Zabbix Web Interface popup_bitem.php itemid Parameter SQL Injection

This script is Copyright (C) 2012-2016 Tenable Network Security, Inc.


Synopsis :

The remote web server hosts a PHP application that is prone to a SQL
injection attack.

Description :

The remote web server hosts a version of the Zabbix web interface that
is affected by a SQL injection vulnerability. The vulnerability exists
in the 'popup_bitem.php' script, which fails to properly sanitize
user-supplied input to the 'itemid' parameter before using it in
database queries. This could allow an attacker to manipulate such
queries, resulting in manipulation or disclosure of arbitrary data.

See also :

https://support.zabbix.com/browse/ZBX-5348
http://www.zabbix.com/rn1.8.15rc1.php
http://www.zabbix.com/rn2.0.2rc1.php

Solution :

Upgrade to version 1.8.15rc1 / 2.02rc1 / 2.1.0 or later.

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVSS Temporal Score : 5.9
(CVSS2#E:POC/RL:OF/RC:C)
Public Exploit Available : true

Family: CGI abuses

Nessus Plugin ID: 62757 ()

Bugtraq ID: 54661

CVE ID: CVE-2012-3435

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now