New line injection in Zabbix SNMP traps (CVE-2024-42332)

XMLWordPrintable

      Due to the way the SNMP trap log is parsed, an attacker can craft an SNMP trap with additional lines of information and have forged data show in the Zabbix UI. This attack requires SNMP auth to be off and/or the attacker to know the community/auth details. The attack requires an SNMP item to be configured as text on the target host.

            Assignee:
            Zabbix Support Team
            Reporter:
            Vjaceslavs Bogdanovs
            Votes:
            0 Vote for this issue
            Watchers:
            1 Start watching this issue

              Created:
              Updated:
              Resolved: