Language:
http://www.nessus.org/u?1161f5f6
https://www.securityfocus.com/archive/1/528982/30/0/threaded
Severity: Medium
ID: 70497
File Name: zabbix_frontend_1_8_18rc1.nasl
Version: 1.13
Type: remote
Family: CGI abuses
Published: 10/18/2013
Updated: 6/5/2024
Configuration: Enable paranoid mode, Enable thorough checks
Supported Sensors: Nessus
Enable CGI Scanning: true
Risk Factor: High
Score: 7.4
Risk Factor: Medium
Base Score: 6.8
Temporal Score: 5.9
Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P
CPE: cpe:/a:zabbix:zabbix
Required KB Items: Settings/ParanoidReport, www/zabbix
Excluded KB Items: Settings/disable_cgi_scanning
Exploit Available: true
Exploit Ease: No exploit is required
Patch Publication Date: 10/2/2013
Vulnerability Publication Date: 10/2/2013
Metasploit (Zabbix 2.0.8 SQL Injection and Remote Code Execution)
Elliot (Zabbix httpmon.php SQL Injection)
CVE: CVE-2013-5743
BID: 62794