Short Name |
APP:MISC:ZABBIX-AGENT-RCE |
---|---|
Severity |
Major |
Recommended |
No |
Recommended Action |
Drop |
Category |
APP |
Keywords |
Zabbix Agent NET_TCP_LISTEN Function Remote Code Execution |
Release Date |
2011/11/21 |
Update Number |
2033 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+ |
This signature detects attempts to exploit a known vulnerability against shell metacharacters in Zabbix Agent. It is due to insufficient validation of user-supplied input. Malicious users can execute arbitrary shell commands at the same privilege level as server.
ZABBIX is prone to a security-bypass vulnerability because it fails to properly sanitize user-supplied input. An attacker can exploit this issue to bypass certain security restrictions and execute arbitrary commands within the context of the affected application. Versions prior to ZABBIX 1.6.7 are vulnerable. NOTE: This issue affects ZABBIX installed on Solaris and FreeBSD only.