First published: Thu Jan 27 2022(Updated: )
Zabbix 4.0 LTS, 4.2, 4.4, and 5.0 LTS is vulnerable to Remote Code Execution (RCE). Any user with the "Zabbix Admin" role is able to run custom shell script on the application server in the context of the application user.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Zabbix Server | >=4.0.0<=4.0.34 | |
Zabbix Server | >=4.2.0<=4.2.8 | |
Zabbix Server | >=4.4.0<=4.4.11 | |
Zabbix Server | >=5.0.0<=5.0.20 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-46088 is high with a severity value of 7.2.
Zabbix versions 4.0 LTS (4.0.0 - 4.0.34), 4.2 (4.2.0 - 4.2.8), 4.4 (4.4.0 - 4.4.11), and 5.0 LTS (5.0.0 - 5.0.20) are affected by CVE-2021-46088.
The vulnerability is a Remote Code Execution (RCE) where any user with the "Zabbix Admin" role can run custom shell script on the application server in the context of the application user.
Any user with the "Zabbix Admin" role can exploit the vulnerability in CVE-2021-46088.
To fix the vulnerability in Zabbix, you should upgrade to a version that is not affected by CVE-2021-46088.