{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-22120","assignerOrgId":"72de3e22-0555-4a0d-ae81-9249e0f0a1e8","state":"PUBLISHED","assignerShortName":"Zabbix","dateReserved":"2024-01-05T07:44:01.395Z","datePublished":"2024-05-17T09:53:52.798Z","dateUpdated":"2024-08-01T22:35:34.820Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","modules":["Server"],"product":"Zabbix","repo":"https://git.zabbix.com/","vendor":"Zabbix","versions":[{"changes":[{"at":"6.0.28rc1","status":"unaffected"}],"lessThanOrEqual":"6.0.27","status":"affected","version":"6.0.0","versionType":"git"},{"changes":[{"at":"6.4.13rc1","status":"unaffected"}],"lessThanOrEqual":"6.4.12","status":"affected","version":"6.4.0","versionType":"git"},{"changes":[{"at":"7.0.0beta1","status":"unaffected"}],"lessThanOrEqual":"7.0.0beta1","status":"affected","version":"7.0.0alpha1","versionType":"git"}]}],"credits":[{"lang":"en","type":"reporter","value":"Zabbix wants to thank Maxim Tyukov (mf0cuz) who submitted this report in HackerOne bug bounty platform"}],"datePublic":"2024-05-17T08:22:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Zabbix server can perform command execution for configured scripts. After command is executed, audit entry is added to \"Audit Log\". Due to \"clientip\" field is not sanitized, it is possible to injection SQL into \"clientip\" and exploit time based blind SQL injection."}],"value":"Zabbix server can perform command execution for configured scripts. After command is executed, audit entry is added to \"Audit Log\". Due to \"clientip\" field is not sanitized, it is possible to injection SQL into \"clientip\" and exploit time based blind SQL injection."}],"impacts":[{"capecId":"CAPEC-253","descriptions":[{"lang":"en","value":"CAPEC-253 Remote Code Inclusion"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":9.1,"baseSeverity":"CRITICAL","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"HIGH","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-20","description":"CWE-20 Improper Input Validation","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"72de3e22-0555-4a0d-ae81-9249e0f0a1e8","shortName":"Zabbix","dateUpdated":"2024-05-20T06:45:42.494Z"},"references":[{"url":"https://support.zabbix.com/browse/ZBX-24505"}],"source":{"discovery":"EXTERNAL"},"title":"Time Based SQL Injection in Zabbix Server Audit Log","x_generator":{"engine":"Vulnogram 0.1.0-dev"}},"adp":[{"title":"CISA ADP Vulnrichment","metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2024-22120","role":"CISA Coordinator","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"total"}],"version":"2.0.3","timestamp":"2024-05-20T13:29:40.805103Z"}}}],"affected":[{"cpes":["cpe:2.3:a:zabbix:zabbix_server:*:*:*:*:*:*:*:*"],"vendor":"zabbix","product":"zabbix_server","versions":[{"status":"affected","version":"6.0.0"},{"status":"affected","version":"6.4.0"},{"status":"affected","version":"7.0.0alpha1"}],"defaultStatus":"affected"}],"providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-06-04T17:52:44.718Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-01T22:35:34.820Z"},"title":"CVE Program Container","references":[{"url":"https://support.zabbix.com/browse/ZBX-24505","tags":["x_transferred"]}]}]}}