CVE-2024-22120
CRITICAL EXPLOITED NUCLEIZabbix Server - Command Injection
Title source: llmDescription
Zabbix server can perform command execution for configured scripts. After command is executed, audit entry is added to "Audit Log". Due to "clientip" field is not sanitized, it is possible to injection SQL into "clientip" and exploit time based blind SQL injection.
Exploits (4)
nomisec
WORKING POC
129 stars
by W01fh4cker · remote
https://github.com/W01fh4cker/CVE-2024-22120-RCE
github
WRITEUP
7 stars
by cybersecplayground · poc
https://github.com/cybersecplayground/PoC-and-CVE-Reports/tree/main/2024/CVE-2024-22120.md
nomisec
WORKING POC
3 stars
by g4nkd · remote-auth
https://github.com/g4nkd/CVE-2024-22120-RCE-with-gopher
nomisec
WORKING POC
3 stars
by isPique · remote-auth
https://github.com/isPique/CVE-2024-22120-RCE-with-gopher
Nuclei Templates (1)
Zabbix Server - Time-Based Blind SQL injection
CRITICALby CodeStuffBreakThings
Shodan:
http.title:"zabbix-server" || cpe:"cpe:2.3:a:zabbix:zabbix" || http.favicon.hash:"892542951"
FOFA:
icon_hash=892542951 || app="zabbix-监控系统" && body="saml" || title="zabbix-server"
Scores
CVSS v3
9.1
EPSS
0.9212
EPSS Percentile
99.7%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Details
VulnCheck KEV
2025-03-19
CWE
CWE-20
Status
published
Products (2)
zabbix/zabbix
7.0.0 alpha1 (10 CPE variants)
zabbix/zabbix
6.0.0 - 6.0.28
Published
May 17, 2024
Tracked Since
Feb 18, 2026