Zabbix Server 'active checks' Command Injection

high Nessus Plugin ID 105042

Synopsis

A network monitoring application running on the remote host is affected by a remote command injection vulnerability.

Description

The Zabbix server running on the remote host is affected by a remote command injection vulnerability due to the failure to sanitize the input data involving an IP address that would go into the 'ip' field of the 'interface' table in the 'zabbix' database. An unauthenticated, remote attacker can exploit this, via specially crafted packets, to execute OS commands.

Note that Zabbix server is reportedly affected by additional vulnerabilities; however, this plugin has not tested for these

Solution

Upgrade to Zabbix version 3.4.0 / 3.2.7 / 3.0.10 / 2.2.19 or later.

See Also

https://support.zabbix.com/browse/ZBX-12075

https://www.zabbix.com/rn/rn3.2.7

https://www.zabbix.com/rn/rn3.0.10

https://www.zabbix.com/rn/rn2.2.19

Plugin Details

Severity: High

ID: 105042

File Name: zabbix_server_cve-2017-2824.nasl

Version: 1.6

Type: remote

Family: Misc.

Published: 12/6/2017

Updated: 4/11/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS v3

Risk Factor: High

Base Score: 8.1

Temporal Score: 7.1

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:zabbix:zabbix

Exploit Ease: No known exploits are available

Patch Publication Date: 7/18/2017

Vulnerability Publication Date: 7/18/2017

Reference Information

CVE: CVE-2017-2824

BID: 98083