Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2021-46088

Опубликовано: 27 янв. 2022
Источник: debian
EPSS Низкий

Описание

Zabbix 4.0 LTS, 4.2, 4.4, and 5.0 LTS is vulnerable to Remote Code Execution (RCE). Any user with the "Zabbix Admin" role is able to run custom shell script on the application server in the context of the application user.

Примечания

  • Zabbix security feature, not a vulnerability per se

  • closed upstream as a "feature", then changed in 5.4 to make the attack less likely

  • https://github.com/paalbra/zabbix-zbxsec-7

  • https://www.zabbix.com/documentation/3.0/en/manual/config/notifications/action/operation/remote_command

  • https://www.zabbix.com/documentation/current/en/manual/config/notifications/action/operation/remote_command#access-permissions

EPSS

Процентиль: 86%
0.02966
Низкий

Связанные уязвимости

CVSS3: 7.2
ubuntu
около 4 лет назад

Zabbix 4.0 LTS, 4.2, 4.4, and 5.0 LTS is vulnerable to Remote Code Execution (RCE). Any user with the "Zabbix Admin" role is able to run custom shell script on the application server in the context of the application user.

CVSS3: 7.2
nvd
около 4 лет назад

Zabbix 4.0 LTS, 4.2, 4.4, and 5.0 LTS is vulnerable to Remote Code Execution (RCE). Any user with the "Zabbix Admin" role is able to run custom shell script on the application server in the context of the application user.

github
около 4 лет назад

Zabbix 4.0 LTS, 4.2, 4.4, and 5.0 LTS is vulnerable to Remote Code Execution (RCE). Any user with the "Zabbix Admin" role is able to run custom shell script on the application server in the context of the application user.

CVSS3: 7.2
fstec
около 4 лет назад

Уязвимость универсальной системы мониторинга Zabbix , связанная с ошибками авторизации, позволяющая нарушителю выполнить произвольный код с root-привилегиями

EPSS

Процентиль: 86%
0.02966
Низкий