-
Type:
Defect (Security)
-
Resolution: Fixed
-
Priority:
Major
-
None
-
Affects Version/s: None
-
Component/s: Agent2 (G), Agent2 plugin (G)
-
None
| CVE ID | CVE-2026-23924 |
| CVSS score | 6.1 (Medium) |
| CVSS vector | CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N |
| Affected components | Agent2 |
| Summary | Agent 2 Docker plugin arbitrary file read via Docker API injection |
| Description | Zabbix Agent 2 Docker plugin does not properly sanitize the 'docker.container_info' parameters when forwarding them to the Docker daemon. An attacker capable of invoking Agent 2 can read arbitrary files from running Docker containers by injecting them via the Docker archive API. |
| Known attack vectors | An attacker could query Agent 2 with malicious arguments in the 'docker.container_info' key. |
| Affected and fix version/s | Affected: 6.0.0 - 6.0.43 → Fixed: 6.0.44 Affected: 7.0.0 - 7.0.22 → Fixed: 7.0.23 Affected: 7.4.0 - 7.4.6 → Fixed: 7.4.7 |
| Mitigation | Update the affected components to their respective fixed versions. |
| Workarounds | - |
| Acknowledgements | Zabbix wants to thank kelsier from clocktwice.com for submitting this report on the HackerOne bug bounty platform. |