ZABBIX 'DBcondition' Parameter SQL Injection Vulnerability
BID:39148
Info
ZABBIX 'DBcondition' Parameter SQL Injection Vulnerability
| Bugtraq ID: | 39148 |
| Class: | Input Validation Error |
| CVE: |
CVE-2010-1277 |
| Remote: | Yes |
| Local: | No |
| Published: | Apr 01 2010 12:00AM |
| Updated: | Nov 26 2013 12:56AM |
| Credit: | Dawid Golunski |
| Vulnerable: |
ZABBIX ZABBIX 1.8.1 ZABBIX ZABBIX 1.8 Gentoo Linux |
| Not Vulnerable: |
ZABBIX ZABBIX 1.8.2 |
Discussion
ZABBIX 'DBcondition' Parameter SQL Injection Vulnerability
ZABBIX is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.
Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
Versions prior to ZABBIX 1.8.2 are vulnerable.
ZABBIX is prone to an SQL-injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.
Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.
Versions prior to ZABBIX 1.8.2 are vulnerable.
Exploit / POC
ZABBIX 'DBcondition' Parameter SQL Injection Vulnerability
Attackers can use a browser to exploit this issue.
The following exploit is available:
Attackers can use a browser to exploit this issue.
The following exploit is available:
Solution / Fix
ZABBIX 'DBcondition' Parameter SQL Injection Vulnerability
Solution:
Updates are available. Please see the references for details.
Solution:
Updates are available. Please see the references for details.
References
ZABBIX 'DBcondition' Parameter SQL Injection Vulnerability
References:
References:
- ZABBIX 1.8.2 (ZABBIX)
- ZABBIX Homepage (ZABBIX)