An administrator with restricted permissions can exploit the script execution functionality within the Monitoring Hosts section. The lack of default escaping for script parameters enabled this user ability to execute arbitrary code via the Ping script, thereby compromising infrastructure.
References
Link | Resource |
---|---|
https://support.zabbix.com/browse/ZBX-25016 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
04 Dec 2024, 15:21
Type | Values Removed | Values Added |
---|---|---|
References | () https://support.zabbix.com/browse/ZBX-25016 - Vendor Advisory | |
First Time |
Zabbix zabbix
Zabbix |
|
CPE | cpe:2.3:a:zabbix:zabbix:7.0.0:beta2:*:*:*:*:*:* cpe:2.3:a:zabbix:zabbix:7.0.0:alpha6:*:*:*:*:*:* cpe:2.3:a:zabbix:zabbix:7.0.0:alpha3:*:*:*:*:*:* cpe:2.3:a:zabbix:zabbix:7.0.0:alpha5:*:*:*:*:*:* cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:* cpe:2.3:a:zabbix:zabbix:7.0.0:alpha1:*:*:*:*:*:* cpe:2.3:a:zabbix:zabbix:7.0.0:alpha9:*:*:*:*:*:* cpe:2.3:a:zabbix:zabbix:7.0.0:beta1:*:*:*:*:*:* cpe:2.3:a:zabbix:zabbix:7.0.0:alpha2:*:*:*:*:*:* cpe:2.3:a:zabbix:zabbix:7.0.0:alpha8:*:*:*:*:*:* cpe:2.3:a:zabbix:zabbix:7.0.0:rc1:*:*:*:*:*:* cpe:2.3:a:zabbix:zabbix:7.0.0:rc2:*:*:*:*:*:* cpe:2.3:a:zabbix:zabbix:7.0.0:alpha4:*:*:*:*:*:* cpe:2.3:a:zabbix:zabbix:7.0.0:alpha7:*:*:*:*:*:* cpe:2.3:a:zabbix:zabbix:7.0.0:beta3:*:*:*:*:*:* |
|
Summary |
|
12 Aug 2024, 13:41
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-08-12 13:38
Updated : 2024-12-04 15:21
NVD link : CVE-2024-22116
Mitre link : CVE-2024-22116
CVE.ORG link : CVE-2024-22116
JSON object : View
Products Affected
zabbix
- zabbix
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')