CVE-2024-42327
CRITICALZabbix < 6.0.32 - SQL Injection
Title source: ruleDescription
A non-admin user account on the Zabbix frontend with the default User role, or with any other role that gives API access can exploit this vulnerability. An SQLi exists in the CUser class in the addRelatedObjects function, this function is being called from the CUser.get function which is available for every user who has API access.
Exploits (11)
nomisec
WORKING POC
46 stars
by BridgerAlderson · poc
https://github.com/BridgerAlderson/Zabbix-CVE-2024-42327-SQL-Injection-RCE
github
WORKING POC
40 stars
by iSee857 · pythonpoc
https://github.com/iSee857/CVE-PoC/tree/main/Zabbix(CVE-2024-42327).py
nomisec
WORKING POC
3 stars
by watchdog1337 · poc
https://github.com/watchdog1337/CVE-2024-42327_Zabbix_SQLI
nomisec
WORKING POC
1 stars
by 874anthony · poc
https://github.com/874anthony/CVE-2024-42327_Zabbix_SQLi
Scores
CVSS v3
9.9
EPSS
0.9136
EPSS Percentile
99.7%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Details
CWE
CWE-89
Status
published
Products (1)
zabbix/zabbix
6.0.0 - 6.0.32
Published
Nov 27, 2024
Tracked Since
Feb 18, 2026