Description
|
|
Some vulnerabilities have been reported in Zabbix, which can be exploited by malicious users and malicious people to conduct SQL injection attacks.
1) Input passed via multiple parameters to multiple API methods is not properly sanitised before being used in a SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.
List of affected methods and parameters:
* alert.get: time_from, time_till
* event.get: object, source, eventid_from, eventid_till
* graphitem.get: type
* graph.get: type
* graphprototype.get: type
* history.get: time_from, time_till
* trigger.get: lastChangeSince, lastChangeTill, min_severity
* triggerprototype.get: min_severity
* usergroup.get: status
2) Certain unspecified input related to adding certain objects (e.g. graphs or maps) to favorites sections is not properly sanitised before being used in a SQL query. This can be exploited to manipulate SQL queries by injecting arbitrary SQL code.
The vulnerabilities are reported in versions 1.8.2, 1.8.17, and 2.0.8. Other versions may also be affected.
|