SQL injection vulnerability in Zabbix before 2.2.14 and 3.0 before 3.0.4 allows remote attackers to execute arbitrary SQL commands via the toggle_ids array parameter in latest.php.
{
"binaries": [
{
"binary_name": "zabbix-agent",
"binary_version": "1:2.2.2+dfsg-1ubuntu1+esm1"
},
{
"binary_name": "zabbix-frontend-php",
"binary_version": "1:2.2.2+dfsg-1ubuntu1+esm1"
},
{
"binary_name": "zabbix-java-gateway",
"binary_version": "1:2.2.2+dfsg-1ubuntu1+esm1"
},
{
"binary_name": "zabbix-proxy-mysql",
"binary_version": "1:2.2.2+dfsg-1ubuntu1+esm1"
},
{
"binary_name": "zabbix-proxy-pgsql",
"binary_version": "1:2.2.2+dfsg-1ubuntu1+esm1"
},
{
"binary_name": "zabbix-proxy-sqlite3",
"binary_version": "1:2.2.2+dfsg-1ubuntu1+esm1"
},
{
"binary_name": "zabbix-server-mysql",
"binary_version": "1:2.2.2+dfsg-1ubuntu1+esm1"
},
{
"binary_name": "zabbix-server-pgsql",
"binary_version": "1:2.2.2+dfsg-1ubuntu1+esm1"
}
],
"availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro"
}