An authenticated user with API access (e.g.: user with default User role), more specifically a user with access to the user.update API endpoint is enough to be able to add themselves to any group (e.g.: Zabbix Administrators), except to groups that are disabled or having restricted GUI access.
Advisories
Source ID Title
EUVD EUVD EUVD-2024-36348 An authenticated user with API access (e.g.: user with default User role), more specifically a user with access to the user.update API endpoint is enough to be able to add themselves to any group (e.g.: Zabbix Administrators), except to groups that are disabled or having restricted GUI access.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 04 Dec 2024 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Zabbix
Zabbix zabbix
CPEs cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*
Vendors & Products Zabbix
Zabbix zabbix
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 27 Nov 2024 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 27 Nov 2024 06:45:00 +0000

Type Values Removed Values Added
Description An authenticated user with API access (e.g.: user with default User role), more specifically a user with access to the user.update API endpoint is enough to be able to add themselves to any group (e.g.: Zabbix Administrators), except to groups that are disabled or having restricted GUI access.
Title Authentication privilege escalation via user groups due to missing authorization checks
Weaknesses CWE-285
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Zabbix

Published:

Updated: 2024-12-04T14:36:54.043Z

Reserved: 2024-05-28T11:21:24.947Z

Link: CVE-2024-36467

cve-icon Vulnrichment

Updated: 2024-11-27T14:58:23.765Z

cve-icon NVD

Status : Analyzed

Published: 2024-11-27T07:15:09.080

Modified: 2025-10-08T16:05:59.373

Link: CVE-2024-36467

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.