AI description
CVE-2024-22120 describes a SQL injection vulnerability found in Zabbix Server. This flaw exists within the audit logging mechanism, specifically concerning the `clientip` field. When the Zabbix server executes configured scripts, an audit entry is recorded, but the `clientip` field within this entry is not adequately sanitized. This lack of sanitization allows an attacker to inject malicious SQL commands into the `clientip` field, enabling a time-based blind SQL injection attack. Through this method, attackers can potentially exfiltrate sensitive data from the underlying database. The vulnerability affects Zabbix versions 6.0.0 to 6.4.12 and 7.0.0alpha1 to 7.0.0beta1.
- Description
- Zabbix server can perform command execution for configured scripts. After command is executed, audit entry is added to "Audit Log". Due to "clientip" field is not sanitized, it is possible to injection SQL into "clientip" and exploit time based blind SQL injection.
- Source
- security@zabbix.com
- NVD status
- Analyzed
- Products
- zabbix
CVSS 3.1
- Type
- Primary
- Base score
- 8.8
- Impact score
- 5.9
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
- security@zabbix.com
- CWE-20
Hype score is a measure of social media activity compared against trending CVEs from the past 12 months. Max score 100.
- Hype score
5
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "D724C8AD-C793-4602-8B1B-33B54A0A847A",
"versionEndExcluding": "6.0.28",
"versionStartIncluding": "6.0.0"
},
{
"criteria": "cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "8507A896-08E2-4A4F-B499-66BDA79CAA32",
"versionEndExcluding": "6.4.13",
"versionStartIncluding": "6.4.0"
},
{
"criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:alpha1:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "93EB5757-7F98-4428-9616-C30A647A6612"
},
{
"criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:alpha2:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "DA00BDB5-433F-44E5-87AC-DA01C64B5DB3"
},
{
"criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:alpha3:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "98C46C92-9D86-45CD-88FE-DFBB5502BB88"
},
{
"criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:alpha4:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "B568E6DD-A6D1-4402-BB40-7DA2596A5BC8"
},
{
"criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:alpha5:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "B9C3673B-8459-4C63-8E90-724D1D42A8BB"
},
{
"criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:alpha6:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "7C9F6957-7526-4852-A579-DE556DBFAA97"
},
{
"criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:alpha7:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "81A7A191-93DE-4C5D-963E-E8890FF7AACA"
},
{
"criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:alpha8:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "AEE202D5-3C88-43A5-9328-FC78D0B9B8CF"
},
{
"criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:alpha9:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "F88BFB75-7951-47D5-941F-3839E9E31FFA"
},
{
"criteria": "cpe:2.3:a:zabbix:zabbix:7.0.0:beta1:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "8216247E-C160-4D2C-906E-9D8CD731B5C2"
}
],
"operator": "OR"
}
]
}
]