Vulnerability Name: | CVE-2013-3738 (CCN-176588) | ||||||||||||
Assigned: | 2013-05-31 | ||||||||||||
Published: | 2013-05-31 | ||||||||||||
Updated: | 2020-02-20 | ||||||||||||
Summary: | A File Inclusion vulnerability exists in Zabbix 2.0.6 due to inadequate sanitization of request strings in CGI scripts, which could let a remote malicious user execute arbitrary code. | ||||||||||||
CVSS v3 Severity: | 9.8 Critical (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) 8.5 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
4.6 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||||||
Vulnerability Type: | CWE-20 | ||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2013-3738 Source: MISC Type: Exploit, Patch, Vendor Advisory http://support.zabbix.com/browse/ZBX-6652 Source: CCN Type: Talos Vulnerability Report TALOS-2017-0325 Zabbix Server Active Proxy Trapper Remote Code Execution Vulnerability Source: CCN Type: Talos Vulnerability Report TALOS-2017-0326 Zabbix Proxy Server SQL Database Write Vulnerability Source: CCN Type: Zabbix Web site Zabbix The Enterprise-Class Open Source Network Monitoring Solution Source: XF Type: UNKNOWN zabbix-cve20133738-file-include(176588) Source: CCN Type: ZBX-6652 CGI Generic Remote File Inclusion & CGI Generic SQL Injection vulnerabilities Source: CCN Type: WhiteSource Vulnerability Database CVE-2013-3738 | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||
Oval Definitions | |||||||||||||
| |||||||||||||
BACK |