A low privilege (regular) Zabbix user with API access can use SQL injection vulnerability in include/classes/api/CApiService.php to execute arbitrary SQL commands via the groupBy parameter.
[
{
"signature_version": "v1",
"deprecated": false,
"target": {
"file": "src/zabbix_java/src/com/zabbix/gateway/GeneralInformation.java"
},
"digest": {
"line_hashes": [
"143765476386771173439711366632201328231",
"255950454136983690221077954566808912847",
"64084121948480134819544973963241029415",
"76319088248258659040854606871231174433",
"289637474208142993353745869569437068978",
"252756299133527519074556691865962231981"
],
"threshold": 0.9
},
"signature_type": "Line",
"source": "https://github.com/zabbix/zabbix/commit/4b091abf8ff7f6da9ba76ab1d9d04aaa60920f0f",
"id": "CVE-2024-36465-16687dde"
}
]
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-36465.json"