[ZBX-25016] Remote code execution within ping script (CVE-2024-22116) Created: 2024 Aug 09  Updated: 2024 Aug 27  Resolved: 2024 Aug 09

Status: Closed
Project: ZABBIX BUGS AND ISSUES
Component/s: Server (S)
Affects Version/s: 6.4.15, 7.0.0rc2
Fix Version/s: 6.4.16rc1, 7.0.0rc3

Type: Defect (Security) Priority: Critical
Reporter: Maris Melnikovs (Inactive) Assignee: Zabbix Support Team
Resolution: Fixed Votes: 0
Labels: None
Remaining Estimate: Not Specified
Time Spent: Not Specified
Original Estimate: Not Specified

Issue Links:
Causes
Duplicate

 Description   
Mitre ID CVE-2024-22116
CVSS score 9.9
CVSS vector https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Severity Critical
Summary Remote code execution within ping script
Description An administrator with restricted permissions can exploit the script execution functionality within the Monitoring Hosts section. The lack of default escaping for script parameters enabled this user ability to execute arbitrary code via the Ping script, thereby compromising infrastructure.
Common Weakness Enumeration (CWE) CWE-94 Improper Control of Generation of Code ('Code Injection')
Common Attack Pattern Enumeration and Classification (CAPEC) CAPEC-253 Remote Code Inclusion
Known attack vectors Compromise of the monitoring environment
Details  
Patch provided  No
Component/s Server
Affected and fixed version/s 6.4.9 - 6.4.15 / 6.4.16rc1
7.0.0alpha1 - 7.0.0rc2 / 7.0.0rc3
Fix compatibility tests -
Resolution Fixed
Workarounds -
Acknowledgements Zabbix wants to thank justonezero and Qusai Alhaddad (qusaialhaddad) who submitted this report in HackerOne bug bounty platform

Generated at Sat May 10 08:43:01 EEST 2025 using Jira 9.12.4#9120004-sha1:625303b708afdb767e17cb2838290c41888e9ff0.