Vulnerability Description
An information disclosure vulnerability exists in the iConfig proxy request of Zabbix server 2.4.X. A specially crafted iConfig proxy request can cause the Zabbix server to send the configuration information of any Zabbix proxy, resulting in information disclosure. An attacker can make requests from an active Zabbix proxy to trigger this vulnerability.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Zabbix | Zabbix | 2.4.0 |
| Debian | Debian Linux | 8.0 |
Related Weaknesses (CWE)
References
- https://lists.debian.org/debian-lts-announce/2019/03/msg00010.htmlMailing ListThird Party Advisory
- https://talosintelligence.com/vulnerability_reports/TALOS-2017-0327ExploitThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2019/03/msg00010.htmlMailing ListThird Party Advisory
- https://talosintelligence.com/vulnerability_reports/TALOS-2017-0327ExploitThird Party Advisory
FAQ
What is CVE-2017-2826?
CVE-2017-2826 is a vulnerability with a CVSS score of 3.7 (LOW). An information disclosure vulnerability exists in the iConfig proxy request of Zabbix server 2.4.X. A specially crafted iConfig proxy request can cause the Zabbix server to send the configuration info...
How severe is CVE-2017-2826?
CVE-2017-2826 has been rated LOW with a CVSS base score of 3.7/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-2826?
Check the references section above for vendor advisories and patch information. Affected products include: Zabbix Zabbix, Debian Debian Linux.