
Cloud Vulnerability DB
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
CVE-2024-42327 is a critical SQL injection vulnerability discovered in Zabbix, a popular open-source IT infrastructure monitoring platform. The vulnerability affects Zabbix frontend versions 6.0.0 through 6.0.31, 6.4.0 through 6.4.16, and 7.0.0. The flaw was discovered by Márk Rákóczi and reported through the HackerOne bug bounty platform (SecurityOnline Info, NVD).
The vulnerability exists in the CUser class's addRelatedObjects function, which is called by the CUser.get method. Specifically, the flaw is in the user.get method's selectRole functionality, where array input validation is lacking. The vulnerability has been assigned a critical CVSS v3.1 score of 9.9 (AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H) and is classified as CWE-89 (SQL Injection) (NVD, Zabbix Support).
Successful exploitation of this vulnerability can lead to severe consequences including data breaches with access to sensitive monitoring data, system configurations, and user credentials. Attackers can potentially gain complete control of Zabbix instances, compromise the underlying Zabbix server, and possibly pivot to other connected systems. Additionally, attackers can disrupt monitoring operations by manipulating or deleting critical data (SecurityOnline Info).
Zabbix has released patched versions to address this vulnerability: 6.0.32rc1, 6.4.17rc1, and 7.0.1rc1. Organizations are strongly advised to immediately update their Zabbix installations to these patched versions. Additionally, it is recommended to review and restrict unnecessary API permissions to minimize the attack surface (SecurityOnline Info).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
An open project to list all known cloud vulnerabilities and Cloud Service Provider security issues
A comprehensive threat intelligence database of cloud security incidents, actors, tools and techniques
A step-by-step framework for modeling and improving SaaS and PaaS tenant isolation
Get a personalized demo
“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
“We know that if Wiz identifies something as critical, it actually is.”