Zabbix < 1.8.18 / 2.0.9 Multiple SQL Injection Vulnerabilities
PVS ID: 8049 FAMILY: Generic RISK: MEDIUM NESSUS ID:70497
Description: Synopsis :\n\nThe remote host is running a web application that is vulnerable to a SQL-injection attack.\n\nThe remote host is running Zabbix, an IT monitoring service. Versions of Zabbix earlier than 1.8.18 or 2.0.9 are contain a number of SQL injection vulnerabilities via the API and web front end. The following API methods are reported to be vulnerable:\n\n - alert.get: time_from, time_till;\n - event.get: object, source, eventid_from, eventid_till;\n - graphitem.get: parameter: type;\n - graph.get: parameter: type;\n - graphprototype.get: parameter: type;\n - history.get: parameter: time_from, time_till;\n - trigger.get: parameter: lastChangeSince, lastChangeTill, min_severity;\n - triggerprototype.get: parameter: min_severity;\n - usergroup.get: parameter: status\n\nOther pages vulnerable to SQL injection include the "Dashboard", "Graphs", "Maps", "Latest data" and "Screens" pages in the "Monitoring" section. Successful attacks allow an attacker to gain access to the database and execute arbitrary SQL statements. \n\nFor your information, the observed version of Zabbix Front-end is: \n %L

Solution: Upgrade to Zabbix 2.0.9 / 1.8.18 or later. Additionally, patches are available for versions 2.0.8 / 1.8.17 / 1.8.2.

CVE-2013-5743


Copyright Tenable Network Security Inc. 2013