CVE-2024-42327

CRITICAL

Zabbix < 6.0.32 - SQL Injection

Title source: rule

Description

A non-admin user account on the Zabbix frontend with the default User role, or with any other role that gives API access can exploit this vulnerability. An SQLi exists in the CUser class in the addRelatedObjects function, this function is being called from the CUser.get function which is available for every user who has API access.

Exploits (11)

exploitdb SCANNER
by m4nb4 · pythonwebappsphp
https://www.exploit-db.com/exploits/52230
nomisec WORKING POC 46 stars
by BridgerAlderson · poc
https://github.com/BridgerAlderson/Zabbix-CVE-2024-42327-SQL-Injection-RCE
github WORKING POC 40 stars
by iSee857 · pythonpoc
https://github.com/iSee857/CVE-PoC/tree/main/Zabbix(CVE-2024-42327).py
nomisec WORKING POC 36 stars
by aramosf · poc
https://github.com/aramosf/cve-2024-42327
nomisec WORKING POC 17 stars
by compr00t · poc
https://github.com/compr00t/CVE-2024-42327
nomisec WORKING POC 9 stars
by godylockz · poc
https://github.com/godylockz/CVE-2024-42327
nomisec WORKING POC 3 stars
by watchdog1337 · poc
https://github.com/watchdog1337/CVE-2024-42327_Zabbix_SQLI
nomisec WORKING POC 3 stars
by depers-rus · poc
https://github.com/depers-rus/CVE-2024-42327
nomisec WORKING POC 1 stars
by 874anthony · poc
https://github.com/874anthony/CVE-2024-42327_Zabbix_SQLi
nomisec WORKING POC
by itform-fr · poc
https://github.com/itform-fr/Zabbix---CVE-2024-42327
nomisec WRITEUP
by igorbf495 · poc
https://github.com/igorbf495/CVE-2024-42327

Scores

CVSS v3 9.9
EPSS 0.9136
EPSS Percentile 99.7%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

Details

CWE
CWE-89
Status published
Products (1)
zabbix/zabbix 6.0.0 - 6.0.32
Published Nov 27, 2024
Tracked Since Feb 18, 2026