-
Problem report
-
Resolution: Fixed
-
Critical
-
2.2.20, 2.2.21, 3.0.15, 3.4.7
-
None
-
All
-
Sprint 31, Sprint 32
-
0.5
The problem happen in the item "web.page.get[]", which used to "get content of the http web page".
The function handles this item is "get_http_page()" in /libs/zbxsysinfo/common/http.c.
When building the request for http connection, no secure check was made for the parameter in line 41: (see image below).
Attacker can add CRLF character to the "path" parameter and freely control the request! (see image below![]()
It can be abused, and used to make tcp request to any local port of the server using zabbix agentd.
For example: Some server using redis, memcached, ... attacker can connect to this port and control it to write file, code execution ...
I don't know this is intent or not but I think it should not be there!
- causes
-
ZBX-15971 Items using: "web.page.*" switch to unsupported when checked service is unavailable
-
- Closed
-