Name | CVE-2010-1277 |
Description | SQL injection vulnerability in the user.authenticate method in the API in Zabbix 1.8 before 1.8.2 allows remote attackers to execute arbitrary SQL commands via the user parameter in JSON data to api_jsonrpc.php. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Debian Bugs | 577058 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
zabbix (PTS) | bullseye | 1:5.0.8+dfsg-1 | fixed |
| bullseye (security) | 1:5.0.45+dfsg-1+deb11u1 | fixed |
| bookworm | 1:6.0.14+dfsg-1 | fixed |
| sid, trixie | 1:7.0.6+dfsg-1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|
zabbix | source | etch | (not affected) | | | |
zabbix | source | lenny | (not affected) | | | |
zabbix | source | (unstable) | 1:1.8.2-1 | | | 577058 |
Notes
[lenny] - zabbix <not-affected> (vulnerable code not present)
[etch] - zabbix <not-affected> (vulnerable code not present)
This is a bug that was introduced with the Zabbix 1.8 API