Security

Patches

Zabbix urges upgrades after critical SQL injection bug disclosure

US agencies blasted 'unforgivable' SQLi flaws earlier this year


Open-source enterprise network and application monitoring provider Zabbix is warning customers of a new critical vulnerability that could lead to full system compromise.

Tracked as CVE-2024-42327, the SQL injection bug scored a near-perfect 9.9 when assessed using the Common Vulnerability Scoring System (CVSSv3) and can be exploited by users with API access.

The project's description of the vulnerability explained: "A non-admin user account on the Zabbix frontend with the default User role, or with any other role that gives API access can exploit this vulnerability. 

"An SQLi exists in the CUser class in the addRelatedObjects function, this function is being called from the CUser.get function which is available for every user who has API access."

Zabbix said three product versions are affected and should be upgraded to the latest available:

Upgrading to versions 6.0.32rc1, 6.4.17rc1, and 7.0.1rc1 respectively will protect users from the privilege escalation attacks.

The project has thousands of customers worldwide, suggesting the attack surface could not only be quite large, but also affect some major enterprises across every continent.

Altice, Bupa Chile, Dell, the European Space Agency, Seat, T-Systems, and African mega telco Vodacom are all among the various high-profile customers listed on Zabbix's website, which span multiple industries across the public and private sectors.

The FBI and CISA started ramping up their Secure by Design messaging earlier this year, setting the tone of both agencies' strategies and initiatives throughout 2024. Around the same time, SQL injection vulnerabilities like CVE-2024-42327 were added to the US' list of "unforgivable" product defects – vulnerabilities that should have been stamped out by software vendors long ago.

SQL injections have been around for decades and aren't known for being especially difficult to exploit. Currently accounting for around ten percent of the vulnerabilities in CISA's known exploited vulnerability (KEV) catalog, the prevalent defect class is often associated with or is a known precursor to ransomware activity.

The spate of data theft attacks on customers of Progress Software's MOVEit MFT last year (and this year too), facilitated by an SQL injection vulnerability, is a recent example of how much damage such ancient bugs can cause. Emsisoft's tracker puts the number of victim organizations at 2,773, which in total has compromised the data of nearly 96 million individuals.

Per the alert issued by the FBI and CISA earlier this year, the two agencies called on software vendors to ensure their products are free of these types of bug before they're shipped.

"Vulnerabilities like SQLi have been considered by others an 'unforgivable' vulnerability since at least 2007," the alert read. "Despite this finding, SQL vulnerabilities (such as CWE-89) are still a prevalent class of vulnerability. For example, CWE-89 is on top 25 lists for both the most dangerous and stubborn software weaknesses in 2023."

Both agencies also called on the customers of those vendors to hold developers to account, ensuring they received confirmation that a thorough code review eliminated SQLi flaws from the outset. ®

Send us news
7 Comments

UK ICO not happy with Google's plans to allow device fingerprinting

Also, Ascension notifies 5.6M victims, Krispy Kreme bandits come forward, LockBit 4.0 released, and more

Three more vulns spotted in Ivanti CSA, all critical, one 10/10

Patch up, everyone – that admin portal is mighty attractive to your friendly cyberattacker

Apache issues patches for critical Struts 2 RCE bug

More details released after devs allowed weeks to apply fixes

Fully patched Cleo products under renewed 'zero-day-ish' mass attack

Thousands of servers targeted while customers wait for patches

Critical security hole in Apache Struts under exploit

You applied the patch that could stop possible RCE attacks last week, right?

OpenWrt orders router firmware updates after supply chain attack scare

A couple of bugs lead to a potentially bad time

Infosec experts divided on AI's potential to assist red teams

Yes, LLMs can do the heavy lifting. But good luck getting one to give evidence

Are your Prometheus servers and exporters secure? Probably not

Plus: Netscaler brute force barrage; BeyondTrust API key stolen; and more

Trump administration wants to go on cyber offensive against China

The US has never attacked Chinese critical infrastructure before, right?

Deloitte says cyberattack on Rhode Island benefits portal carries 'major security threat'

Personal and financial data probably stolen

Perfect 10 directory traversal vuln hits SailPoint's IAM solution

20-year-old info disclosure class bug still pervades security software

Lights out for 18 more DDoS booters in pre-Christmas Operation PowerOFF push

Holiday cheer comes in the form of three arrests and 27 shuttered domains