{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2024-42330","assignerOrgId":"72de3e22-0555-4a0d-ae81-9249e0f0a1e8","state":"PUBLISHED","assignerShortName":"Zabbix","dateReserved":"2024-07-30T08:27:36.132Z","datePublished":"2024-11-27T12:05:47.722Z","dateUpdated":"2025-11-03T22:04:43.106Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","modules":["Server"],"product":"Zabbix","repo":"https://git.zabbix.com/","vendor":"Zabbix","versions":[{"changes":[{"at":"6.0.34rc1","status":"unaffected"}],"lessThanOrEqual":"6.0.33","status":"affected","version":"6.0.0","versionType":"git"},{"changes":[{"at":"6.4.19rc1","status":"unaffected"}],"lessThanOrEqual":"6.4.18","status":"affected","version":"6.4.0","versionType":"git"},{"changes":[{"at":"7.0.4rc1","status":"unaffected"}],"lessThanOrEqual":"7.0.3","status":"affected","version":"7.0.0","versionType":"git"}]}],"credits":[{"lang":"en","type":"reporter","value":"Zabbix wants to thank zhutyra for submitting this report on the HackerOne bug bounty platform."}],"datePublic":"2024-10-30T09:43:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"The HttpRequest object allows to get the HTTP headers from the server's response after sending the request. The problem is that the returned strings are created directly from the data returned by the server and are not correctly encoded for JavaScript. This allows to create internal strings that can be used to access hidden properties of objects."}],"value":"The HttpRequest object allows to get the HTTP headers from the server's response after sending the request. The problem is that the returned strings are created directly from the data returned by the server and are not correctly encoded for JavaScript. This allows to create internal strings that can be used to access hidden properties of objects."}],"impacts":[{"capecId":"CAPEC-100","descriptions":[{"lang":"en","value":"CAPEC-100 Overflow Buffers"}]},{"capecId":"CAPEC-253","descriptions":[{"lang":"en","value":"CAPEC-253 Remote Code Inclusion"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":9.1,"baseSeverity":"CRITICAL","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"HIGH","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-134","description":"CWE-134 Use of Externally-Controlled Format String","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"72de3e22-0555-4a0d-ae81-9249e0f0a1e8","shortName":"Zabbix","dateUpdated":"2024-11-27T12:05:47.722Z"},"references":[{"url":"https://support.zabbix.com/browse/ZBX-25626"}],"source":{"discovery":"EXTERNAL"},"title":"JS - Internal strings in HTTP headers","x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"affected":[{"vendor":"zabbix","product":"frontend","cpes":["cpe:2.3:a:zabbix:frontend:*:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"6.0.0","status":"affected","lessThanOrEqual":"6.0.33","versionType":"git"},{"version":"6.4.0","status":"affected","lessThanOrEqual":"6.4.18","versionType":"git"},{"version":"7.0.0","status":"affected","lessThanOrEqual":"7.0.3","versionType":"git"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-12-03T00:00:00+00:00","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3","id":"CVE-2024-42330"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-12-04T04:55:23.233Z"}},{"title":"CVE Program Container","references":[{"url":"https://lists.debian.org/debian-lts-announce/2024/12/msg00005.html"}],"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2025-11-03T22:04:43.106Z"}}]}}