CVE-2017-2824
HIGHZabbix - OS Command Injection
Title source: ruleDescription
An exploitable code execution vulnerability exists in the trapper command functionality of Zabbix Server 2.4.X. A specially crafted set of packets can cause a command injection resulting in remote code execution. An attacker can make requests from an active Zabbix Proxy to trigger this vulnerability.
Exploits (1)
nomisec
WORKING POC
6 stars
by listenquiet · poc
https://github.com/listenquiet/cve-2017-2824-reverse-shell
Scores
CVSS v3
8.1
EPSS
0.7355
EPSS Percentile
98.8%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-78
Status
published
Products (11)
zabbix/zabbix
2.4.0 (4 CPE variants)
zabbix/zabbix
2.4.1 (3 CPE variants)
zabbix/zabbix
2.4.2 (2 CPE variants)
zabbix/zabbix
2.4.3 (2 CPE variants)
zabbix/zabbix
2.4.4 (2 CPE variants)
zabbix/zabbix
2.4.5 (2 CPE variants)
zabbix/zabbix
2.4.6 (2 CPE variants)
zabbix/zabbix
2.4.7 (2 CPE variants)
zabbix/zabbix
2.4.8 (2 CPE variants)
zabbix/zabbix
2.4.9 (2 CPE variants)
... and 1 more
Published
May 24, 2017
Tracked Since
Feb 18, 2026