cve/2024/CVE-2024-22120.md

67 lines
2.8 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2024-22120](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22120)
![](https://img.shields.io/static/v1?label=Product&message=Zabbix&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-20%20Improper%20Input%20Validation&color=brighgreen)
### Description
Zabbix server can perform command execution for configured scripts. After command is executed, audit entry is added to "Audit Log". Due to "clientip" field is not sanitized, it is possible to injection SQL into "clientip" and exploit time based blind SQL injection.
### POC
#### Reference
- https://support.zabbix.com/browse/ZBX-24505
#### Github
2025-09-29 16:08:36 +00:00
- https://github.com/0day404/HV-2024-POC
2024-06-10 18:01:06 +00:00
- https://github.com/0xMarcio/cve
2025-09-29 16:08:36 +00:00
- https://github.com/12442RF/POC
- https://github.com/AboSteam/POPC
- https://github.com/Akshath-Nagulapally/ReproducingCVEs_Akshath_Nagulapally
- https://github.com/DMW11525708/wiki
2024-05-25 21:48:12 +02:00
- https://github.com/GhostTroops/TOP
2025-09-29 16:08:36 +00:00
- https://github.com/Godde3s/Exploit
- https://github.com/Lern0n/Lernon-POC
- https://github.com/Linxloop/fork_POC
- https://github.com/POC-2025/nuclei
2024-06-07 04:52:01 +00:00
- https://github.com/Threekiii/CVE
2024-05-25 21:48:12 +02:00
- https://github.com/W01fh4cker/CVE-2024-22120-RCE
2025-09-29 16:08:36 +00:00
- https://github.com/WhosGa/MyWiki
- https://github.com/Yuan08o/pocs
2024-05-25 21:48:12 +02:00
- https://github.com/ZonghaoLi777/githubTrending
2025-09-29 16:08:36 +00:00
- https://github.com/a1batr0ssG/VulhubExpand
- https://github.com/admin772/POC
- https://github.com/adminlove520/pocWiki
- https://github.com/adysec/POC
2024-05-25 21:48:12 +02:00
- https://github.com/aneasystone/github-trending
2025-09-29 16:08:36 +00:00
- https://github.com/binana354/nuclei
- https://github.com/byt3n33dl3/thc-Nuclei
- https://github.com/cisp-pte/POC-20241008-sec-fork
- https://github.com/dashmeet2023/Automated-Vulnerability-Checker
- https://github.com/dev-thefirewall/nuclei-test
- https://github.com/eeeeeeeeee-code/POC
2024-06-22 09:37:59 +00:00
- https://github.com/enomothem/PenTestNote
2024-05-25 21:48:12 +02:00
- https://github.com/fireinrain/github-trending
2025-09-29 16:08:36 +00:00
- https://github.com/g4nkd/CVE-2024-22120-RCE-with-gopher
- https://github.com/greenberglinken/2023hvv_1
- https://github.com/iemotion/POC
- https://github.com/isPique/CVE-2024-22120-RCE-with-gopher
2024-05-25 21:48:12 +02:00
- https://github.com/johe123qwe/github-trending
2025-09-29 16:08:36 +00:00
- https://github.com/laoa1573/wy876
- https://github.com/mitigatesh/nuclei
- https://github.com/niphon-sn/Vulnerability-Scanning-Tools
2024-05-25 21:48:12 +02:00
- https://github.com/nomi-sec/PoC-in-GitHub
2025-09-29 16:08:36 +00:00
- https://github.com/oLy0/Vulnerability
- https://github.com/projectdiscovery/nuclei
- https://github.com/runZeroInc/nuclei
2024-05-25 21:48:12 +02:00
- https://github.com/sampsonv/github-trending
2025-09-29 16:08:36 +00:00
- https://github.com/snakesec/nuclei
2024-05-25 21:48:12 +02:00
- https://github.com/tanjiti/sec_profile
2025-09-29 16:08:36 +00:00
- https://github.com/test-org-appsec/nuclei
- https://github.com/testuser4040-coder/nuclei
2024-05-26 16:36:09 +00:00
- https://github.com/wjlin0/poc-doc
2024-05-25 21:48:12 +02:00
- https://github.com/wy876/POC
2024-05-25 23:14:53 +00:00
- https://github.com/wy876/wiki
2024-05-25 21:48:12 +02:00
- https://github.com/zhaoxiaoha/github-trending