<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for zabbix</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2022:0036-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2022-02-16T09:04:51Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2022-02-16T09:04:51Z</InitialReleaseDate>
    <CurrentReleaseDate>2022-02-16T09:04:51Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for zabbix</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for zabbix fixes the following issues:

- Updated to latest realease 4.0.37.

Security issues fixed:

- CVE-2022-23134: Fixed possible view of the setup pages by unauthenticated users if config file already exists (boo#1194681).
- CVE-2021-27927: Fixed CSRF protection mechanism inside CControllerAuthenticationUpdate controller (boo#1183014).
- CVE-2020-15803: Fixed stored XSS in the URL Widget (boo#1174253).

Bugfixes:

- boo#1181400: Added hardening to systemd service(s)
- boo#1144018: Restructured for easier maintenance because FATE#324346
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-2022-36</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EDFZEEJCPRPPDEWV6JULRJZVSQCMYOEY/</URL>
      <Description>E-Mail link for openSUSE-SU-2022:0036-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1144018</URL>
      <Description>SUSE Bug 1144018</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1174253</URL>
      <Description>SUSE Bug 1174253</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1181400</URL>
      <Description>SUSE Bug 1181400</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1183014</URL>
      <Description>SUSE Bug 1183014</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1194681</URL>
      <Description>SUSE Bug 1194681</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2020-15803/</URL>
      <Description>SUSE CVE CVE-2020-15803 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-27927/</URL>
      <Description>SUSE CVE CVE-2021-27927 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-23134/</URL>
      <Description>SUSE CVE CVE-2022-23134 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 15.3">
      <Branch Type="Product Name" Name="openSUSE Leap 15.3">
        <FullProductName ProductID="openSUSE Leap 15.3" CPE="cpe:/o:opensuse:leap:15.3">openSUSE Leap 15.3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="zabbix-agent-4.0.37-lp153.2.3.1">
      <FullProductName ProductID="zabbix-agent-4.0.37-lp153.2.3.1">zabbix-agent-4.0.37-lp153.2.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="zabbix-java-gateway-4.0.37-lp153.2.3.1">
      <FullProductName ProductID="zabbix-java-gateway-4.0.37-lp153.2.3.1">zabbix-java-gateway-4.0.37-lp153.2.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="zabbix-phpfrontend-4.0.37-lp153.2.3.1">
      <FullProductName ProductID="zabbix-phpfrontend-4.0.37-lp153.2.3.1">zabbix-phpfrontend-4.0.37-lp153.2.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="zabbix-proxy-4.0.37-lp153.2.3.1">
      <FullProductName ProductID="zabbix-proxy-4.0.37-lp153.2.3.1">zabbix-proxy-4.0.37-lp153.2.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="zabbix-proxy-mysql-4.0.37-lp153.2.3.1">
      <FullProductName ProductID="zabbix-proxy-mysql-4.0.37-lp153.2.3.1">zabbix-proxy-mysql-4.0.37-lp153.2.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="zabbix-proxy-postgresql-4.0.37-lp153.2.3.1">
      <FullProductName ProductID="zabbix-proxy-postgresql-4.0.37-lp153.2.3.1">zabbix-proxy-postgresql-4.0.37-lp153.2.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="zabbix-proxy-sqlite-4.0.37-lp153.2.3.1">
      <FullProductName ProductID="zabbix-proxy-sqlite-4.0.37-lp153.2.3.1">zabbix-proxy-sqlite-4.0.37-lp153.2.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="zabbix-server-4.0.37-lp153.2.3.1">
      <FullProductName ProductID="zabbix-server-4.0.37-lp153.2.3.1">zabbix-server-4.0.37-lp153.2.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="zabbix-server-mysql-4.0.37-lp153.2.3.1">
      <FullProductName ProductID="zabbix-server-mysql-4.0.37-lp153.2.3.1">zabbix-server-mysql-4.0.37-lp153.2.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="zabbix-server-postgresql-4.0.37-lp153.2.3.1">
      <FullProductName ProductID="zabbix-server-postgresql-4.0.37-lp153.2.3.1">zabbix-server-postgresql-4.0.37-lp153.2.3.1</FullProductName>
    </Branch>
    <Relationship ProductReference="zabbix-agent-4.0.37-lp153.2.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.3">
      <FullProductName ProductID="openSUSE Leap 15.3:zabbix-agent-4.0.37-lp153.2.3.1">zabbix-agent-4.0.37-lp153.2.3.1 as a component of openSUSE Leap 15.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="zabbix-java-gateway-4.0.37-lp153.2.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.3">
      <FullProductName ProductID="openSUSE Leap 15.3:zabbix-java-gateway-4.0.37-lp153.2.3.1">zabbix-java-gateway-4.0.37-lp153.2.3.1 as a component of openSUSE Leap 15.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="zabbix-phpfrontend-4.0.37-lp153.2.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.3">
      <FullProductName ProductID="openSUSE Leap 15.3:zabbix-phpfrontend-4.0.37-lp153.2.3.1">zabbix-phpfrontend-4.0.37-lp153.2.3.1 as a component of openSUSE Leap 15.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="zabbix-proxy-4.0.37-lp153.2.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.3">
      <FullProductName ProductID="openSUSE Leap 15.3:zabbix-proxy-4.0.37-lp153.2.3.1">zabbix-proxy-4.0.37-lp153.2.3.1 as a component of openSUSE Leap 15.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="zabbix-proxy-mysql-4.0.37-lp153.2.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.3">
      <FullProductName ProductID="openSUSE Leap 15.3:zabbix-proxy-mysql-4.0.37-lp153.2.3.1">zabbix-proxy-mysql-4.0.37-lp153.2.3.1 as a component of openSUSE Leap 15.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="zabbix-proxy-postgresql-4.0.37-lp153.2.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.3">
