[ZBX-7638] Security Issues with Zabbix 2.0.9 Created: 2014 Jan 10 Updated: 2020 Jul 16 Resolved: 2014 Jan 13 |
|
Status: | Closed |
Project: | ZABBIX BUGS AND ISSUES |
Component/s: | None |
Affects Version/s: | 2.0.9 |
Fix Version/s: | None |
Type: | Defect (Security) | Priority: | Major |
Reporter: | Abhishek Singh | Assignee: | Unassigned |
Resolution: | Won't fix | Votes: | 0 |
Labels: | security | ||
Remaining Estimate: | Not Specified | ||
Time Spent: | Not Specified | ||
Original Estimate: | Not Specified | ||
Environment: |
We run zabbix agents on our blades and a central Zabbix server in HA. These are all Centos 6.4 systems. |
Description |
We need to be be compliant towards several security guidelines from our customers and one step towards that is to run Nessus scan and get rid of as many findings as we can. When we run Nessus on our nodes running Zabbix, there are two High/Major warnings which seem code related and hence should be considered as bugs. If there is a way to work around these through setup configuration, we could surely look at that as well. There was 39469 - CGI Generic Remote File Inclusion + The following resources may be vulnerable to web code injection : + The 'sid' parameter of the /zabbix/profile.php CGI : /zabbix/profile.php [messages[sounds.4]=no_sound.wav&autologin=1&lang=uk -------- output -------- 43160 (1) - CGI Generic SQL Injection (blind, time based) Using the GET HTTP method, Nessus found that : + The following resources may be vulnerable to blind SQL injection (time based) : + The 'showGuiMessaging' parameter of the /zabbix/jsLoader.php CGI : /zabbix/jsLoader.php?ver=2.0.9&lang=en_gb&showGuiMessaging=0'));WAITFOR% -------- output --------
|
Comments |
Comment by Pavels Jelisejevs (Inactive) [ 2014 Jan 13 ] |
Abhishek, I've reviewed both cases in the latest 2.0, and none of them are working. In the first case, the "sid" parameter is not used for file inclusion and the application will stop if it contains an incorrect value. In the second case, the "showGuiMessaging" parameter is not saved in the DB, and cannot be used for SQL injections. CLOSED. |
Comment by Abhishek Singh [ 2014 Jan 13 ] |
Thanks Pavels! |
Comment by richlv [ 2014 Jan 15 ] |
similar : |