Rapid7 Vulnerability & Exploit Database

Zabbix Authenticated Remote Command Execution

Back to Search

Zabbix Authenticated Remote Command Execution

Disclosed
10/30/2013
Created
05/30/2018

Description

ZABBIX allows an administrator to create scripts that will be run on hosts. An authenticated attacker can create a script containing a payload, then a host with an IP of 127.0.0.1 and run the arbitrary script on the ZABBIX host. This module was tested against Zabbix v2.0.9, v2.0.5, v3.0.1, v4.0.18, v5.0.17, v6.0.0.

Author(s)

  • Brandon Perry <bperry.volatile@gmail.com>
  • lap1nou <lapinousexy@gmail.com>

Platform

Linux,Unix

Architectures

cmd, x86, x64

Development

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

msf > use exploit/multi/http/zabbix_script_exec
msf exploit(zabbix_script_exec) > show targets
    ...targets...
msf exploit(zabbix_script_exec) > set TARGET < target-id >
msf exploit(zabbix_script_exec) > show options
    ...show and set options...
msf exploit(zabbix_script_exec) > exploit

Time is precious, so I don’t want to do something manually that I can automate. Leveraging the Metasploit Framework when automating any task keeps us from having to re-create the wheel as we can use the existing libraries and focus our efforts where it matters.

– Jim O’Gorman | President, Offensive Security

;