CVE-2017-2824

HIGH

Zabbix - OS Command Injection

Title source: rule

Description

An exploitable code execution vulnerability exists in the trapper command functionality of Zabbix Server 2.4.X. A specially crafted set of packets can cause a command injection resulting in remote code execution. An attacker can make requests from an active Zabbix Proxy to trigger this vulnerability.

Exploits (1)

nomisec WORKING POC 6 stars
by listenquiet · poc
https://github.com/listenquiet/cve-2017-2824-reverse-shell

Scores

CVSS v3 8.1
EPSS 0.7355
EPSS Percentile 98.8%
Attack Vector NETWORK
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-78
Status published
Products (11)
zabbix/zabbix 2.4.0 (4 CPE variants)
zabbix/zabbix 2.4.1 (3 CPE variants)
zabbix/zabbix 2.4.2 (2 CPE variants)
zabbix/zabbix 2.4.3 (2 CPE variants)
zabbix/zabbix 2.4.4 (2 CPE variants)
zabbix/zabbix 2.4.5 (2 CPE variants)
zabbix/zabbix 2.4.6 (2 CPE variants)
zabbix/zabbix 2.4.7 (2 CPE variants)
zabbix/zabbix 2.4.8 (2 CPE variants)
zabbix/zabbix 2.4.9 (2 CPE variants)
... and 1 more
Published May 24, 2017
Tracked Since Feb 18, 2026