The Zabbix Agent 2 item key smart.disk.get does not sanitize its parameters before passing them to a shell command resulting possible vulnerability for remote code execution.
{ "binaries": [ { "binary_version": "1:5.0.17+dfsg-1", "binary_name": "zabbix-agent" }, { "binary_version": "1:5.0.17+dfsg-1", "binary_name": "zabbix-frontend-php" }, { "binary_version": "1:5.0.17+dfsg-1", "binary_name": "zabbix-java-gateway" }, { "binary_version": "1:5.0.17+dfsg-1", "binary_name": "zabbix-proxy-mysql" }, { "binary_version": "1:5.0.17+dfsg-1", "binary_name": "zabbix-proxy-pgsql" }, { "binary_version": "1:5.0.17+dfsg-1", "binary_name": "zabbix-proxy-sqlite3" }, { "binary_version": "1:5.0.17+dfsg-1", "binary_name": "zabbix-server-mysql" }, { "binary_version": "1:5.0.17+dfsg-1", "binary_name": "zabbix-server-pgsql" } ] }