CVE-2024-42332Improper Encoding or Escaping of Output in Zabbix

Severity
3.7LOWNVD
EPSS
0.4%
top 37.73%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedNov 27

Description

The researcher is showing that due to the way the SNMP trap log is parsed, an attacker can craft an SNMP trap with additional lines of information and have forged data show in the Zabbix UI. This attack requires SNMP auth to be off and/or the attacker to know the community/auth details. The attack requires an SNMP item to be configured as text on the target host.

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:NExploitability: 2.2 | Impact: 1.4

Affected Packages3 packages

CVEListV5zabbix/zabbix6.0.06.0.34+2
NVDzabbix/zabbix6.0.06.0.35+2
Debianzabbix/zabbix< 1:5.0.45+dfsg-1+deb11u1+2

🔴Vulnerability Details

3
OSV
CVE-2024-42332: The researcher is showing that due to the way the SNMP trap log is parsed, an attacker can craft an SNMP trap with additional lines of information and2024-11-27
GHSA
GHSA-phjj-9p2g-26h9: The researcher is showing that due to the way the SNMP trap log is parsed, an attacker can craft an SNMP trap with additional lines of information and2024-11-27
CVEList
New line injection in Zabbix SNMP traps2024-11-27

📋Vendor Advisories

1
Debian
CVE-2024-42332: zabbix - The researcher is showing that due to the way the SNMP trap log is parsed, an at...2024