An information disclosure vulnerability exists in the iConfig proxy request of Zabbix server 2.4.X. A specially crafted iConfig proxy request can cause the Zabbix server to send the configuration information of any Zabbix proxy, resulting in information disclosure. An attacker can make requests from an active Zabbix proxy to trigger this vulnerability.
References
Link | Resource |
---|---|
https://lists.debian.org/debian-lts-announce/2019/03/msg00010.html | Mailing List Third Party Advisory |
https://talosintelligence.com/vulnerability_reports/TALOS-2017-0327 | Exploit Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2019/03/msg00010.html | Mailing List Third Party Advisory |
https://talosintelligence.com/vulnerability_reports/TALOS-2017-0327 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
21 Nov 2024, 03:24
Type | Values Removed | Values Added |
---|---|---|
References | () https://lists.debian.org/debian-lts-announce/2019/03/msg00010.html - Mailing List, Third Party Advisory | |
References | () https://talosintelligence.com/vulnerability_reports/TALOS-2017-0327 - Exploit, Third Party Advisory |
Information
Published : 2018-04-09 20:29
Updated : 2024-11-21 03:24
NVD link : CVE-2017-2826
Mitre link : CVE-2017-2826
CVE.ORG link : CVE-2017-2826
JSON object : View
Products Affected
debian
- debian_linux
zabbix
- zabbix
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor