Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).
CVE-2024-22120 — Improper Input Validation in Zabbix
Severity
8.8HIGHNVD
VulnCheck9.1
EPSS
92.3%
top 0.28%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedMay 17
Latest updateSep 19
Description
Zabbix server can perform command execution for configured scripts. After command is executed, audit entry is added to "Audit Log". Due to "clientip" field is not sanitized, it is possible to injection SQL into "clientip" and exploit time based blind SQL injection.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9
Affected Packages4 packages
🔴Vulnerability Details
3💥Exploits & PoCs
1Nuclei▶
Zabbix Server - Time-Based Blind SQL injection
🔍Detection Rules
1Suricata▶
ET WEB_SPECIFIC_APPS Zabbix Server Blind SQL Injection via clientip Parameter (CVE-2024-22120)↗2024-09-19
📋Vendor Advisories
1Debian▶
CVE-2024-22120: zabbix - Zabbix server can perform command execution for configured scripts. After comman...↗2024