CVE-2024-36465

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-36465
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-36465.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-36465
Downstream
Published
2025-04-02T06:15:34.130Z
Modified
2025-11-15T21:00:19.951010Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

A low privilege (regular) Zabbix user with API access can use SQL injection vulnerability in include/classes/api/CApiService.php to execute arbitrary SQL commands via the groupBy parameter.

References

Affected packages

Git / github.com/zabbix/zabbix

Affected ranges

Type
GIT
Repo
https://github.com/zabbix/zabbix
Events

Affected versions

7.*

7.2.0
7.2.1
7.2.1rc1
7.2.1rc2
7.2.1rc3
7.2.2rc1

Database specific

vanir_signatures

[
    {
        "signature_version": "v1",
        "deprecated": false,
        "target": {
            "file": "src/zabbix_java/src/com/zabbix/gateway/GeneralInformation.java"
        },
        "digest": {
            "line_hashes": [
                "143765476386771173439711366632201328231",
                "255950454136983690221077954566808912847",
                "64084121948480134819544973963241029415",
                "76319088248258659040854606871231174433",
                "289637474208142993353745869569437068978",
                "252756299133527519074556691865962231981"
            ],
            "threshold": 0.9
        },
        "signature_type": "Line",
        "source": "https://github.com/zabbix/zabbix/commit/4b091abf8ff7f6da9ba76ab1d9d04aaa60920f0f",
        "id": "CVE-2024-36465-16687dde"
    }
]

source

"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-36465.json"