Debian 10225 Published by

A zabbix security update has been released for Debian GNU/Linux 9 LTS to address multiple security issues.



DLA 2631-1: zabbix security update


- -------------------------------------------------------------------------
Debian LTS Advisory DLA-2631-1 debian-lts@lists.debian.org
  https://www.debian.org/lts/security/
April 21, 2021   https://wiki.debian.org/LTS
- -------------------------------------------------------------------------

Package : zabbix
Version : 1:3.0.32+dfsg-0+deb9u1
CVE ID : CVE-2019-15132 CVE-2020-15803
Debian Bug : 935027 966146

Multiple vulnerabilities were discovered in Zabbix, a network
monitoring solution. An attacker may enumerate valid users and
redirect to external links through the zabbix web frontend.

CVE-2019-15132

Zabbix allows User Enumeration. With login requests, it is
possible to enumerate application usernames based on the
variability of server responses (e.g., the "Login name or password
is incorrect" and "No permissions for system access" messages, or
just blocking for a number of seconds). This affects both
api_jsonrpc.php and index.php.

CVE-2020-15803

Zabbix allows stored XSS in the URL Widget. This fix was
mistakenly dropped in previous upload 1:3.0.31+dfsg-0+deb9u1.

This update also includes several other bug fixes and
improvements. For more information please refer to the upstream
changelog file.

For Debian 9 stretch, these problems have been fixed in version
1:3.0.32+dfsg-0+deb9u1.

We recommend that you upgrade your zabbix packages.

For the detailed security status of zabbix please refer to
its security tracker page at:
  https://security-tracker.debian.org/tracker/zabbix

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at:   https://wiki.debian.org/LTS