CVE-2024-42327 is a critical SQL injection vulnerability affecting Zabbix, a widely used open-source monitoring tool. With a CVSS score of 9.9, this vulnerability poses significant risks, allowing attackers to escalate privileges and gain complete control over vulnerable Zabbix servers.
Vulnerability Details
The vulnerability is located in the user.get API endpoint, specifically within the CUser class’s addRelatedObjects function. It can be exploited by non-admin users who have API access, including those with the default User role. Attackers can manipulate API calls to inject malicious SQL commands, potentially leading to unauthorized access and control over the Zabbix server.
Impact of Exploitation
Successful exploitation of CVE-2024-42327 can lead to several severe consequences:
- Data Breaches: Unauthorized access to sensitive monitoring data, including system configurations and user credentials.
- System Compromise: Attackers could leverage escalated privileges to manipulate the Zabbix server and pivot to other connected systems.
- Denial of Service: Disruption of monitoring operations by altering or deleting critical data.
Affected Versions
The vulnerability affects the following versions of Zabbix:
- 6.0.0 – 6.0.31
- 6.4.0 – 6.4.16
- 7.0.0
Mitigation and Remediation
Zabbix has released patches to address this vulnerability in the following versions:
- Zabbix 6.0.32rc1
- Zabbix 6.4.17rc1
- Zabbix 7.0.1rc1
Organizations using affected versions are strongly urged to update their systems immediately to mitigate risks associated with this vulnerability.
Recommended Actions
To protect against CVE-2024-42327, organizations should:
- Update: Immediately upgrade to the patched versions of Zabbix.
- Review User Permissions: Ensure that only authorized personnel have API access and that user roles are appropriately restricted.
- Conduct Security Assessments: Regularly assess the security posture of your Zabbix installation and related systems.
This vulnerability highlights the importance of maintaining up-to-date software and regularly reviewing security configurations to protect against potential exploits in critical infrastructure monitoring tools like Zabbix.