Multiple vulnerabilities were discovered in Zabbix, a network
monitoring solution. An attacker may enumerate valid users and
redirect to external links through the zabbix web frontend.
Zabbix allows User Enumeration. With login requests, it is
possible to enumerate application usernames based on the
variability of server responses (e.g., the "Login name or password
is incorrect" and "No permissions for system access" messages, or
just blocking for a number of seconds). This affects both
api_jsonrpc.php and index.php.
Zabbix allows stored XSS in the URL Widget. This fix was
mistakenly dropped in previous upload 1:3.0.31+dfsg-0+deb9u1.
This update also includes several other bug fixes and
improvements. For more information please refer to the upstream
For Debian 9 stretch, these problems have been fixed in version
We recommend that you upgrade your zabbix packages.
For the detailed security status of zabbix please refer to
its security tracker page at:
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
From: Sylvain Beucler
To: [email protected]
Subject: [SECURITY] [DLA 2631-1] zabbix security update
Debian LTS Advisory DLA-2631-1 [email protected]
April 21, 2021 https://wiki.debian.org/LTS
Version : 1:3.0.32+dfsg-0+deb9u1