We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-36464

Media Types: Office365, SMTP passwords are unencrypted and visible in plaintext when exported



Description

When exporting media types, the password is exported in the YAML in plain text. This appears to be a best practices type issue and may have no actual impact. The user would need to have permissions to access the media types and therefore would be expected to have access to these passwords.

Reserved 2024-05-28 | Published 2024-11-27 | Updated 2024-11-27 | Assigner Zabbix


LOW: 2.7CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N

Problem types

CWE-256 Plaintext Storage of a Password

Product status

Default status
unaffected

6.0.0
affected

6.4.0
affected

7.0.0alpha1
affected

Credits

Zabbix wants to thank Jayateertha G for submitting this report on the HackerOne bug bounty platform. reporter

References

support.zabbix.com/browse/ZBX-25630

cve.org (CVE-2024-36464)

nvd.nist.gov (CVE-2024-36464)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-36464

Support options

Helpdesk Chat, Email, Knowledgebase
Telegram Chat
Subscribe to our newsletter to learn more about our work.