An attacker who has the privilege to configure Zabbix items can use function icmpping() with additional malicious command inside it to execute arbitrary code on the current Zabbix server.
[
{
"events": [
{
"introduced": "4.0.0"
},
{
"last_affected": "4.0.49"
}
]
},
{
"events": [
{
"introduced": "5.0.0"
},
{
"last_affected": "5.0.38"
}
]
},
{
"events": [
{
"introduced": "6.0.0"
},
{
"last_affected": "6.0.22"
}
]
},
{
"events": [
{
"introduced": "6.4.0"
},
{
"last_affected": "6.4.7"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "7.0.0-alpha1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "7.0.0-alpha2"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "7.0.0-alpha3"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "7.0.0-alpha6"
}
]
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-32727.json"