SQL injection vulnerability in the user.authenticate method in the API in Zabbix 1.8 before 1.8.2 allows remote attackers to execute arbitrary SQL commands via the user parameter in JSON data to api_jsonrpc.php.
                
            References
                    Configurations
                    Configuration 1 (hide)
| 
 | 
History
                    21 Nov 2024, 01:14
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://archives.neohapsis.com/archives/fulldisclosure/2010-04/0001.html - Exploit | |
| References | () http://legalhackers.com/advisories/zabbix181api-sql.txt - Exploit | |
| References | () http://legalhackers.com/poc/zabbix181api.pl-poc - Exploit | |
| References | () http://secunia.com/advisories/39119 - Vendor Advisory | |
| References | () http://www.osvdb.org/63456 - | |
| References | () http://www.securityfocus.com/archive/1/510480/100/0/threaded - | |
| References | () http://www.securityfocus.com/bid/39148 - Exploit | |
| References | () http://www.vupen.com/english/advisories/2010/0799 - Vendor Advisory | |
| References | () http://www.zabbix.com/rn1.8.2.php - Patch | 
Information
                Published : 2010-04-06 16:30
Updated : 2025-04-11 00:51
NVD link : CVE-2010-1277
Mitre link : CVE-2010-1277
CVE.ORG link : CVE-2010-1277
JSON object : View
Products Affected
                zabbix
- zabbix
CWE
                
                    
                        
                        CWE-89
                        
            Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
