Files
CVEs-PoC/2017/CVE-2017-2824.md
T
2024-06-18 02:51:15 +02:00

27 lines
1.2 KiB
Markdown

### [CVE-2017-2824](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2824)
![](https://img.shields.io/static/v1?label=Product&message=Zabbix%20Server&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=remote%20code%20execution&color=brighgreen)
### Description
An exploitable code execution vulnerability exists in the trapper command functionality of Zabbix Server 2.4.X. A specially crafted set of packets can cause a command injection resulting in remote code execution. An attacker can make requests from an active Zabbix Proxy to trigger this vulnerability.
### POC
#### Reference
- https://talosintelligence.com/vulnerability_reports/TALOS-2017-0325
#### Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/LinkleYping/Vulnerability-implementation
- https://github.com/Threekiii/Awesome-Exploit
- https://github.com/Threekiii/Awesome-POC
- https://github.com/Threekiii/Vulhub-Reproduce
- https://github.com/ZTK-009/RedTeamer
- https://github.com/bakery312/Vulhub-Reproduce
- https://github.com/fengjixuchui/RedTeamer
- https://github.com/listenquiet/cve-2017-2824-reverse-shell
- https://github.com/password520/RedTeamer