{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2024-22116","assignerOrgId":"72de3e22-0555-4a0d-ae81-9249e0f0a1e8","state":"PUBLISHED","assignerShortName":"Zabbix","dateReserved":"2024-01-05T07:44:01.394Z","datePublished":"2024-08-09T10:16:34.982Z","dateUpdated":"2025-11-03T21:53:39.703Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","modules":["Server"],"product":"Zabbix","repo":"https://git.zabbix.com/","vendor":"Zabbix","versions":[{"changes":[{"at":"6.4.16rc1","status":"unaffected"}],"lessThanOrEqual":"6.4.15","status":"affected","version":"6.4.9","versionType":"git"},{"changes":[{"at":"7.0.0rc3","status":"unaffected"}],"lessThanOrEqual":"7.0.0rc2","status":"affected","version":"7.0.0alpha1","versionType":"git"}]}],"credits":[{"lang":"en","type":"reporter","value":"Zabbix wants to thank justonezero and Qusai Alhaddad (qusaialhaddad) who submitted this report in HackerOne bug bounty platform"}],"datePublic":"2024-06-12T12:52:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"An administrator with restricted permissions can exploit the script execution functionality within the Monitoring Hosts section. The lack of default escaping for script parameters enabled this user ability to execute arbitrary code via the Ping script, thereby compromising infrastructure."}],"value":"An administrator with restricted permissions can exploit the script execution functionality within the Monitoring Hosts section. The lack of default escaping for script parameters enabled this user ability to execute arbitrary code via the Ping script, thereby compromising infrastructure."}],"impacts":[{"capecId":"CAPEC-253","descriptions":[{"lang":"en","value":"CAPEC-253 Remote Code Inclusion"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":9.9,"baseSeverity":"CRITICAL","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-94","description":"CWE-94 Improper Control of Generation of Code ('Code Injection')","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"72de3e22-0555-4a0d-ae81-9249e0f0a1e8","shortName":"Zabbix","dateUpdated":"2024-08-27T09:10:20.447Z"},"references":[{"url":"https://support.zabbix.com/browse/ZBX-25016"}],"source":{"discovery":"EXTERNAL"},"title":"Remote code execution within ping script","x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"affected":[{"vendor":"zabbix","product":"zabbix","cpes":["cpe:2.3:a:zabbix:zabbix:*:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"6.4.9","status":"affected","lessThanOrEqual":"6.4.15","versionType":"custom"},{"version":"7.0.0alpha1","status":"affected","lessThanOrEqual":"7.0.0rc2","versionType":"custom"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-12-04T04:55:28.879375Z","id":"CVE-2024-22116","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-12-04T14:37:43.459Z"}},{"title":"CVE Program Container","references":[{"url":"https://lists.debian.org/debian-lts-announce/2024/10/msg00000.html"}],"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2025-11-03T21:53:39.703Z"}}]}}