An information disclosure vulnerability exists in the iConfig proxy request of Zabbix server 2.4.X. A specially crafted iConfig proxy request can cause the Zabbix server to send the configuration information of any Zabbix proxy, resulting in information disclosure. An attacker can make requests from an active Zabbix proxy to trigger this vulnerability.
                
            References
                    | Link | Resource | 
|---|---|
| https://lists.debian.org/debian-lts-announce/2019/03/msg00010.html | Mailing List Third Party Advisory | 
| https://talosintelligence.com/vulnerability_reports/TALOS-2017-0327 | Exploit Third Party Advisory | 
| https://lists.debian.org/debian-lts-announce/2019/03/msg00010.html | Mailing List Third Party Advisory | 
| https://talosintelligence.com/vulnerability_reports/TALOS-2017-0327 | Exploit Third Party Advisory | 
Configurations
                    Configuration 1 (hide)
| 
 | 
Configuration 2 (hide)
| 
 | 
History
                    21 Nov 2024, 03:24
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://lists.debian.org/debian-lts-announce/2019/03/msg00010.html - Mailing List, Third Party Advisory | |
| References | () https://talosintelligence.com/vulnerability_reports/TALOS-2017-0327 - Exploit, Third Party Advisory | 
Information
                Published : 2018-04-09 20:29
Updated : 2024-11-21 03:24
NVD link : CVE-2017-2826
Mitre link : CVE-2017-2826
CVE.ORG link : CVE-2017-2826
JSON object : View
Products Affected
                zabbix
- zabbix
debian
- debian_linux
CWE
                
                    
                        
                        CWE-200
                        
            Exposure of Sensitive Information to an Unauthorized Actor
