Zabbix Server Vulnerable to SQL Injection via Command Execution
CVE-2024-22120
Key Information:
- Vendor
- Zabbix
- Status
- Zabbix
- Vendor
- CVE Published:
- 17 May 2024
Badges
What is CVE-2024-22120?
CVE-2024-22120 is a vulnerability found in the Zabbix server, a popular open-source monitoring solution utilized by organizations to oversee their IT infrastructure and services. This particular flaw is rooted in SQL injection through command execution, which arises when user input is improperly handled—in this case, the "clientip" field. Exploiting this vulnerability can severely undermine an organization’s security posture by allowing attackers to execute arbitrary commands, potentially leading to unauthorized access and data manipulation.
Technical Details
The vulnerability is characterized by its ability to perform time-based blind SQL injection through the "clientip" field in Zabbix's command execution functionalities. When scripts configured in Zabbix are executed, an audit log entry is generated; however, since the "clientip" field is not sufficiently sanitized, it becomes a vector for SQL injection attacks. This flaw highlights the lack of preventive measures in input validation within the Zabbix server, which can be exploited by malicious actors to compromise the integrity of the database and the overall environment.
Impact of the Vulnerability
-
Unauthorized Command Execution: Attackers can gain the capability to execute arbitrary commands on the Zabbix server, potentially leading to further system compromise and manipulation of configurations.
-
Data Breach Risks: By exploiting this vulnerability, attackers may gain access to sensitive data stored in the database, resulting in data breaches that can affect both the organization and its users.
-
Disruption of Monitoring Services: The integrity of monitoring services can be severely impacted as the attackers can alter or disable monitoring functionalities, hampering the organization’s ability to oversee its IT infrastructure effectively.
Affected Version(s)
Zabbix 6.0.0 <= 6.0.27
Zabbix 6.4.0 <= 6.4.12
Zabbix 7.0.0alpha1 <= 7.0.0beta1
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
Get notified when SecurityVulnerability.io launches alerting 🔔
Well keep you posted 📧
News Articles
[#ZBX-24505] Time Based SQL Injection in Zabbix Server Audit Log (CVE-2024-22120)
Summary: Zabbix server can perform command execution for configured scripts. After command is executed, audit entry is added to "Audit Log". Due to "clientip" field is not sanitized, it is possible to...
Zabbix SQLi Vulnerability Leads to RCE, Latest Versions Affected – Gridinsoft Blog
Zabbix, a popular network monitoring tool, appears to be vulnerable to SQL injection attacks with little to no requirements.

Qualys ThreatPROTECT – Live Threat Intelligence Feed
The Zabbix server is vulnerable to an SQL injection vulnerability, tracked as CVE-2024-22120. The vulnerability has been given a critical severity rating with a CVSS score of 9.1. Successful exploitation of...
References
EPSS Score
93% chance of being exploited in the next 30 days.
CVSS V3.1
Timeline
- 🟡
Public PoC available
- 📈
Vulnerability started trending
- 👾
Exploit known to exist
- 📰
First article discovered by ÇözümPark
Vulnerability published
Vulnerability Reserved