For performance reasons Zabbix Server/Proxy reuses JavaScript (Duktape) contexts (used in script items, JavaScript reprocessing, Webhooks). This can lead to confidentiality loss where a regular (non-super) Zabbix administrator leaks data for hosts they do not have access to. A fix has been released that makes the built in Zabbix JavaScript objects read-only, but please be advised that usage of global JavaScript variables is not recommended because their content could be leaked. More information <a href='https://www.zabbix.com/documentation/7.4/en/manual/installation/known_issues#preprocessing-global-variables-are-unsafe'>in Zabbix documentation</a>.
| Vendor | Product | Versions |
|---|---|---|
| Zabbix | Zabbix | 7.4, 7.2, 7.0 |
Updated patch information to reflect multiple new security bulletins and added new tags for the vulnerabilities.
Updated severity to HIGH, marked as actively exploited, and added new affected versions 7.2 and 7.0.
Updated vendor and product to Zabbix, added affected version 7.4, changed severity to HIGH, and noted that exploits are available and actively exploited.
Initial creation