cvelist/2024/22xxx/CVE-2024-22120.json

134 lines
5.7 KiB
JSON
Raw Normal View History

2024-01-05 08:00:36 +00:00
{
2024-05-17 10:00:35 +00:00
"data_version": "4.0",
2024-01-05 08:00:36 +00:00
"data_type": "CVE",
"data_format": "MITRE",
"CVE_data_meta": {
"ID": "CVE-2024-22120",
2024-05-17 10:00:35 +00:00
"ASSIGNER": "security@zabbix.com",
"STATE": "PUBLIC"
2024-01-05 08:00:36 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2024-05-17 10:00:35 +00:00
"value": "Zabbix server can perform command execution for configured scripts. After command is executed, audit entry is added to \"Audit Log\". Due to \"clientip\" field is not sanitized, it is possible to injection SQL into \"clientip\" and exploit time based blind SQL injection."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-20 Improper Input Validation",
"cweId": "CWE-20"
}
]
}
]
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Zabbix",
"product": {
"product_data": [
{
"product_name": "Zabbix",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"versions": [
{
"changes": [
{
"at": "6.0.28rc1",
"status": "unaffected"
}
],
"lessThanOrEqual": "6.0.27",
"status": "affected",
"version": "6.0.0",
"versionType": "git"
},
{
"changes": [
{
"at": "6.4.13rc1",
"status": "unaffected"
}
],
"lessThanOrEqual": "6.4.12",
"status": "affected",
"version": "6.4.0",
"versionType": "git"
},
{
"changes": [
{
"at": "7.0.0beta1",
"status": "unaffected"
}
],
"lessThanOrEqual": "7.0.0beta1",
"status": "affected",
"version": "7.0.0alpha1",
"versionType": "git"
}
],
"defaultStatus": "unaffected"
}
}
]
}
}
]
}
}
]
}
},
"references": {
"reference_data": [
{
"url": "https://support.zabbix.com/browse/ZBX-24505",
"refsource": "MISC",
"name": "https://support.zabbix.com/browse/ZBX-24505"
}
]
},
"generator": {
"engine": "Vulnogram 0.1.0-dev"
},
"source": {
"discovery": "EXTERNAL"
},
"credits": [
{
"lang": "en",
2024-05-20 07:00:35 +00:00
"value": "Zabbix wants to thank Maxim Tyukov (mf0cuz) who submitted this report in HackerOne bug bounty platform"
2024-05-17 10:00:35 +00:00
}
],
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
2024-01-05 08:00:36 +00:00
}
]
}
}