SQL injection vulnerability in frontends/php/popup_bitem.php in Zabbix 1.8.15rc1 and earlier, and 2.x before 2.0.2rc1, allows remote attackers to execute arbitrary SQL commands via the itemid parameter.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:40
Type | Values Removed | Values Added |
---|---|---|
References | () http://git.zabbixzone.com/zabbix2.0/.git/commitdiff/333a3a5542ba8a2c901c24b7bf5440f41f1f4f54 - Exploit, Patch | |
References | () http://osvdb.org/84127 - | |
References | () http://secunia.com/advisories/49809 - Vendor Advisory | |
References | () http://secunia.com/advisories/50475 - | |
References | () http://www.debian.org/security/2012/dsa-2539 - | |
References | () http://www.exploit-db.com/exploits/20087 - Exploit | |
References | () http://www.openwall.com/lists/oss-security/2012/07/27/6 - | |
References | () http://www.openwall.com/lists/oss-security/2012/07/28/3 - | |
References | () http://www.securityfocus.com/bid/54661 - Exploit | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/77195 - | |
References | () https://support.zabbix.com/browse/ZBX-5348 - |
Information
Published : 2012-08-15 20:55
Updated : 2024-11-21 01:40
NVD link : CVE-2012-3435
Mitre link : CVE-2012-3435
CVE.ORG link : CVE-2012-3435
JSON object : View
Products Affected
zabbix
- zabbix
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')