Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.106835
Category:Web application abuses
Title:Zabbix Server Active Proxy Trapper RCE Vulnerability (CVE-2017-2824)
Summary:Zabbix is prone to a remote code execution (RCE) vulnerability.
Description:Summary:
Zabbix is prone to a remote code execution (RCE) vulnerability.

Vulnerability Insight:
An exploitable code execution vulnerability exists in the
trapper command functionality of Zabbix Server. A specially crafted set of packets can cause a
command injection resulting in remote code execution. An attacker can make requests from an active
Zabbix Proxy to trigger this vulnerability.

Affected Software/OS:
Zabbix version 2.4.x.

Solution:
By removing the three default script entries inside of the
Zabbix Server's 'Zabbix' database, an attacker would be unable to actually execute code, even if
they can insert hosts with spoofed addresses into the database. This should not affect an
organizations current operations, unless the scripts are actually used.

CVSS Score:
6.8

CVSS Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2017-2824
BugTraq ID: 98083
http://www.securityfocus.com/bid/98083
Debian Security Information: DSA-3937 (Google Search)
http://www.debian.org/security/2017/dsa-3937
https://talosintelligence.com/vulnerability_reports/TALOS-2017-0325
CopyrightCopyright (C) 2017 Greenbone Networks GmbH

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.