Zabbix Server Arbitrary Command Execution

newsbot

newsbot

RSS Feed
This Metasploit module abuses the "Command" trap in Zabbix Server to execute arbitrary commands without authentication. By default the Node ID "0" is used, if it doesn't work, the Node ID is leaked from the error message and exploitation retried. According to the vendor versions prior to 1.6.9 are vulnerable. The vulnerability has been successfully tested on Zabbix Server 1.6.7 on Ubuntu 10.04.

Weiterlesen...
 

Ähnliche Themen

Webmin /file/show.cgi Remote Command Execution

Splunk 5.0 Custom App Remote Code Execution

XODA 0.4.5 Arbitrary PHP File Upload

EGallery PHP File Upload Vulnerability

PHP IRC Bot pbot eval() Remote Code Execution

Zurück
Oben