CVE-2023-32725

9.6 CRITICAL

📋 TL;DR

This vulnerability in Zabbix allows session cookie leakage through URL widgets. When testing or executing scheduled reports, the configured website receives the user's session cookie, enabling attackers to hijack sessions and access the frontend as that user. All Zabbix users with URL widget access are affected.

💻 Affected Systems

Products:
  • Zabbix
Versions: Zabbix 6.0.0alpha1 to 6.0.21, 6.2.0alpha1 to 6.2.10, 6.4.0alpha1 to 6.4.5, 7.0.0alpha1 to 7.0.0alpha2
Operating Systems: All platforms running Zabbix
Default Config Vulnerable: ⚠️ Yes
Notes: Requires URL widget configuration with scheduled reports or testing functionality.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full administrative account takeover leading to complete system compromise, data exfiltration, and lateral movement across the network.

🟠

Likely Case

Session hijacking allowing unauthorized access to monitoring data, configuration changes, and potential privilege escalation.

🟢

If Mitigated

Limited impact with proper network segmentation and monitoring, but still represents authentication bypass risk.

🌐 Internet-Facing: HIGH - Directly exploitable if Zabbix is internet-facing, allowing remote attackers to steal session cookies.
🏢 Internal Only: HIGH - Even internally, attackers with network access can intercept cookies or use malicious URLs to capture sessions.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires ability to configure URL widgets or access to scheduled reports, but the actual cookie theft is straightforward.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Zabbix 6.0.22, 6.2.11, 6.4.6, 7.0.0beta1

Vendor Advisory: https://support.zabbix.com/browse/ZBX-23854

Restart Required: Yes

Instructions:

1. Backup your Zabbix database and configuration. 2. Download the patched version from Zabbix website. 3. Follow Zabbix upgrade documentation for your specific version. 4. Restart Zabbix server and frontend services.

🔧 Temporary Workarounds

Disable URL Widgets

all

Remove or disable URL widgets from dashboards and scheduled reports

# Remove URL widgets via Zabbix frontend or database

Restrict URL Widget Access

all

Limit URL widget configuration to trusted administrators only

# Configure Zabbix user permissions to restrict URL widget access

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Zabbix from untrusted networks
  • Enable detailed logging and monitoring for URL widget activities and session anomalies

🔍 How to Verify

Check if Vulnerable:

Check Zabbix version via frontend or database: SELECT * FROM dbversion

Check Version:

grep ZABBIX_VERSION /usr/share/zabbix/include/defines.inc.php

Verify Fix Applied:

Verify version is patched and test URL widget functionality with monitoring tools

📡 Detection & Monitoring

Log Indicators:

  • Unusual URL widget configurations
  • Multiple session creations from different IPs for same user
  • Failed authentication attempts followed by successful access

Network Indicators:

  • HTTP requests to external URLs containing session cookies
  • Unusual outbound connections from Zabbix server

SIEM Query:

source="zabbix" AND (event="URL widget" OR event="session") AND (url="*http*" OR url="*cookie*")

🔗 References

📤 Share & Export