      <FullProductName ProductID="openSUSE Leap 15.3:zabbix-proxy-postgresql-4.0.37-lp153.2.3.1">zabbix-proxy-postgresql-4.0.37-lp153.2.3.1 as a component of openSUSE Leap 15.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="zabbix-proxy-sqlite-4.0.37-lp153.2.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.3">
      <FullProductName ProductID="openSUSE Leap 15.3:zabbix-proxy-sqlite-4.0.37-lp153.2.3.1">zabbix-proxy-sqlite-4.0.37-lp153.2.3.1 as a component of openSUSE Leap 15.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="zabbix-server-4.0.37-lp153.2.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.3">
      <FullProductName ProductID="openSUSE Leap 15.3:zabbix-server-4.0.37-lp153.2.3.1">zabbix-server-4.0.37-lp153.2.3.1 as a component of openSUSE Leap 15.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="zabbix-server-mysql-4.0.37-lp153.2.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.3">
      <FullProductName ProductID="openSUSE Leap 15.3:zabbix-server-mysql-4.0.37-lp153.2.3.1">zabbix-server-mysql-4.0.37-lp153.2.3.1 as a component of openSUSE Leap 15.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="zabbix-server-postgresql-4.0.37-lp153.2.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.3">
      <FullProductName ProductID="openSUSE Leap 15.3:zabbix-server-postgresql-4.0.37-lp153.2.3.1">zabbix-server-postgresql-4.0.37-lp153.2.3.1 as a component of openSUSE Leap 15.3</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Zabbix before 3.0.32rc1, 4.x before 4.0.22rc1, 4.1.x through 4.4.x before 4.4.10rc1, and 5.x before 5.0.2rc1 allows stored XSS in the URL Widget.</Note>
    </Notes>
    <CVE>CVE-2020-15803</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.3:zabbix-agent-4.0.37-lp153.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.3:zabbix-java-gateway-4.0.37-lp153.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.3:zabbix-phpfrontend-4.0.37-lp153.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.3:zabbix-proxy-4.0.37-lp153.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.3:zabbix-proxy-mysql-4.0.37-lp153.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.3:zabbix-proxy-postgresql-4.0.37-lp153.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.3:zabbix-proxy-sqlite-4.0.37-lp153.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.3:zabbix-server-4.0.37-lp153.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.3:zabbix-server-mysql-4.0.37-lp153.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.3:zabbix-server-postgresql-4.0.37-lp153.2.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EDFZEEJCPRPPDEWV6JULRJZVSQCMYOEY/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2020-15803.html</URL>
        <Description>CVE-2020-15803</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1174253</URL>
        <Description>SUSE Bug 1174253</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In Zabbix from 4.0.x before 4.0.28rc1, 5.0.0alpha1 before 5.0.10rc1, 5.2.x before 5.2.6rc1, and 5.4.0alpha1 before 5.4.0beta2, the CControllerAuthenticationUpdate controller lacks a CSRF protection mechanism. The code inside this controller calls diableSIDValidation inside the init() method. An attacker doesn't have to know Zabbix user login credentials, but has to know the correct Zabbix URL and contact information of an existing user with sufficient privileges.</Note>
    </Notes>
    <CVE>CVE-2021-27927</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.3:zabbix-agent-4.0.37-lp153.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.3:zabbix-java-gateway-4.0.37-lp153.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.3:zabbix-phpfrontend-4.0.37-lp153.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.3:zabbix-proxy-4.0.37-lp153.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.3:zabbix-proxy-mysql-4.0.37-lp153.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.3:zabbix-proxy-postgresql-4.0.37-lp153.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.3:zabbix-proxy-sqlite-4.0.37-lp153.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.3:zabbix-server-4.0.37-lp153.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.3:zabbix-server-mysql-4.0.37-lp153.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.3:zabbix-server-postgresql-4.0.37-lp153.2.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EDFZEEJCPRPPDEWV6JULRJZVSQCMYOEY/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-27927.html</URL>
        <Description>CVE-2021-27927</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1183014</URL>
        <Description>SUSE Bug 1183014</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">After the initial setup process, some steps of setup.php file are reachable not only by super-administrators, but by unauthenticated users as well. Malicious actor can pass step checks and potentially change the configuration of Zabbix Frontend.</Note>
    </Notes>
    <CVE>CVE-2022-23134</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.3:zabbix-agent-4.0.37-lp153.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.3:zabbix-java-gateway-4.0.37-lp153.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.3:zabbix-phpfrontend-4.0.37-lp153.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.3:zabbix-proxy-4.0.37-lp153.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.3:zabbix-proxy-mysql-4.0.37-lp153.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.3:zabbix-proxy-postgresql-4.0.37-lp153.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.3:zabbix-proxy-sqlite-4.0.37-lp153.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.3:zabbix-server-4.0.37-lp153.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.3:zabbix-server-mysql-4.0.37-lp153.2.3.1</ProductID>
        <ProductID>openSUSE Leap 15.3:zabbix-server-postgresql-4.0.37-lp153.2.3.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EDFZEEJCPRPPDEWV6JULRJZVSQCMYOEY/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-23134.html</URL>
        <Description>CVE-2022-23134</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1194681</URL>
        <Description>SUSE Bug 1194681</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
