{"id":"CVE-2022-23132","details":"During Zabbix installation from RPM, DAC_OVERRIDE SELinux capability is in use to access PID files in [/var/run/zabbix] folder. In this case, Zabbix Proxy or Server processes can bypass file read, write and execute permissions check on the file system level","modified":"2026-04-11T12:39:00.841446Z","published":"2022-01-13T16:15:08.113Z","database_specific":{"unresolved_ranges":[{"source":"CPE_FIELD","extracted_events":[{"introduced":"4.0.0"},{"last_affected":"4.0.36"},{"introduced":"5.0.0"},{"last_affected":"5.0.18"},{"introduced":"5.4.0"},{"last_affected":"5.4.8"}],"cpe":"cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*"},{"source":"CPE_FIELD","extracted_events":[{"last_affected":"34"}],"cpe":"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*"},{"source":"CPE_FIELD","extracted_events":[{"last_affected":"35"}],"cpe":"cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*"}]},"references":[{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2024/10/msg00000.html"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6SZYHXINBKCY42ITFSNCYE7KCSF33VRA/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VB6W556GVXOKUYTASTDGL3AI7S3SJHX7/"},{"type":"FIX","url":"https://support.zabbix.com/browse/ZBX-20341"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/zabbix/zabbix","events":[{"introduced":"0"},{"last_affected":"f56fed83bc4778f6c8fdc6bedc956d6c2059c56b"},{"last_affected":"315ec0e63a834834015e7431cc685c6b3ad8c265"},{"last_affected":"1ca342c90ed471c4547b9a4ea9dfcc147be3f3f0"},{"last_affected":"e58e4c62e52436a5b5385e7b58b5a7e9376cc67a"},{"last_affected":"6b9f1a434682b6102080217ff723cad209610a7d"},{"last_affected":"b07e17de0abf0006ddd56c2eb39d3dacda0ba2eb"},{"last_affected":"cf8d4a64d29b8fce8e40761533f8dd9438c786fd"}],"database_specific":{"source":"CPE_FIELD","extracted_events":[{"introduced":"0"},{"last_affected":"6.0.0-alpha1"},{"last_affected":"6.0.0-alpha2"},{"last_affected":"6.0.0-alpha3"},{"last_affected":"6.0.0-alpha4"},{"last_affected":"6.0.0-alpha5"},{"last_affected":"6.0.0-alpha6"},{"last_affected":"6.0.0-alpha7"}],"cpe":["cpe:2.3:a:zabbix:zabbix:6.0.0:alpha1:*:*:*:*:*:*","cpe:2.3:a:zabbix:zabbix:6.0.0:alpha2:*:*:*:*:*:*","cpe:2.3:a:zabbix:zabbix:6.0.0:alpha3:*:*:*:*:*:*","cpe:2.3:a:zabbix:zabbix:6.0.0:alpha4:*:*:*:*:*:*","cpe:2.3:a:zabbix:zabbix:6.0.0:alpha5:*:*:*:*:*:*","cpe:2.3:a:zabbix:zabbix:6.0.0:alpha6:*:*:*:*:*:*","cpe:2.3:a:zabbix:zabbix:6.0.0:alpha7:*:*:*:*:*:*"]}}],"versions":["6.0.0alpha1","6.0.0alpha2","6.0.0alpha3","6.0.0alpha4","6.0.0alpha5","6.0.0alpha6","6.0.0alpha7"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-23132.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}]}