CVE-2024-42332
Vulnerability from cvelistv5
Published
2024-11-27 12:06
Modified
2024-11-27 14:55
Severity ?
EPSS score ?
Summary
New line injection in Zabbix SNMP traps
References
Impacted products
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-42332", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-27T14:54:59.322691Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-27T14:55:10.340Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "modules": [ "Server" ], "product": "Zabbix", "repo": "https://git.zabbix.com/", "vendor": "Zabbix", "versions": [ { "changes": [ { "at": "6.0.35rc1", "status": "unaffected" } ], "lessThan": "6.0.34", "status": "affected", "version": "6.0.0", "versionType": "git" }, { "changes": [ { "at": "6.4.20rc1", "status": "unaffected" } ], "lessThan": "6.4.19", "status": "affected", "version": "6.4.0", "versionType": "git" }, { "changes": [ { "at": "7.0.5rc1", "status": "unaffected" } ], "lessThan": "7.0.4", "status": "affected", "version": "7.0.0", "versionType": "git" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "Zabbix wants to thank chamal for submitting this report on the HackerOne bug bounty platform." } ], "datePublic": "2024-10-30T06:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "The researcher is showing that due to the way the SNMP trap log is parsed, an attacker can craft an SNMP trap with additional lines of information and have forged data show in the Zabbix UI. This attack requires SNMP auth to be off and/or the attacker to know the community/auth details. The attack requires an SNMP item to be configured as text on the target host." } ], "value": "The researcher is showing that due to the way the SNMP trap log is parsed, an attacker can craft an SNMP trap with additional lines of information and have forged data show in the Zabbix UI. This attack requires SNMP auth to be off and/or the attacker to know the community/auth details. The attack requires an SNMP item to be configured as text on the target host." } ], "impacts": [ { "capecId": "CAPEC-93", "descriptions": [ { "lang": "en", "value": "CAPEC-93 Log Injection-Tampering-Forging" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.7, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "description": "CWE 117 Improper Output Neutralization for Logs", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-27T12:06:44.515Z", "orgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8", "shortName": "Zabbix" }, "references": [ { "url": "https://support.zabbix.com/browse/ZBX-25628" } ], "source": { "discovery": "EXTERNAL" }, "title": "New line injection in Zabbix SNMP traps", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "72de3e22-0555-4a0d-ae81-9249e0f0a1e8", "assignerShortName": "Zabbix", "cveId": "CVE-2024-42332", "datePublished": "2024-11-27T12:06:44.515Z", "dateReserved": "2024-07-30T08:27:36.132Z", "dateUpdated": "2024-11-27T14:55:10.340Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2024-42332\",\"sourceIdentifier\":\"security@zabbix.com\",\"published\":\"2024-11-27T12:15:21.240\",\"lastModified\":\"2024-11-27T12:15:21.240\",\"vulnStatus\":\"Received\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The researcher is showing that due to the way the SNMP trap log is parsed, an attacker can craft an SNMP trap with additional lines of information and have forged data show in the Zabbix UI. This attack requires SNMP auth to be off and/or the attacker to know the community/auth details. The attack requires an SNMP item to be configured as text on the target host.\"},{\"lang\":\"es\",\"value\":\"El investigador demuestra que, debido a la forma en que se analiza el registro de trampas SNMP, un atacante puede manipular una trampa SNMP con l\u00edneas de informaci\u00f3n adicionales y hacer que los datos falsificados se muestren en la interfaz de usuario de Zabbix. Este ataque requiere que la autenticaci\u00f3n SNMP est\u00e9 desactivada o que el atacante conozca los detalles de la comunidad o la autenticaci\u00f3n. El ataque requiere que se configure un elemento SNMP como texto en el host de destino.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security@zabbix.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N\",\"baseScore\":3.7,\"baseSeverity\":\"LOW\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.2,\"impactScore\":1.4}]},\"references\":[{\"url\":\"https://support.zabbix.com/browse/ZBX-25628\",\"source\":\"security@zabbix.com\"}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.