Zabbix server can perform command execution for configured scripts. After command is executed, audit entry is added to "Audit Log". Due to "clientip" field is not sanitized, it is possible to injection SQL into "clientip" and exploit time based blind SQL injection.
References
Link | Resource |
---|---|
https://support.zabbix.com/browse/ZBX-24505 | Exploit Vendor Advisory |
https://support.zabbix.com/browse/ZBX-24505 | Exploit Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
08 Oct 2025, 15:57
Type | Values Removed | Values Added |
---|---|---|
First Time |
Zabbix
Zabbix zabbix |
|
CPE | cpe:2.3:a:zabbix:zabbix:7.0.0:alpha1:*:*:*:*:*:* cpe:2.3:a:zabbix:zabbix:7.0.0:beta1:*:*:*:*:*:* cpe:2.3:a:zabbix:zabbix:7.0.0:alpha6:*:*:*:*:*:* cpe:2.3:a:zabbix:zabbix:7.0.0:alpha9:*:*:*:*:*:* cpe:2.3:a:zabbix:zabbix:7.0.0:alpha5:*:*:*:*:*:* cpe:2.3:a:zabbix:zabbix:7.0.0:alpha3:*:*:*:*:*:* cpe:2.3:a:zabbix:zabbix:7.0.0:alpha8:*:*:*:*:*:* cpe:2.3:a:zabbix:zabbix:7.0.0:alpha7:*:*:*:*:*:* cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:* cpe:2.3:a:zabbix:zabbix:7.0.0:alpha2:*:*:*:*:*:* cpe:2.3:a:zabbix:zabbix:7.0.0:alpha4:*:*:*:*:*:* |
|
References | () https://support.zabbix.com/browse/ZBX-24505 - Exploit, Vendor Advisory |
21 Nov 2024, 08:55
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References | () https://support.zabbix.com/browse/ZBX-24505 - |
17 May 2024, 18:35
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-05-17 10:15
Updated : 2025-10-08 15:57
NVD link : CVE-2024-22120
Mitre link : CVE-2024-22120
CVE.ORG link : CVE-2024-22120
JSON object : View
Products Affected
zabbix
- zabbix
CWE
CWE-20
Improper Input Validation