First published: Fri Aug 19 2011(Updated: )
popup.php in Zabbix before 1.8.7 allows remote attackers to read the contents of arbitrary database tables via a modified srctbl parameter.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Zabbix Server | <=1.8.6 | |
Zabbix Server | =1.1 | |
Zabbix Server | =1.1-beta10 | |
Zabbix Server | =1.1-beta11 | |
Zabbix Server | =1.1-beta12 | |
Zabbix Server | =1.1-beta2 | |
Zabbix Server | =1.1-beta3 | |
Zabbix Server | =1.1-beta4 | |
Zabbix Server | =1.1-beta5 | |
Zabbix Server | =1.1-beta6 | |
Zabbix Server | =1.1-beta7 | |
Zabbix Server | =1.1-beta8 | |
Zabbix Server | =1.1-beta9 | |
Zabbix Server | =1.1.1 | |
Zabbix Server | =1.1.2 | |
Zabbix Server | =1.1.3 | |
Zabbix Server | =1.1.4 | |
Zabbix Server | =1.1.5 | |
Zabbix Server | =1.1.6 | |
Zabbix Server | =1.1.7 | |
Zabbix Server | =1.3-beta | |
Zabbix Server | =1.3.1-beta | |
Zabbix Server | =1.3.2-beta | |
Zabbix Server | =1.3.3-beta | |
Zabbix Server | =1.3.4-beta | |
Zabbix Server | =1.3.5-beta | |
Zabbix Server | =1.3.6-beta | |
Zabbix Server | =1.3.7-beta | |
Zabbix Server | =1.3.8-beta | |
Zabbix Server | =1.4.2 | |
Zabbix Server | =1.4.3 | |
Zabbix Server | =1.4.4 | |
Zabbix Server | =1.4.5 | |
Zabbix Server | =1.4.6 | |
Zabbix Server | =1.5-beta | |
Zabbix Server | =1.5.1-beta | |
Zabbix Server | =1.5.2-beta | |
Zabbix Server | =1.5.3-beta | |
Zabbix Server | =1.5.4-beta | |
Zabbix Server | =1.6 | |
Zabbix Server | =1.6.1 | |
Zabbix Server | =1.6.2 | |
Zabbix Server | =1.6.3 | |
Zabbix Server | =1.6.4 | |
Zabbix Server | =1.6.5 | |
Zabbix Server | =1.6.6 | |
Zabbix Server | =1.6.7 | |
Zabbix Server | =1.6.8 | |
Zabbix Server | =1.6.9 | |
Zabbix Server | =1.7 | |
Zabbix Server | =1.7.1 | |
Zabbix Server | =1.7.2 | |
Zabbix Server | =1.7.3 | |
Zabbix Server | =1.7.4 | |
Zabbix Server | =1.8 | |
Zabbix Server | =1.8.1 | |
Zabbix Server | =1.8.2 | |
Zabbix Server | =1.8.3 | |
Zabbix Server | =1.8.3-rc1 | |
Zabbix Server | =1.8.3-rc2 | |
Zabbix Server | =1.8.3-rc3 | |
Zabbix Server | =1.8.4 | |
Zabbix Server | =1.8.4-rc1 | |
Zabbix Server | =1.8.4-rc2 | |
Zabbix Server | =1.8.4-rc3 | |
Zabbix Server | =1.8.4-rc4 | |
Zabbix Server | =1.8.5 | |
Zabbix Server | =1.8.5-rc1 | |
Zabbix Server | =1.8.6-rc1 | |
Zabbix Server | =1.8.6-rc2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-3265 is considered a medium severity vulnerability due to its potential to expose sensitive database information to attackers.
To fix CVE-2011-3265, upgrade Zabbix to version 1.8.7 or later, which addresses this vulnerability.
CVE-2011-3265 affects Zabbix versions prior to 1.8.7, including versions 1.1, 1.4.x, 1.5.x, 1.6.x, 1.7.x, and 1.8.0 to 1.8.6.
CVE-2011-3265 can be exploited through a remote attack that manipulates the 'srctbl' parameter to read arbitrary database tables.
A potential workaround for CVE-2011-3265 is to restrict access to the vulnerable parameter until a patch or upgrade can be applied.