Uploaded image for project: 'ZABBIX BUGS AND ISSUES'
  1. ZABBIX BUGS AND ISSUES
  2. ZBX-23858

Code injection in zabbix_agent2 smartctl plugin (CVE-2023-32728)

XMLWordPrintable

    • Icon: Defect (Security) Defect (Security)
    • Resolution: Fixed
    • Icon: Minor Minor
    • None
    • None
    • Agent2 plugin (N)
    • None

      Mitre ID CVE-2023-32728
      CVSS score 4.6
      CVSS vector https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L
      Severity Medium
      Summary Code injection in Zabbix Agent 2 smart.disk.get caused by smartctl plugin
      Description The Zabbix Agent 2 item key smart.disk.get does not sanitize its parameters before passing them to a shell command resulting possible vulnerability for remote code execution.
      Common Weakness Enumeration (CWE) CWE-20 Improper Input Validation
      Common Attack Pattern Enumeration and Classification (CAPEC) CAPEC-253 Remote Code Inclusion
      Known attack vectors An attacker can execute arbitrary code on any device having an Zabbix Agent2 listening and having smartctl installed.
      Patch provided  No
      Component/s Agent 2
      Affected version/s and fix version/s 5.0.0 - 5.0.38 / 5.0.39rc1
      6.0.0 - 6.0.23 / 6.0.24rc1
      6.4.0 - 6.4.8 / 6.4.9rc1
      7.0.0alpha1 - 7.0.0alpha7 / 7.0.0alpha8
      Fix compatibility tests -
      Resolution Fixed
      Workarounds -
      Acknowledgements This vulnerability is reported in HackerOne bounty hunter platform by Philippe Antoine (catenacyber)

            zabbix.support Zabbix Support Team
            mmelnikovs Maris Melnikovs
            Votes:
            0 Vote for this issue
            Watchers:
            6 Start watching this issue

              Created:
              Updated:
              Resolved: