8.1
HIGH
CVE-2017-2824
Zabbix Server Remote Code Execution Vulnerability
Description

An exploitable code execution vulnerability exists in the trapper command functionality of Zabbix Server 2.4.X. A specially crafted set of packets can cause a command injection resulting in remote code execution. An attacker can make requests from an active Zabbix Proxy to trigger this vulnerability.

INFO

Published Date :

May 24, 2017, 2:29 p.m.

Last Modified :

Oct. 3, 2019, 12:03 a.m.

Remotely Exploitable :

Yes !

Impact Score :

5.9

Exploitability Score :

2.2
Public PoC/Exploit Available at Github

CVE-2017-2824 has a 10 public PoC/Exploit available at Github. Go to the Public Exploits tab to see the list.

Affected Products

The following products are affected by CVE-2017-2824 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Zabbix zabbix
References to Advisories, Solutions, and Tools

Here, you will find a curated list of external links that provide in-depth information, practical solutions, and valuable tools related to CVE-2017-2824.

URL Resource
http://www.debian.org/security/2017/dsa-3937
http://www.securityfocus.com/bid/98083 Third Party Advisory VDB Entry
https://talosintelligence.com/vulnerability_reports/TALOS-2017-0325 Exploit Mitigation Third Party Advisory VDB Entry

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

None

Updated: 4 days, 19 hours ago
0 stars 2 fork 2 watcher
Born at : Nov. 17, 2024, 11:53 a.m. This repo has been linked 414 different CVEs too.

None

Updated: 9 months, 3 weeks ago
0 stars 0 fork 0 watcher
Born at : Jan. 26, 2024, 10:07 a.m. This repo has been linked 161 different CVEs too.

一个漏洞利用工具仓库

Python PHP Java C Makefile C++ Dockerfile Shell Perl RPC

Updated: 2 years, 6 months ago
0 stars 72 fork 72 watcher
Born at : April 22, 2022, 10:21 a.m. This repo has been linked 48 different CVEs too.

一个漏洞利用工具仓库

exploit vulnerability proof-of-concept rce

Python PHP Java C Makefile C++ Dockerfile Shell Perl RPC

Updated: 2 months, 3 weeks ago
321 stars 72 fork 72 watcher
Born at : April 22, 2022, 2:08 a.m. This repo has been linked 48 different CVEs too.

一个Vulhub漏洞复现知识库

vulnerability exploit

Updated: 2 months, 2 weeks ago
448 stars 87 fork 87 watcher
Born at : March 3, 2022, 8:38 a.m. This repo has been linked 171 different CVEs too.

一个漏洞POC知识库 目前数量 1000+

poc

Updated: 2 months, 2 weeks ago
3417 stars 682 fork 682 watcher
Born at : Feb. 20, 2022, 6:43 a.m. This repo has been linked 405 different CVEs too.

None

Python

Updated: 3 months ago
6 stars 0 fork 0 watcher
Born at : Nov. 30, 2021, 9:42 a.m. This repo has been linked 1 different CVEs too.

None

Updated: 2 years, 7 months ago
2 stars 1 fork 1 watcher
Born at : April 30, 2021, 8:46 a.m. This repo has been linked 49 different CVEs too.

红方人员作战执行手册

Updated: 3 months, 1 week ago
352 stars 343 fork 343 watcher
Born at : Feb. 18, 2020, 4:38 a.m. This repo has been linked 49 different CVEs too.

nagios,zabbix,solr等平台一些漏洞的实现

Python Ruby

Updated: 3 years, 10 months ago
4 stars 1 fork 1 watcher
Born at : July 16, 2018, 6:43 a.m. This repo has been linked 3 different CVEs too.

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2017-2824 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2017-2824 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • CVE Modified by [email protected]

    May. 14, 2024

    Action Type Old Value New Value
  • CWE Remap by [email protected]

    Oct. 03, 2019

    Action Type Old Value New Value
    Changed CWE CWE-77 CWE-78
  • CVE Modified by [email protected]

    Nov. 06, 2017

    Action Type Old Value New Value
    Added Reference http://www.debian.org/security/2017/dsa-3937 [No Types Assigned]
  • Initial Analysis by [email protected]

    Jun. 07, 2017

    Action Type Old Value New Value
    Added CVSS V2 (AV:N/AC:M/Au:N/C:P/I:P/A:P)
    Added CVSS V3 AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
    Changed Reference Type https://talosintelligence.com/vulnerability_reports/TALOS-2017-0325 No Types Assigned https://talosintelligence.com/vulnerability_reports/TALOS-2017-0325 Exploit, Mitigation, Third Party Advisory, VDB Entry
    Changed Reference Type http://www.securityfocus.com/bid/98083 No Types Assigned http://www.securityfocus.com/bid/98083 Third Party Advisory, VDB Entry
    Added CWE CWE-77
    Added CPE Configuration OR *cpe:2.3:a:zabbix:zabbix:2.4.0:*:*:*:*:*:*:* *cpe:2.3:a:zabbix:zabbix:2.4.0:rc1:*:*:*:*:*:* *cpe:2.3:a:zabbix:zabbix:2.4.0:rc2:*:*:*:*:*:* *cpe:2.3:a:zabbix:zabbix:2.4.0:rc3:*:*:*:*:*:* *cpe:2.3:a:zabbix:zabbix:2.4.1:*:*:*:*:*:*:* *cpe:2.3:a:zabbix:zabbix:2.4.1:rc1:*:*:*:*:*:* *cpe:2.3:a:zabbix:zabbix:2.4.1:rc2:*:*:*:*:*:* *cpe:2.3:a:zabbix:zabbix:2.4.2:*:*:*:*:*:*:* *cpe:2.3:a:zabbix:zabbix:2.4.2:rc1:*:*:*:*:*:* *cpe:2.3:a:zabbix:zabbix:2.4.3:*:*:*:*:*:*:* *cpe:2.3:a:zabbix:zabbix:2.4.3:rc1:*:*:*:*:*:* *cpe:2.3:a:zabbix:zabbix:2.4.4:*:*:*:*:*:*:* *cpe:2.3:a:zabbix:zabbix:2.4.4:rc1:*:*:*:*:*:* *cpe:2.3:a:zabbix:zabbix:2.4.5:*:*:*:*:*:*:* *cpe:2.3:a:zabbix:zabbix:2.4.5:rc1:*:*:*:*:*:* *cpe:2.3:a:zabbix:zabbix:2.4.6:*:*:*:*:*:*:* *cpe:2.3:a:zabbix:zabbix:2.4.6:rc1:*:*:*:*:*:* *cpe:2.3:a:zabbix:zabbix:2.4.7:*:*:*:*:*:*:* *cpe:2.3:a:zabbix:zabbix:2.4.7:rc1:*:*:*:*:*:* *cpe:2.3:a:zabbix:zabbix:2.4.8:*:*:*:*:*:*:* *cpe:2.3:a:zabbix:zabbix:2.4.8:rc1:*:*:*:*:*:* *cpe:2.3:a:zabbix:zabbix:2.4.9:*:*:*:*:*:*:* *cpe:2.3:a:zabbix:zabbix:2.4.9:rc1:*:*:*:*:*:*
  • CVE Modified by [email protected]

    May. 26, 2017

    Action Type Old Value New Value
    Added Reference http://www.securityfocus.com/bid/98083 [No Types Assigned]
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2017-2824 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

Exploit Prediction

EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days.

65.45 }} -1.31%

score

0.97991

percentile

CVSS30 - Vulnerability Scoring System
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability