First published: Wed Jan 11 2017(Updated: )
SQL injection vulnerability in Zabbix before 2.2.14 and 3.0 before 3.0.4 allows remote attackers to execute arbitrary SQL commands via the toggle_ids array parameter in latest.php.
Credit: security@debian.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/zabbix | <=1:2.2.7+dfsg-2+deb8u1<=1:2.2.7+dfsg-2<=1:2.2.7+dfsg-1 | 1:3.0.4+dfsg-1 1:2.2.7+dfsg-2+deb8u2 |
debian/zabbix | 1:5.0.8+dfsg-1 1:6.0.14+dfsg-1 1:7.0.2+dfsg-1 | |
Zabbix Server | <=2.2.13 | |
Zabbix Server | =3.0.0 | |
Zabbix Server | =3.0.1 | |
Zabbix Server | =3.0.2 | |
Zabbix Server | =3.0.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-10134 has a severity rating that indicates it allows remote attackers to execute arbitrary SQL commands.
To fix CVE-2016-10134, upgrade Zabbix to version 2.2.14 or later, or 3.0.4 or later.
CVE-2016-10134 affects Zabbix versions prior to 2.2.14 and 3.0 prior to 3.0.4.
No, using affected versions without upgrading poses a security risk as the vulnerability remains exploitable.
CVE-2016-10134 can facilitate SQL injection attacks, allowing unauthorized SQL commands to be executed.