An SQL injection flaw was found in Zabbix, where input passed via the "itemid" parameter to popup_bitem.php is not properly sanitized before being used in an SQL query. The report was against version 2.0.1, but the upstream bug report [1] indicates this also affects 1.8.x. Upstream has patched [2] this, and there is a potential patch for 1.8.x [3]. [1] https://support.zabbix.com/browse/ZBX-5348 [2] http://git.zabbixzone.com/zabbix2.0/.git/commit/333a3a5542ba8a2c901c24b7bf5440f41f1f4f54 [3] https://gist.github.com/3181678
Created zabbix tracking bugs for this issue Affects: fedora-all [bug 843928] Affects: epel-all [bug 843929]
Assigned CVE as per http://www.openwall.com/lists/oss-security/2012/07/28/3
zabbix-1.8.15-1.fc16 has been pushed to the Fedora 16 stable repository. If problems still persist, please make note of it in this bug report.
zabbix-1.8.15-1.fc17 has been pushed to the Fedora 17 stable repository. If problems still persist, please make note of it in this bug report.
zabbix-1.8.15-1.el6 has been pushed to the Fedora EPEL 6 stable repository. If problems still persist, please make note of it in this bug report.
Seems like we forgot to close this one!