A non-admin user account on the Zabbix frontend with the default User role, or with any other role that gives API access can exploit this vulnerability. An SQLi exists in the CUser class in the addRelatedObjects function, this function is being called from the CUser.get function which is available for every user who has API access.
History

Wed, 27 Nov 2024 16:15:00 +0000

Type Values Removed Values Added
First Time appeared Zabbix
Zabbix zabbix
CPEs cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*
Vendors & Products Zabbix
Zabbix zabbix
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 27 Nov 2024 12:15:00 +0000

Type Values Removed Values Added
Description A non-admin user account on the Zabbix frontend with the default User role, or with any other role that gives API access can exploit this vulnerability. An SQLi exists in the CUser class in the addRelatedObjects function, this function is being called from the CUser.get function which is available for every user who has API access.
Title SQL injection in user.get API
Weaknesses CWE-89
References
Metrics cvssV3_1

{'score': 9.9, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Zabbix

Published: 2024-11-27T12:04:31.950Z

Updated: 2024-12-04T04:55:21.730Z

Reserved: 2024-07-30T08:27:36.132Z

Link: CVE-2024-42327

cve-icon Vulnrichment

Updated: 2024-11-27T15:12:04.223Z

cve-icon NVD

Status : Received

Published: 2024-11-27T12:15:20.640

Modified: 2024-11-27T12:15:20.640

Link: CVE-2024-42327

cve-icon Redhat

No data.