First published: Wed Nov 27 2024(Updated: )
A non-admin user account on the Zabbix frontend with the default User role, or with any other role that gives API access can exploit this vulnerability. An SQLi exists in the CUser class in the addRelatedObjects function, this function is being called from the CUser.get function which is available for every user who has API access.
Credit: security@zabbix.com
Affected Software | Affected Version | How to fix |
---|---|---|
Zabbix Server |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-42327 is considered a critical severity vulnerability due to its potential for SQL injection exploitation.
Any non-admin user account on the Zabbix frontend that has the default User role or any role granting API access is affected by CVE-2024-42327.
To remediate CVE-2024-42327, it is recommended to update to the latest version of Zabbix that addresses this vulnerability.
CVE-2024-42327 is classified as an SQL injection vulnerability.
The CUser class in the addRelatedObjects function is specifically affected by CVE-2024-42327.