2024-12-08 03:06:42 +00:00

64 lines
2.1 KiB
JSON

{
"id": "CVE-2024-22120",
"sourceIdentifier": "security@zabbix.com",
"published": "2024-05-17T10:15:07.363",
"lastModified": "2024-11-21T08:55:37.330",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Zabbix server can perform command execution for configured scripts. After command is executed, audit entry is added to \"Audit Log\". Due to \"clientip\" field is not sanitized, it is possible to injection SQL into \"clientip\" and exploit time based blind SQL injection."
},
{
"lang": "es",
"value": "El servidor Zabbix puede realizar la ejecuci\u00f3n de comandos para scripts configurados. Despu\u00e9s de ejecutar el comando, la entrada de auditor\u00eda se agrega al \"Registro de auditor\u00eda\". Debido a que el campo \"clientip\" no est\u00e1 sanitizado, es posible inyectar SQL en \"clientip\" y explotar la inyecci\u00f3n SQL ciega basada en el tiempo."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@zabbix.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.3,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "security@zabbix.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"references": [
{
"url": "https://support.zabbix.com/browse/ZBX-24505",
"source": "security@zabbix.com"
},
{
"url": "https://support.zabbix.com/browse/ZBX-24505",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}