8.1
CVSSv3

CVE-2017-2824

Published: 24/05/2017 Updated: 03/10/2019
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
CVSS v3 Base Score: 8.1 | Impact Score: 5.9 | Exploitability Score: 2.2
VMScore: 606
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

An exploitable code execution vulnerability exists in the trapper command functionality of Zabbix Server 2.4.X. A specially crafted set of packets can cause a command injection resulting in remote code execution. An attacker can make requests from an active Zabbix Proxy to trigger this vulnerability.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

zabbix zabbix 2.4.1

zabbix zabbix 2.4.9

zabbix zabbix 2.4.2

zabbix zabbix 2.4.0

zabbix zabbix 2.4.4

zabbix zabbix 2.4.3

zabbix zabbix 2.4.6

zabbix zabbix 2.4.5

zabbix zabbix 2.4.8

zabbix zabbix 2.4.7

Vendor Advisories

Debian Bug report logs - #863584 zabbix: CVE-2017-2824 CVE-2017-2825 Package: src:zabbix; Maintainer for src:zabbix is Dmitry Smirnov <onlyjob@debianorg>; Reported by: Moritz Muehlenhoff <jmm@debianorg> Date: Sun, 28 May 2017 20:45:05 UTC Severity: grave Tags: security Found in version zabbix/1:227+dfsg-2 Fixed ...
Lilith Wyatt discovered two vulnerabilities in the Zabbix network monitoring system which may result in execution of arbitrary code or database writes by malicious proxies For the oldstable distribution (jessie), these problems have been fixed in version 1:227+dfsg-2+deb8u3 For the stable distribution (stretch), these problems have been fixed p ...

Github Repositories

CVE-2017-2824:Zabbix Server trapper命令注入漏洞 背景 网上各种搜索,发现只有poc,这个poc是创建一个success文件,实战中没有实际作用。 但只是简单把touch /tmp/success替换成反弹shell的命令,并不能执行成功,猜想是不是命令执行长度的限制,想到一个曲线救国的方法,把反弹shell的命令分多次

nagios,zabbix,solr等平台一些漏洞的实现

nagios,zabbix,solr等平台一些漏洞的实现 Nagios core(CVE-2016-9565) Apache Solr XXE(CVE-2017-12629) Apache Solr RCE(CVE-2017-12629) Zabbix RCE (CVE-2017-2824) Zabbix 20 SQL Injection 漏洞的搭建、分析与exploit