CVE-2024-22120
Time Based SQL Injection in Zabbix Server Audit Log
Severity Score
9.1
*CVSS v3.1
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
3
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
Attend
*SSVC
Descriptions
Zabbix server can perform command execution for configured scripts. After command is executed, audit entry is added to "Audit Log". Due to "clientip" field is not sanitized, it is possible to injection SQL into "clientip" and exploit time based blind SQL injection.
El servidor Zabbix puede realizar la ejecución de comandos para scripts configurados. Después de ejecutar el comando, la entrada de auditoría se agrega al "Registro de auditoría". Debido a que el campo "clientip" no está sanitizado, es posible inyectar SQL en "clientip" y explotar la inyección SQL ciega basada en el tiempo.
*Credits:
Zabbix wants to thank Maxim Tyukov (mf0cuz) who submitted this report in HackerOne bug bounty platform
CVSS Scores
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:Attend
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2024-01-05 CVE Reserved
- 2024-05-17 CVE Published
- 2024-05-21 First Exploit
- 2024-08-01 CVE Updated
- 2024-09-05 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-20: Improper Input Validation
CAPEC
- CAPEC-253: Remote Code Inclusion
References (4)
URL | Tag | Source |
---|---|---|
https://support.zabbix.com/browse/ZBX-24505 |
URL | Date | SRC |
---|---|---|
https://github.com/W01fh4cker/CVE-2024-22120-RCE | 2024-05-21 | |
https://github.com/g4nkd/CVE-2024-22120-RCE-with-gopher | 2024-08-15 | |
https://github.com/isPique/CVE-2024-22120-RCE-with-gopher | 2024-08-13 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Zabbix Search vendor "Zabbix" | Zabbix Search vendor "Zabbix" for product "Zabbix" | >= 6.0.0 <= 6.0.27 Search vendor "Zabbix" for product "Zabbix" and version " >= 6.0.0 <= 6.0.27" | en |
Affected
| ||||||
Zabbix Search vendor "Zabbix" | Zabbix Search vendor "Zabbix" for product "Zabbix" | >= 6.4.0 <= 6.4.12 Search vendor "Zabbix" for product "Zabbix" and version " >= 6.4.0 <= 6.4.12" | en |
Affected
|