JavaScript pre-processing can be used by the attacker to gain access to the file system (read-only access on behalf of user "zabbix") on the Zabbix Server or Zabbix Proxy, potentially leading to unauthorized access to sensitive data. Reference: https://support.zabbix.com/browse/ZBX-22588
Created zabbix tracking bugs for this issue: Affects: epel-all [bug 2222685] Affects: fedora-all [bug 2222686]
This CVE Bugzilla entry is for community support informational purposes only as it does not affect a package in a commercially supported Red Hat product. Refer to the dependent bugs for status of those individual community products.
Apparently fixed in 5.0.34rc1, 6.0.16rc1, 6.2.9rc2, 6.4.2rc1, 7.0.0alpha1