mirror of
https://github.com/0xMarcio/cve.git
synced 2026-05-09 15:15:46 +02:00
27 lines
1.2 KiB
Markdown
27 lines
1.2 KiB
Markdown
### [CVE-2017-2824](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-2824)
|
|

|
|

|
|

|
|
|
|
### Description
|
|
|
|
An exploitable code execution vulnerability exists in the trapper command functionality of Zabbix Server 2.4.X. A specially crafted set of packets can cause a command injection resulting in remote code execution. An attacker can make requests from an active Zabbix Proxy to trigger this vulnerability.
|
|
|
|
### POC
|
|
|
|
#### Reference
|
|
- https://talosintelligence.com/vulnerability_reports/TALOS-2017-0325
|
|
|
|
#### Github
|
|
- https://github.com/ARPSyndicate/cvemon
|
|
- https://github.com/LinkleYping/Vulnerability-implementation
|
|
- https://github.com/Threekiii/Awesome-Exploit
|
|
- https://github.com/Threekiii/Awesome-POC
|
|
- https://github.com/Threekiii/Vulhub-Reproduce
|
|
- https://github.com/ZTK-009/RedTeamer
|
|
- https://github.com/bakery312/Vulhub-Reproduce
|
|
- https://github.com/fengjixuchui/RedTeamer
|
|
- https://github.com/listenquiet/cve-2017-2824-reverse-shell
|
|
- https://github.com/password520/RedTeamer
|
|
|