vuln-list-alt/oval/p11/ALT-PU-2021-2582/definitions.json
2024-12-12 21:07:30 +00:00

235 lines
10 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20212582",
"Version": "oval:org.altlinux.errata:def:20212582",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2021-2582: package `zabbix` update to version 5.4.3-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch p11"
],
"Products": [
"ALT Container"
]
}
],
"References": [
{
"RefID": "ALT-PU-2021-2582",
"RefURL": "https://errata.altlinux.org/ALT-PU-2021-2582",
"Source": "ALTPU"
},
{
"RefID": "BDU:2022-00879",
"RefURL": "https://bdu.fstec.ru/vul/2022-00879",
"Source": "BDU"
},
{
"RefID": "BDU:2023-01711",
"RefURL": "https://bdu.fstec.ru/vul/2023-01711",
"Source": "BDU"
},
{
"RefID": "BDU:2023-01712",
"RefURL": "https://bdu.fstec.ru/vul/2023-01712",
"Source": "BDU"
},
{
"RefID": "CVE-2021-46088",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-46088",
"Source": "CVE"
},
{
"RefID": "CVE-2022-35229",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-35229",
"Source": "CVE"
},
{
"RefID": "CVE-2022-35230",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-35230",
"Source": "CVE"
}
],
"Description": "This update upgrades zabbix to version 5.4.3-alt1. \nSecurity Fix(es):\n\n * BDU:2022-00879: Уязвимость универсальной системы мониторинга Zabbix , связанная с ошибками авторизации, позволяющая нарушителю выполнить произвольный код с root-привилегиями\n\n * BDU:2023-01711: Уязвимость универсальной системы мониторинга Zabbix, связанная с непринятием мер по защите структуры веб-страницы, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2023-01712: Уязвимость универсальной системы мониторинга Zabbix, связанная с непринятием мер по защите структуры веб-страницы, позволяющая нарушителю оказать воздействие на целостность данных\n\n * CVE-2021-46088: Zabbix 4.0 LTS, 4.2, 4.4, and 5.0 LTS is vulnerable to Remote Code Execution (RCE). Any user with the \"Zabbix Admin\" role is able to run custom shell script on the application server in the context of the application user.\n\n * CVE-2022-35229: An authenticated user can create a link with reflected Javascript code inside it for the discovery page and send it to other users. The payload can be executed only with a known CSRF token value of the victim, which is changed periodically and is difficult to predict.\n\n * CVE-2022-35230: An authenticated user can create a link with reflected Javascript code inside it for the graphs page and send it to other users. The payload can be executed only with a known CSRF token value of the victim, which is changed periodically and is difficult to predict.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "High",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2021-08-20"
},
"Updated": {
"Date": "2021-08-20"
},
"BDUs": [
{
"ID": "BDU:2022-00879",
"CVSS": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-862",
"Href": "https://bdu.fstec.ru/vul/2022-00879",
"Impact": "High",
"Public": "20220127"
},
{
"ID": "BDU:2023-01711",
"CVSS": "AV:N/AC:M/Au:S/C:P/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"CWE": "CWE-79",
"Href": "https://bdu.fstec.ru/vul/2023-01711",
"Impact": "Low",
"Public": "20220509"
},
{
"ID": "BDU:2023-01712",
"CVSS": "AV:N/AC:M/Au:S/C:P/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"CWE": "CWE-79",
"Href": "https://bdu.fstec.ru/vul/2023-01712",
"Impact": "Low",
"Public": "20220510"
}
],
"CVEs": [
{
"ID": "CVE-2021-46088",
"CVSS": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-46088",
"Impact": "High",
"Public": "20220127"
},
{
"ID": "CVE-2022-35229",
"CVSS": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"CWE": "CWE-79",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-35229",
"Impact": "Low",
"Public": "20220706"
},
{
"ID": "CVE-2022-35230",
"CVSS": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"CWE": "CWE-79",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-35230",
"Impact": "Low",
"Public": "20220706"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:container:11"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:3001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20212582001",
"Comment": "zabbix-agent is earlier than 1:5.4.3-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212582002",
"Comment": "zabbix-agent-sudo is earlier than 1:5.4.3-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212582003",
"Comment": "zabbix-agent2 is earlier than 1:5.4.3-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212582004",
"Comment": "zabbix-common is earlier than 1:5.4.3-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212582005",
"Comment": "zabbix-common-database-mysql is earlier than 1:5.4.3-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212582006",
"Comment": "zabbix-common-database-pgsql is earlier than 1:5.4.3-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212582007",
"Comment": "zabbix-common-database-sqlite3 is earlier than 1:5.4.3-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212582008",
"Comment": "zabbix-contrib is earlier than 1:5.4.3-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212582009",
"Comment": "zabbix-doc is earlier than 1:5.4.3-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212582010",
"Comment": "zabbix-java-gateway is earlier than 1:5.4.3-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212582011",
"Comment": "zabbix-phpfrontend-apache2 is earlier than 1:5.4.3-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212582012",
"Comment": "zabbix-phpfrontend-apache2-mod_php7 is earlier than 1:5.4.3-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212582013",
"Comment": "zabbix-phpfrontend-engine is earlier than 1:5.4.3-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212582014",
"Comment": "zabbix-phpfrontend-php7 is earlier than 1:5.4.3-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212582015",
"Comment": "zabbix-proxy is earlier than 1:5.4.3-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212582016",
"Comment": "zabbix-proxy-common is earlier than 1:5.4.3-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212582017",
"Comment": "zabbix-proxy-pgsql is earlier than 1:5.4.3-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212582018",
"Comment": "zabbix-server-common is earlier than 1:5.4.3-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212582019",
"Comment": "zabbix-server-mysql is earlier than 1:5.4.3-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212582020",
"Comment": "zabbix-server-pgsql is earlier than 1:5.4.3-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212582021",
"Comment": "zabbix-source is earlier than 1:5.4.3-alt1"
}
]
}
]
}
}
]
}