mirror of
https://github.com/0xMarcio/cve.git
synced 2025-12-30 04:49:42 +00:00
1.3 KiB
1.3 KiB
CVE-2017-2824
Description
An exploitable code execution vulnerability exists in the trapper command functionality of Zabbix Server 2.4.X. A specially crafted set of packets can cause a command injection resulting in remote code execution. An attacker can make requests from an active Zabbix Proxy to trigger this vulnerability.
POC
Reference
- https://talosintelligence.com/vulnerability_reports/TALOS-2017-0325
- https://talosintelligence.com/vulnerability_reports/TALOS-2017-0325
Github
- https://github.com/ARPSyndicate/cvemon
- https://github.com/LinkleYping/Vulnerability-implementation
- https://github.com/Threekiii/Awesome-Exploit
- https://github.com/Threekiii/Awesome-POC
- https://github.com/Threekiii/Vulhub-Reproduce
- https://github.com/ZTK-009/RedTeamer
- https://github.com/bakery312/Vulhub-Reproduce
- https://github.com/fengjixuchui/RedTeamer
- https://github.com/listenquiet/cve-2017-2824-reverse-shell
- https://github.com/password520/RedTeamer