Zabbix node_process_command() Function Crafted Request Arbitrary Command Execution

high Nessus Plugin ID 44620

Synopsis

The remote service allows execution of arbitrary commands.

Description

The version of Zabbix server running on the remote host has a command execution vulnerability in the 'process_node_command()' function of 'nodehistory.c'.

A remote attacker could exploit this by sending a specially crafted request, resulting in the execution of operating system commands.

Solution

Upgrade to Zabbix 1.6.8 or later.

See Also

https://support.zabbix.com/browse/ZBX-1030

Plugin Details

Severity: High

ID: 44620

File Name: zabbix_remote_command_execution.nasl

Version: 1.13

Type: remote

Family: Misc.

Published: 2/15/2010

Updated: 6/1/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.2

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS v3

Risk Factor: High

Base Score: 8.8

Temporal Score: 8.2

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 12/13/2009

Vulnerability Publication Date: 9/15/2009

Exploitable With

Metasploit (Zabbix Server Arbitrary Command Execution)

ExploitHub (EH-12-725)

Reference Information

CVE: CVE-2009-4498

BID: 37989

CWE: 78

Secunia: 37740