Description
During Zabbix installation from RPM, DAC_OVERRIDE SELinux capability is in use to access PID files in [/var/run/zabbix] folder. In this case, Zabbix Proxy or Server processes can bypass file read, write and execute permissions check on the file system level
References (4)
Core 4
Core References
Issue Tracking, Patch, Vendor Advisory x_refsource_misc
https://support.zabbix.com/browse/ZBX-20341
Mailing List, Third Party Advisory vendor-advisory
x_refsource_fedora
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6SZYHXINBKCY42ITFSNCYE7KCSF33VRA/
Mailing List, Third Party Advisory vendor-advisory
x_refsource_fedora
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VB6W556GVXOKUYTASTDGL3AI7S3SJHX7/
Scores
CVSS v3
3.3
EPSS
0.0014
EPSS Percentile
33.9%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N
Details
CWE
CWE-284
CWE-732
Status
published
Products (4)
fedoraproject/fedora
34
fedoraproject/fedora
35
zabbix/zabbix
6.0.0 alpha1 (7 CPE variants)
zabbix/zabbix
4.0.0 - 4.0.36
Published
Jan 13, 2022
Tracked Since
Feb 18, 2026