Zabbix Agent 2 Docker plugin does not properly sanitize the 'docker.container_info' parameters when forwarding them to the Docker daemon. An attacker capable of invoking Agent 2 can read arbitrary files from running Docker containers by injecting them via the Docker archive API.
Exploitability
AV:NAC:LAT:NPR:HUI:NVulnerable System
VC:NVI:NVA:NSubsequent System
SC:HSI:NSA:N6.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:NOther