CVE-2024-32493

8.8 HIGH

📋 TL;DR

This SQL injection vulnerability in Znuny allows authenticated agents to execute arbitrary SQL commands through the draft form ID parameter in AJAX requests. It affects Znuny LTS versions 6.5.1 through 6.5.7 and Znuny versions 7.0.1 through 7.0.16. Attackers could potentially read, modify, or delete database content.

💻 Affected Systems

Products:
  • Znuny LTS
  • Znuny
Versions: Znuny LTS 6.5.1-6.5.7, Znuny 7.0.1-7.0.16
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated agent access. All installations within affected version ranges are vulnerable by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise including data exfiltration, privilege escalation, and potential remote code execution via database functions.

🟠

Likely Case

Data theft, manipulation of ticket data, privilege escalation to admin accounts, and potential access to sensitive customer information.

🟢

If Mitigated

Limited impact if proper input validation and parameterized queries are implemented, restricting SQL execution to read-only operations.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated agent credentials. SQL injection via AJAX endpoints is well-understood and easily weaponized.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Znuny LTS 6.5.8, Znuny 7.0.17

Vendor Advisory: https://www.znuny.org/en/advisories/zsa-2024-03

Restart Required: Yes

Instructions:

1. Backup your Znuny installation and database. 2. Download the patched version from znuny.org. 3. Follow the official upgrade guide for your version. 4. Restart the Znuny service. 5. Verify the patch is applied.

🔧 Temporary Workarounds

Input Validation Filter

all

Implement strict input validation for draft form ID parameters to only accept numeric values.

WAF Rule

all

Deploy web application firewall rules to block SQL injection patterns in AJAX requests.

🧯 If You Can't Patch

  • Restrict agent access to only trusted users and implement strict least-privilege principles.
  • Monitor and audit all AJAX requests to the draft form endpoint for suspicious patterns.

🔍 How to Verify

Check if Vulnerable:

Check your Znuny version via Admin interface or by examining the package version. If running affected versions (6.5.1-6.5.7 or 7.0.1-7.0.16), you are vulnerable.

Check Version:

Check Admin → System → About in Znuny web interface or examine package/installation files.

Verify Fix Applied:

Verify version is 6.5.8+ for LTS or 7.0.17+ for Znuny. Test draft form functionality to ensure SQL injection attempts are blocked.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in database logs
  • Multiple failed AJAX requests to draft endpoints
  • Agent accounts accessing unusual database tables

Network Indicators:

  • SQL keywords in AJAX request parameters
  • Unusually long draft ID parameters
  • Multiple rapid AJAX requests from single agent

SIEM Query:

source="znuny_logs" AND (url="*AJAX*" AND param="*draft*" AND (value="*SELECT*" OR value="*UNION*" OR value="*INSERT*" OR value="*DELETE*"))

🔗 References

📤 Share & Export