Multiple Vulnerabilities in Zabbix
Multiple vulnerabilities in Zabbix versions 6.0.x before 6.0.45, 7.0.x before 7.0.24, and 7.4.x before 7.4.8 allow for data confidentiality breaches and remote cross-site scripting (XSS) attacks.
Multiple vulnerabilities have been discovered in Zabbix, a popular open-source monitoring solution. These vulnerabilities, detailed in Zabbix security bulletins ZBX-27758, ZBX-27759, and ZBX-27760, can lead to a breach of data confidentiality and enable remote cross-site scripting (XSS) attacks. The affected versions include Zabbix 6.0.x prior to 6.0.45, Zabbix 7.0.x prior to 7.0.24, and Zabbix 7.4.x prior to 7.4.8. Successful exploitation of these vulnerabilities could allow attackers to gain unauthorized access to sensitive information or execute malicious scripts within the context of a user’s browser. This poses a significant risk to organizations relying on Zabbix for their monitoring infrastructure.
Attack Chain
- The attacker identifies a vulnerable Zabbix instance running a version prior to 6.0.45, 7.0.24, or 7.4.8.
- The attacker crafts a malicious HTTP request targeting an endpoint susceptible to XSS.
- The Zabbix server processes the malicious request without proper sanitization.
- The server reflects the malicious payload back to the user’s browser.
- The user’s browser executes the attacker-injected script.
- The injected script steals the user’s session cookies.
- The attacker uses the stolen session cookies to authenticate to the Zabbix web interface.
- The attacker gains unauthorized access to sensitive monitoring data or performs administrative actions.
Impact
Successful exploitation of these vulnerabilities can lead to unauthorized access to sensitive monitoring data, potentially exposing critical infrastructure details, credentials, and network configurations. The XSS vulnerability can also be leveraged to perform actions on behalf of legitimate users, leading to further compromise of the Zabbix system and potentially impacting the wider network. Given the widespread use of Zabbix in IT infrastructure monitoring, a successful attack could have significant repercussions for affected organizations.
Recommendation
- Immediately upgrade Zabbix instances to versions 6.0.45, 7.0.24, 7.4.8 or later to patch the vulnerabilities described in Zabbix security bulletins ZBX-27758, ZBX-27759, and ZBX-27760.
- Deploy the Sigma rule “Detect Suspicious Zabbix HTTP URI” to identify potential exploitation attempts targeting vulnerable Zabbix instances.
- Monitor web server logs for unusual activity and patterns indicative of XSS attacks.
Detection coverage 2
Detect Suspicious Zabbix HTTP URI
mediumDetects potential exploitation attempts by looking for suspicious patterns in Zabbix HTTP URIs.
Detect Suspicious Zabbix HTTP POST Request
mediumDetects potential exploitation attempts by looking for suspicious patterns in Zabbix HTTP POST requests.
Detection queries are kept inside the platform. Get full rules →