header-logo
Suggest Exploit
vendor:
Zenoss
by:
Unknown
7.5
CVSS
HIGH
SQL Injection
89
CWE
Product Name: Zenoss
Affected Version From: Zenoss 2.3.3
Affected Version To: Unknown
Patch Exists: NO
Related CWE:
CPE: a:zenoss:zenoss:2.3.3
Metasploit:
Other Scripts:
Platforms Tested:
Unknown

Zenoss SQL Injection Vulnerabilities

Zenoss is prone to multiple SQL-injection vulnerabilities because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. Exploiting these issues could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

Mitigation:

To mitigate these vulnerabilities, it is recommended to sanitize user-supplied input before using it in SQL queries. Additionally, keeping the Zenoss software up to date with the latest patches and versions can help prevent these vulnerabilities.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/37802/info

Zenoss is prone to multiple SQL-injection vulnerabilities because it fails to sufficiently sanitize user-supplied data before using it in an SQL query.

Exploiting these issues could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database.

Zenoss 2.3.3 is affected; other versions may be vulnerable as well. 

http://www.example.com/zport/dmd/Events/getJSONEventsInfo?severity=1&state=1&filter=& offset=0&count=60 into outfile "/tmp/z"