CVE-2024-36463
📋 TL;DR
This vulnerability in Zabbix's JavaScript implementation allows attackers to manipulate the atob function to create arbitrary strings and access internal object properties. This affects Zabbix web frontend users who can execute JavaScript in their browser. The vulnerability could lead to information disclosure or privilege escalation.
💻 Affected Systems
- Zabbix
📦 What is this software?
Zabbix by Zabbix
Zabbix by Zabbix
Zabbix by Zabbix
Zabbix by Zabbix
⚠️ Risk & Real-World Impact
Worst Case
Attackers could access sensitive internal object properties, potentially leading to privilege escalation, data exfiltration, or remote code execution through chained vulnerabilities.
Likely Case
Information disclosure of internal object properties, which could reveal sensitive configuration data or enable further exploitation.
If Mitigated
Limited impact with proper input validation and output encoding in place, potentially only revealing non-sensitive internal data.
🎯 Exploit Status
Exploitation requires JavaScript execution in the victim's browser context, typically through XSS or user interaction with malicious content.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Zabbix 7.0.0beta3 and later
Vendor Advisory: https://support.zabbix.com/browse/ZBX-25611
Restart Required: Yes
Instructions:
1. Download Zabbix 7.0.0beta3 or later from official sources. 2. Follow Zabbix upgrade documentation for your specific deployment. 3. Restart Zabbix server and frontend services. 4. Verify the upgrade completed successfully.
🔧 Temporary Workarounds
Disable JavaScript in Zabbix Frontend
allTemporarily disable JavaScript execution in the Zabbix web interface to prevent exploitation
Not applicable - configuration change in web server or browser settings
Restrict Access to Zabbix Frontend
allLimit Zabbix web interface access to trusted networks only
Configure firewall rules to restrict access to Zabbix web port (default 80/443)
🧯 If You Can't Patch
- Implement strict Content Security Policy (CSP) headers to limit JavaScript execution
- Monitor Zabbix web server logs for suspicious JavaScript execution patterns
🔍 How to Verify
Check if Vulnerable:
Check Zabbix version via web interface (Administration → General → About) or command line: zabbix_server --version
Check Version:
zabbix_server --version | grep 'Zabbix'
Verify Fix Applied:
Verify version is 7.0.0beta3 or later and test atob function behavior in browser console
📡 Detection & Monitoring
Log Indicators:
- Unusual JavaScript errors in browser console
- Suspicious atob function calls in web server logs
Network Indicators:
- Unusual JavaScript payloads in HTTP requests to Zabbix web interface
SIEM Query:
source="zabbix-web" AND (atob OR base64decode) AND status=200