An exploitable code execution vulnerability exists in the trapper command functionality of Zabbix Server 2.4.X. A specially crafted set of packets can cause a command injection resulting in remote code execution. An attacker can make requests from an active Zabbix Proxy to trigger this vulnerability.
- https://talosintelligence.com/vulnerability_reports/TALOS-2017-0325
- https://github.com/ARPSyndicate/cvemon
- https://github.com/LinkleYping/Vulnerability-implementation
- https://github.com/Threekiii/Awesome-Exploit
- https://github.com/Threekiii/Awesome-POC
- https://github.com/Threekiii/Vulhub-Reproduce
- https://github.com/XiaomingX/awesome-poc-for-red-team
- https://github.com/ZTK-009/RedTeamer
- https://github.com/bakery312/Vulhub-Reproduce
- https://github.com/fengjixuchui/RedTeamer
- https://github.com/killvxk/Awesome-Exploit
- https://github.com/listenquiet/cve-2017-2824-reverse-shell
- https://github.com/password520/RedTeamer