Vulnerability Details : CVE-2009-4502
Public exploit exists!
The NET_TCP_LISTEN function in net.c in Zabbix Agent before 1.6.7, when running on FreeBSD or Solaris, allows remote attackers to bypass the EnableRemoteCommands setting and execute arbitrary commands via shell metacharacters in the argument to net.tcp.listen. NOTE: this attack is limited to attacks from trusted IP addresses.
Products affected by CVE-2009-4502
- cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*
- cpe:2.3:a:zabbix:zabbix:1.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:zabbix:zabbix:1.1.3:*:*:*:*:*:*:*
- cpe:2.3:a:zabbix:zabbix:1.1.5:*:*:*:*:*:*:*
- cpe:2.3:a:zabbix:zabbix:1.4.2:*:*:*:*:*:*:*
- cpe:2.3:a:zabbix:zabbix:1.4.3:*:*:*:*:*:*:*
- cpe:2.3:a:zabbix:zabbix:1.1.4:*:*:*:*:*:*:*
- cpe:2.3:a:zabbix:zabbix:1.4.4:*:*:*:*:*:*:*
- cpe:2.3:a:zabbix:zabbix:1.4.6:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2009-4502
63.55%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 98 %
Percentile, the proportion of vulnerabilities that are scored at or less
Metasploit modules for CVE-2009-4502
-
Zabbix Agent net.tcp.listen Command Injection
Disclosure Date: 2009-09-10First seen: 2020-04-26exploit/unix/misc/zabbix_agent_execThis module exploits a metacharacter injection vulnerability in the FreeBSD and Solaris versions of the Zabbix agent. This flaw can only be exploited if the attacker can hijack the IP address of an authorized server (as defined in the configuration file). Au
CVSS scores for CVE-2009-4502
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.3
|
HIGH | AV:N/AC:M/Au:N/C:C/I:C/A:C |
8.6
|
10.0
|
NIST |
CWE ids for CVE-2009-4502
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2009-4502
-
http://secunia.com/advisories/37740
About Secunia Research | FlexeraVendor Advisory
-
https://support.zabbix.com/browse/ZBX-1032
[ZBX-1032] Bypassing EnableRemoteCommands=0 in Zabbix Client. - ZABBIX SUPPORTExploit
-
http://www.securityfocus.com/archive/1/508439
-
http://www.vupen.com/english/advisories/2009/3514
Site en constructionVendor Advisory
Jump to