CVE-2016-4338
Summary
| CVE | CVE-2016-4338 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2017-01-23 21:59:00 UTC |
| Updated | 2018-10-09 20:00:00 UTC |
| Description | The mysql user parameter configuration script (userparameter_mysql.conf) in the agent in Zabbix before 2.0.18, 2.2.x before 2.2.13, and 3.0.x before 3.0.3, when used with a shell other than bash, allows context-dependent attackers to execute arbitrary code or SQL commands via the mysql.size parameter. |
Risk And Classification
Problem Types: CWE-89
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Zabbix | Zabbix | 2.0.0 | All | All | All |
| Application | Zabbix | Zabbix | 2.0.1 | All | All | All |
| Application | Zabbix | Zabbix | 2.0.10 | All | All | All |
| Application | Zabbix | Zabbix | 2.0.11 | All | All | All |
| Application | Zabbix | Zabbix | 2.0.12 | All | All | All |
| Application | Zabbix | Zabbix | 2.0.13 | All | All | All |
| Application | Zabbix | Zabbix | 2.0.14 | All | All | All |
| Application | Zabbix | Zabbix | 2.0.15 | All | All | All |
| Application | Zabbix | Zabbix | 2.0.16 | All | All | All |
| Application | Zabbix | Zabbix | 2.0.17 | All | All | All |
| Application | Zabbix | Zabbix | 2.0.2 | All | All | All |
| Application | Zabbix | Zabbix | 2.0.3 | All | All | All |
| Application | Zabbix | Zabbix | 2.0.4 | All | All | All |
| Application | Zabbix | Zabbix | 2.0.5 | All | All | All |
| Application | Zabbix | Zabbix | 2.0.6 | All | All | All |
| Application | Zabbix | Zabbix | 2.0.7 | All | All | All |
| Application | Zabbix | Zabbix | 2.0.8 | All | All | All |
| Application | Zabbix | Zabbix | 2.0.9 | All | All | All |
| Application | Zabbix | Zabbix | 2.2.0 | - | All | All |
| Application | Zabbix | Zabbix | 2.2.1 | - | All | All |
| Application | Zabbix | Zabbix | 2.2.10 | All | All | All |
| Application | Zabbix | Zabbix | 2.2.11 | All | All | All |
| Application | Zabbix | Zabbix | 2.2.12 | All | All | All |
| Application | Zabbix | Zabbix | 2.2.2 | - | All | All |
| Application | Zabbix | Zabbix | 2.2.3 | - | All | All |
| Application | Zabbix | Zabbix | 2.2.4 | All | All | All |
| Application | Zabbix | Zabbix | 2.2.5 | All | All | All |
| Application | Zabbix | Zabbix | 2.2.6 | All | All | All |
| Application | Zabbix | Zabbix | 2.2.7 | All | All | All |
| Application | Zabbix | Zabbix | 2.2.8 | All | All | All |
| Application | Zabbix | Zabbix | 2.2.9 | All | All | All |
| Application | Zabbix | Zabbix | 3.0.0 | All | All | All |
| Application | Zabbix | Zabbix | 3.0.2 | All | All | All |
| Application | Zabbix | Zabbix | 2.0.0 | All | All | All |
| Application | Zabbix | Zabbix | 2.0.1 | All | All | All |
| Application | Zabbix | Zabbix | 2.0.10 | All | All | All |
| Application | Zabbix | Zabbix | 2.0.11 | All | All | All |
| Application | Zabbix | Zabbix | 2.0.12 | All | All | All |
| Application | Zabbix | Zabbix | 2.0.13 | All | All | All |
| Application | Zabbix | Zabbix | 2.0.14 | All | All | All |
| Application | Zabbix | Zabbix | 2.0.15 | All | All | All |
| Application | Zabbix | Zabbix | 2.0.16 | All | All | All |
| Application | Zabbix | Zabbix | 2.0.17 | All | All | All |
| Application | Zabbix | Zabbix | 2.0.2 | All | All | All |
| Application | Zabbix | Zabbix | 2.0.3 | All | All | All |
| Application | Zabbix | Zabbix | 2.0.4 | All | All | All |
| Application | Zabbix | Zabbix | 2.0.5 | All | All | All |
| Application | Zabbix | Zabbix | 2.0.6 | All | All | All |
| Application | Zabbix | Zabbix | 2.0.7 | All | All | All |
| Application | Zabbix | Zabbix | 2.0.8 | All | All | All |
| Application | Zabbix | Zabbix | 2.0.9 | All | All | All |
| Application | Zabbix | Zabbix | 2.2.0 | - | All | All |
| Application | Zabbix | Zabbix | 2.2.1 | - | All | All |
| Application | Zabbix | Zabbix | 2.2.10 | All | All | All |
| Application | Zabbix | Zabbix | 2.2.11 | All | All | All |
| Application | Zabbix | Zabbix | 2.2.12 | All | All | All |
| Application | Zabbix | Zabbix | 2.2.2 | - | All | All |
| Application | Zabbix | Zabbix | 2.2.3 | - | All | All |
| Application | Zabbix | Zabbix | 2.2.4 | All | All | All |
| Application | Zabbix | Zabbix | 2.2.5 | All | All | All |
| Application | Zabbix | Zabbix | 2.2.6 | All | All | All |
| Application | Zabbix | Zabbix | 2.2.7 | All | All | All |
| Application | Zabbix | Zabbix | 2.2.8 | All | All | All |
| Application | Zabbix | Zabbix | 2.2.9 | All | All | All |
| Application | Zabbix | Zabbix | 3.0.0 | All | All | All |
| Application | Zabbix | Zabbix | 3.0.2 | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| 1 Frontend improvements [Zabbix Documentation 2.0] | CONFIRM | www.zabbix.com | Vendor Advisory |
| [ZBX-10741] included to sources user param mysql.size[] produces error on some shells - ZABBIX SUPPORT | CONFIRM | support.zabbix.com | Exploit, Patch, Vendor Advisory |
| Zabbix Agent 3.0.1 - mysql.size Shell Command Injection | EXPLOIT-DB | www.exploit-db.com | Exploit, Third Party Advisory, VDB Entry |
| Zabbix CVE-2016-4338 Command Injection Vulnerability | BID | www.securityfocus.com | Third Party Advisory, VDB Entry |
| Zabbix: Multiple vulnerabilities (GLSA 201612-42) — Gentoo Security | GENTOO | security.gentoo.org | Third Party Advisory, VDB Entry |
| SecurityFocus | BUGTRAQ | www.securityfocus.com | |
| 7 What's new in Zabbix 3.0.3 [Zabbix Documentation 3.0] | CONFIRM | www.zabbix.com | Vendor Advisory |
| 18 What's new in Zabbix 2.2.13 [Zabbix Documentation 2.2] | CONFIRM | www.zabbix.com | Vendor Advisory |
| Zabbix Agent 3.0.1 mysql.size Shell Command Injection ≈ Packet Storm | MISC | packetstormsecurity.com | Exploit, Third Party Advisory, VDB Entry |
| Full Disclosure: CVE-2016-4338: Zabbix Agent 3.0.1 mysql.size shell command injection | FULLDISC | seclists.org | Exploit, Third Party Advisory, VDB Entry |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.