Security

Patches

Zabbix urges upgrades after critical SQL injection bug disclosure

US agencies blasted 'unforgivable' SQLi flaws earlier this year


Open-source enterprise network and application monitoring provider Zabbix is warning customers of a new critical vulnerability that could lead to full system compromise.

Tracked as CVE-2024-42327, the SQL injection bug scored a near-perfect 9.9 when assessed using the Common Vulnerability Scoring System (CVSSv3) and can be exploited by users with API access.

The project's description of the vulnerability explained: "A non-admin user account on the Zabbix frontend with the default User role, or with any other role that gives API access can exploit this vulnerability. 

"An SQLi exists in the CUser class in the addRelatedObjects function, this function is being called from the CUser.get function which is available for every user who has API access."

Zabbix said three product versions are affected and should be upgraded to the latest available:

Upgrading to versions 6.0.32rc1, 6.4.17rc1, and 7.0.1rc1 respectively will protect users from the privilege escalation attacks.

The project has thousands of customers worldwide, suggesting the attack surface could not only be quite large, but also affect some major enterprises across every continent.

Altice, Bupa Chile, Dell, the European Space Agency, Seat, T-Systems, and African mega telco Vodacom are all among the various high-profile customers listed on Zabbix's website, which span multiple industries across the public and private sectors.

The FBI and CISA started ramping up their Secure by Design messaging earlier this year, setting the tone of both agencies' strategies and initiatives throughout 2024. Around the same time, SQL injection vulnerabilities like CVE-2024-42327 were added to the US' list of "unforgivable" product defects – vulnerabilities that should have been stamped out by software vendors long ago.

SQL injections have been around for decades and aren't known for being especially difficult to exploit. Currently accounting for around ten percent of the vulnerabilities in CISA's known exploited vulnerability (KEV) catalog, the prevalent defect class is often associated with or is a known precursor to ransomware activity.

The spate of data theft attacks on customers of Progress Software's MOVEit MFT last year (and this year too), facilitated by an SQL injection vulnerability, is a recent example of how much damage such ancient bugs can cause. Emsisoft's tracker puts the number of victim organizations at 2,773, which in total has compromised the data of nearly 96 million individuals.

Per the alert issued by the FBI and CISA earlier this year, the two agencies called on software vendors to ensure their products are free of these types of bug before they're shipped.

"Vulnerabilities like SQLi have been considered by others an 'unforgivable' vulnerability since at least 2007," the alert read. "Despite this finding, SQL vulnerabilities (such as CWE-89) are still a prevalent class of vulnerability. For example, CWE-89 is on top 25 lists for both the most dangerous and stubborn software weaknesses in 2023."

Both agencies also called on the customers of those vendors to hold developers to account, ensuring they received confirmation that a thorough code review eliminated SQLi flaws from the outset. ®

Send us news
7 Comments

Ransomware criminals love CISA's KEV list – and that's a bug, not a feature

1 in 3 entries are used to extort civilians, says new paper

Wallbleed vulnerability unearths secrets of China's Great Firewall 125 bytes at a time

Boffins poked around inside censorship engines – here's what they found

Critical flaws in Mongoose library expose MongoDB to data thieves, code execution

Bugs fixed, updating to the latest version is advisable

Critical PostgreSQL bug tied to zero-day attack on US Treasury

High-complexity bug unearthed by infoseccers, as Rapid7 probes exploit further

FreSSH bugs undiscovered for years threaten OpenSSH security

Exploit code now available for MitM and DoS attacks

MITRE Caldera security suite scores perfect 10 for insecurity

Is a trivial remote-code execution hole in every version part of the training, or?

Rather than add a backdoor, Apple decides to kill iCloud encryption for UK peeps

Plus: SEC launches new crypto crime unit; Phishing toolkit upgraded; and more

Palo Alto firewalls under attack as miscreants chain flaws for root access

If you want to avoid urgent patches, stop exposing management consoles to the public internet

Ivanti endpoint manager can become endpoint ravager, thanks to quartet of critical flaws

PoC exploit code shows why this is a patch priority

Harassment allegations against DEF CON veteran detailed in court filing

More than a dozen women came forward with accusations

Oops, some of our customers' Power Pages-hosted sites were exploited, says Microsoft

Don't think this is SaaS and you can relax: Redmond wants a few of you to check your websites

Trump’s DoD CISO pick previously faced security clearance suspension

Hey, at least Katie Arrington brings a solid resume