{"id":"CVE-2016-4338","details":"The mysql user parameter configuration script (userparameter_mysql.conf) in the agent in Zabbix before 2.0.18, 2.2.x before 2.2.13, and 3.0.x before 3.0.3, when used with a shell other than bash, allows context-dependent attackers to execute arbitrary code or SQL commands via the mysql.size parameter.","modified":"2026-03-12T22:22:52.653239Z","published":"2017-01-23T21:59:01.423Z","references":[{"type":"WEB","url":"http://www.securityfocus.com/archive/1/538258/100/0/threaded"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/89631"},{"type":"ADVISORY","url":"https://www.zabbix.com/documentation/3.0/manual/introduction/whatsnew303#miscellaneous_improvements"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201612-42"},{"type":"ADVISORY","url":"https://www.zabbix.com/documentation/2.0/manual/introduction/whatsnew2018#miscellaneous_improvements"},{"type":"ADVISORY","url":"https://www.zabbix.com/documentation/2.2/manual/introduction/whatsnew2213#miscellaneous_improvements"},{"type":"FIX","url":"https://support.zabbix.com/browse/ZBX-10741"},{"type":"EVIDENCE","url":"http://packetstormsecurity.com/files/136898/Zabbix-Agent-3.0.1-mysql.size-Shell-Command-Injection.html"},{"type":"EVIDENCE","url":"http://seclists.org/fulldisclosure/2016/May/9"},{"type":"EVIDENCE","url":"https://www.exploit-db.com/exploits/39769/"}],"affected":[{"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-4338.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"2.0.0"}]},{"events":[{"introduced":"0"},{"last_affected":"2.0.1"}]},{"events":[{"introduced":"0"},{"last_affected":"2.0.2"}]},{"events":[{"introduced":"0"},{"last_affected":"2.0.3"}]},{"events":[{"introduced":"0"},{"last_affected":"2.0.4"}]},{"events":[{"introduced":"0"},{"last_affected":"2.0.5"}]},{"events":[{"introduced":"0"},{"last_affected":"2.0.6"}]},{"events":[{"introduced":"0"},{"last_affected":"2.0.7"}]},{"events":[{"introduced":"0"},{"last_affected":"2.0.8"}]},{"events":[{"introduced":"0"},{"last_affected":"2.0.9"}]},{"events":[{"introduced":"0"},{"last_affected":"2.0.10"}]},{"events":[{"introduced":"0"},{"last_affected":"2.0.11"}]},{"events":[{"introduced":"0"},{"last_affected":"2.0.12"}]},{"events":[{"introduced":"0"},{"last_affected":"2.0.13"}]},{"events":[{"introduced":"0"},{"last_affected":"2.0.14"}]},{"events":[{"introduced":"0"},{"last_affected":"2.0.15"}]},{"events":[{"introduced":"0"},{"last_affected":"2.0.16"}]},{"events":[{"introduced":"0"},{"last_affected":"2.0.17"}]},{"events":[{"introduced":"0"},{"last_affected":"2.2.0-NA"}]},{"events":[{"introduced":"0"},{"last_affected":"2.2.1-NA"}]},{"events":[{"introduced":"0"},{"last_affected":"2.2.2-NA"}]},{"events":[{"introduced":"0"},{"last_affected":"2.2.3-NA"}]},{"events":[{"introduced":"0"},{"last_affected":"2.2.4"}]},{"events":[{"introduced":"0"},{"last_affected":"2.2.5"}]},{"events":[{"introduced":"0"},{"last_affected":"2.2.6"}]},{"events":[{"introduced":"0"},{"last_affected":"2.2.7"}]},{"events":[{"introduced":"0"},{"last_affected":"2.2.8"}]},{"events":[{"introduced":"0"},{"last_affected":"2.2.9"}]},{"events":[{"introduced":"0"},{"last_affected":"2.2.10"}]},{"events":[{"introduced":"0"},{"last_affected":"2.2.11"}]},{"events":[{"introduced":"0"},{"last_affected":"2.2.12"}]},{"events":[{"introduced":"0"},{"last_affected":"3.0.0"}]},{"events":[{"introduced":"0"},{"last_affected":"3.0.2"}]},{"events":[{"introduced":"0"},{"fixed":"2.0.18"}]},{"events":[{"introduced":"2.2.x"},{"fixed":"2.2.13"}]},{"events":[{"introduced":"3.0.x"},{"fixed":"3.0.3"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}