SQL Injection Vulnerability in Zabbix Affects Low Privilege Users
CVE-2024-36465
What is CVE-2024-36465?
CVE-2024-36465 is a security vulnerability found in the Zabbix monitoring software, which is widely used for network monitoring and management. This vulnerability allows low privilege users, specifically those with API access, to exploit SQL injection flaws in the software's API. Such an exploitation can lead to unauthorized manipulation of the underlying database, potentially compromising sensitive data and system integrity. Organizations utilizing Zabbix could face serious risks if the vulnerability is not addressed, as it may facilitate malicious activities and weaken overall security posture.
Technical Details
CVE-2024-36465 involves an SQL injection in the include/classes/api/CApiService.php
file within Zabbix. This vulnerability can be triggered through the groupBy
parameter, enabling an attacker to execute arbitrary SQL commands on the database. Zabbix’s architecture allows regular users with API access to leverage this flaw, which highlights the need for robust input validation and access controls to prevent misuse.
Potential Impact of CVE-2024-36465
-
Data Compromise: The exploitation of this vulnerability can lead to unauthorized access to the database, potentially exposing sensitive information and leading to data breaches.
-
System Integrity Risks: Attackers could manipulate database records or execute harmful queries that disrupt the normal operation of the Zabbix system, jeopardizing service availability and reliability.
-
Escalation of Attacks: Once an attacker gains access through this vulnerability, they may install further exploits or malware, opening the door for larger-scale attacks against the organization’s network, including data theft and ransomware deployment.
Affected Version(s)
Zabbix 7.0.0 <= 7.0.7
Zabbix 7.2.0 <= 7.2.1
References
CVSS V4
Timeline
Vulnerability published
Vulnerability Reserved