Name | CVE-2023-32728 |
Description | The Zabbix Agent 2 item key smart.disk.get does not sanitize its parameters before passing them to a shell command resulting possible vulnerability for remote code execution. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
zabbix (PTS) | bullseye | 1:5.0.8+dfsg-1 | fixed |
| bullseye (security) | 1:5.0.44+dfsg-1+deb11u1 | fixed |
| bookworm | 1:6.0.14+dfsg-1 | vulnerable |
| sid, trixie | 1:7.0.6+dfsg-1 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|
zabbix | source | buster | (not affected) | | | |
zabbix | source | bullseye | (not affected) | | | |
zabbix | source | (unstable) | 1:6.0.24+dfsg-1 | | | |
Notes
[bullseye] - zabbix <not-affected> (Vulnerable code introduced later)
[buster] - zabbix <not-affected> (Vulnerable code introduced later)
https://support.zabbix.com/browse/ZBX-23858
https://github.com/zabbix/zabbix/commit/51ee1af626f93c1656ee2e37aa3d611b0292c1d8 (6.0.24rc1)
https://github.com/zabbix/zabbix/commit/f4557473616f455eefe8f303721b4cec473ece4c (6.0.24rc1)
https://github.com/zabbix/zabbix/commit/8c651bb7e026b9eaafea17719293d2073ae31c93 (6.0.24rc1)
https://github.com/zabbix/zabbix/commit/225c46f7c93884514cb0af0066c7e3f501d30967 (6.0.24rc1)
https://github.com/zabbix/zabbix/commit/09fa80bb16b094e4c17c036868c817f411efe4a0 (6.0.24rc1)
https://github.com/zabbix/zabbix/commit/7c00b48ab998066962e5275efa50007cb72ea1ac (6.0.24rc1)
https://github.com/zabbix/zabbix/commit/245fbae6039ebfbd720ab33c0349c82bae242fc9 (6.0.24rc1)
Vulnerable feature introduced with versions 5.0.9rc1, 5.3.5rc1 and 5.4.0alpha2:
https://support.zabbix.com/browse/ZBXNEXT-6339