Vulnerability identifier: #VU101062
Vulnerability risk: Medium
CVSSv4.0: 6.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2024-42330
CWE-ID:
CWE-134
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
Zabbix
Server applications /
Remote management servers, RDP, SSH
Vendor: Zabbix
Description
The vulnerability allows a remote user to execute arbitrary code on the target system.
The vulnerability exists due to a format string error within the HttpRequest object that allows to get the HTTP headers from the server's response after sending the request. The returned strings are created directly from the data returned by the server and are not correctly encoded for JavaScript. A remote user can create internal strings that can be used to access hidden properties of objects, which can lead to remote code execution.
Mitigation
Install updates from vendor's website.
Vulnerable software versions
Zabbix: 6.0.0 rc1 - 6.0.33, 6.2.0 rc1 - 6.2.9, 6.4.0 rc1 - 6.4.18, 7.0.0 rc1 - 7.0.3
External links
https://support.zabbix.com/browse/ZBX-25626
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.