925a3a6b2f27 Author: Miroslav Šulc <fordfrog@gentoo.org> AuthorDate: 2022-01-19 08:58:15 +0000 Commit: Miroslav Šulc <fordfrog@gentoo.org> CommitDate: 2022-01-19 08:58:15 +0000 net-analyzer/zabbix: removed obsolete and vulnerable versions Bug: https://bugs.gentoo.org/831159 Package-Manager: Portage-3.0.30, Repoman-3.0.3 Signed-off-by: Miroslav Šulc <fordfrog@gentoo.org> net-analyzer/zabbix/Manifest | 3 - net-analyzer/zabbix/zabbix-4.0.36-r1.ebuild | 360 ---------------- net-analyzer/zabbix/zabbix-5.0.18-r2.ebuild | 608 -------------------------- net-analyzer/zabbix/zabbix-5.4.8-r2.ebuild | 632 ---------------------------- 4 files changed, 1603 deletions(-)
the tree is clean now, you can proceed.
Thanks!