Zabbix, a network management system application designed to monitor and track the status of various network services, is found to have a vulnerability that could lead to password leakage. Once the user is able to open a console session in zabbix, he can access the tab where various users of the system are displayed. An impersonated user can view the application source code, and could find the password that interacts zabbix, for eg, with a domain controller. The field that should be looked for in the source code of the website is: type = "password" id = "ldap_bind_password" name = "ldap_bind_password" value = <password>. And also if the user requests to refresh the web page, the browser asks the user to store or cache the password, which could also lead to password leakage.
Created zabbix tracking bugs for this issue: Affects: fedora-all [bug 1013964] Affects: epel-all [bug 1013965]
This was reported on full-disclosure: http://archives.neohapsis.com/archives/fulldisclosure/2013-09/0149.html
The description is vague and they didn't bother to mention the upstream status. Assumptions are, this resembles https://support.zabbix.com/browse/ZBX-6721.
That reference looks correct to me.
Upstream confirms that the CVE resembles ZBX-6721. It will be fixed in 2.0.11 and 2.2.2, but foresee-ably not 1.8. The reason is, that the CVE is not considered that dangerous.
zabbix20-2.0.11-1.el6 has been pushed to the Fedora EPEL 6 stable repository. If problems still persist, please make note of it in this bug report.
zabbix20-2.0.11-1.el5 has been pushed to the Fedora EPEL 5 stable repository. If problems still persist, please make note of it in this bug report.
zabbix-1.8.20-1.el6 has been pushed to the Fedora EPEL 6 stable repository. If problems still persist, please make note of it in this bug report.
zabbix-2.0.11-3.fc19 has been pushed to the Fedora 19 stable repository. If problems still persist, please make note of it in this bug report.
zabbix-2.0.11-3.fc20 has been pushed to the Fedora 20 stable repository. If problems still persist, please make note of it in this bug report.