SQL injection vulnerability in the user.authenticate method in the API in Zabbix 1.8 before 1.8.2 allows remote attackers to execute arbitrary SQL commands via the user parameter in JSON data to api_jsonrpc.php.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:14
Type | Values Removed | Values Added |
---|---|---|
References | () http://archives.neohapsis.com/archives/fulldisclosure/2010-04/0001.html - Exploit | |
References | () http://legalhackers.com/advisories/zabbix181api-sql.txt - Exploit | |
References | () http://legalhackers.com/poc/zabbix181api.pl-poc - Exploit | |
References | () http://secunia.com/advisories/39119 - Vendor Advisory | |
References | () http://www.osvdb.org/63456 - | |
References | () http://www.securityfocus.com/archive/1/510480/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/39148 - Exploit | |
References | () http://www.vupen.com/english/advisories/2010/0799 - Vendor Advisory | |
References | () http://www.zabbix.com/rn1.8.2.php - Patch |
Information
Published : 2010-04-06 16:30
Updated : 2024-11-21 01:14
NVD link : CVE-2010-1277
Mitre link : CVE-2010-1277
CVE.ORG link : CVE-2010-1277
JSON object : View
Products Affected
zabbix
- zabbix
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')