Zabbix, a popular open-source monitoring tool used for tracking IT infrastructure such as networks, servers, and cloud services, has released critical security updates to address a severe vulnerability. This flaw, identified as CVE-2024-42330, has been given a high CVSS score of 9.1 due to its potential to allow attackers to execute arbitrary code on vulnerable systems. The affected versions include Zabbix 6.0, 6.4, and 7.0. The vulnerability originates from improper encoding of HTTP headers within the Http Request object, making it possible for attackers to send specially crafted requests that could result in remote code execution. Specifically, the issue arises from a failure to correctly encode strings returned to JavaScript, enabling attackers to manipulate internal strings and access hidden object properties. Discovered by the researcher “zhutyra” through the HackerOne bug bounty platform, the vulnerability was responsibly disclosed to the Zabbix development team. In response, Zabbix has released patched versions 6.0.34rc1, 6.4.19rc1, and 7.0.4rc1 to resolve the issue. Users running affected versions are strongly urged to update their systems immediately to protect against potential exploits. While open-source tools like Zabbix are trusted by many organizations, vulnerabilities remain a concern that cybercriminals can exploit. Organizations can significantly mitigate these risks by applying updates promptly and following established security best practices.
A group of automated vulnerability discovery agents, led by security researcher Asim Viladi Oglu Manizada, has identified two severe flaws in the Common UNIX Printing System (CUPS)...
Cybersecurity researchers have uncovered critical vulnerabilities in the Windmill developer platform and its integration with Nextcloud Flow, allowing attackers to gain full system...