Bug 1367111 - zabbix: Unsanitized input in toggle_ids array in latest.php causes SQL injection
Summary: zabbix: Unsanitized input in toggle_ids array in latest.php causes SQL injection
Keywords:
Status: CLOSED NOTABUG
Alias: None
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1367112 1367113
Blocks:
TreeView+ depends on / blocked
 
Reported: 2016-08-15 14:50 UTC by Adam Mariš
Modified: 2021-02-17 03:27 UTC (History)
14 users (show)

Fixed In Version: zabbix 2.2.14rc1, zabbix 3.0.4rc1, zabbix 3.2.0alpha1
Clone Of:
Environment:
Last Closed: 2017-06-23 21:08:45 UTC
Embargoed:


Attachments (Terms of Use)

Description Adam Mariš 2016-08-15 14:50:20 UTC
It was found that Zabbix 2.2.x, 3.0.x and trunk suffers from a remote SQL injection vulnerability due to a failure to sanitize input in the toggle_ids array in the latest.php page.

By exploiting this SQL injection vulnerability, an authenticated attacker (or guest user) is able to gain full access to the database. This would allow an attacker to escalate their privileges to a power user, compromise the database, or execute commands on the underlying database operating system.

Although the attacker needs to be authenticated in general, the system could also be at risk if the adversary has no user account. Zabbix offers a guest mode which provides a low privileged default account for users without password. If this guest mode is enabled, the SQL injection vulnerability can be exploited unauthenticated.

Upstream bug:

https://support.zabbix.com/browse/ZBX-11023

External Reference:

http://seclists.org/fulldisclosure/2016/Aug/60

Comment 1 Adam Mariš 2016-08-15 14:50:53 UTC
Created zabbix22 tracking bugs for this issue:

Affects: epel-all [bug 1367113]

Comment 2 Adam Mariš 2016-08-15 14:51:02 UTC
Created zabbix tracking bugs for this issue:

Affects: fedora-all [bug 1367112]

Comment 3 Volker Fröhlich 2017-06-23 21:08:45 UTC
With all tracking issues closed, we can close this one too.


Note You need to log in before you can comment on or make changes to this bug.