9.9

CVE-2024-22116

An administrator with restricted permissions can exploit the script execution functionality within the Monitoring Hosts section. The lack of default escaping for script parameters enabled this user ability to execute arbitrary code via the Ping script, thereby compromising infrastructure.

Data is provided by the National Vulnerability Database (NVD)
ZabbixZabbix Version >= 6.4.9 <= 6.4.15
ZabbixZabbix Version7.0.0 Updatealpha1
ZabbixZabbix Version7.0.0 Updatealpha2
ZabbixZabbix Version7.0.0 Updatealpha3
ZabbixZabbix Version7.0.0 Updatealpha4
ZabbixZabbix Version7.0.0 Updatealpha5
ZabbixZabbix Version7.0.0 Updatealpha6
ZabbixZabbix Version7.0.0 Updatealpha7
ZabbixZabbix Version7.0.0 Updatealpha8
ZabbixZabbix Version7.0.0 Updatealpha9
ZabbixZabbix Version7.0.0 Updatebeta1
ZabbixZabbix Version7.0.0 Updatebeta2
ZabbixZabbix Version7.0.0 Updatebeta3
ZabbixZabbix Version7.0.0 Updaterc1
ZabbixZabbix Version7.0.0 Updaterc2
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.23% 0.452
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 7.2 1.2 5.9
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
security@zabbix.com 9.9 3.1 6
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
CWE-94 Improper Control of Generation of Code ('Code Injection')

The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.