Vulnerabilities
Vulnerable Software
Nagios:  >> Nagios Xi  Security Vulnerabilities
Improper neutralization of argument delimiters in a command in Nagios XI 5.7.3 allows a remote, authenticated admin user to write to arbitrary files and ultimately execute code with the privileges of the apache user.
CVSS Score
7.2
EPSS Score
0.87
Published
2020-10-20
An issue was found in Nagios XI before 5.7.3. There is a privilege escalation vulnerability in backend scripts that ran as root where some included files were editable by nagios user. This issue was fixed in version 5.7.3.
CVSS Score
9.8
EPSS Score
0.055
Published
2020-09-09
In Nagios XI before 5.7.3, ajaxhelper.php allows remote authenticated attackers to execute arbitrary commands via cmdsubsys.
CVSS Score
8.8
EPSS Score
0.065
Published
2020-07-22
Graph Explorer in Nagios XI before 5.7.2 allows XSS via the link url option.
CVSS Score
6.1
EPSS Score
0.428
Published
2020-07-22
Nagios XI 5.6.11 allows XSS via the includes/components/ldap_ad_integration/ username parameter.
CVSS Score
4.8
EPSS Score
0.242
Published
2020-03-22
Nagios XI 5.6.11 allows XSS via the includes/components/ldap_ad_integration/ password parameter.
CVSS Score
4.8
EPSS Score
0.045
Published
2020-03-22
Nagios XI 5.6.11 allows XSS via the account/main.php theme parameter.
CVSS Score
4.8
EPSS Score
0.242
Published
2020-03-22
In Nagios XI 5.6.9, an authenticated user is able to execute arbitrary OS commands via shell metacharacters in the id parameter to schedulereport.php, in the context of the web-server user account.
CVSS Score
8.8
EPSS Score
0.436
Published
2019-12-31
In Nagios XI 5.6.9, XSS exists via the nocscreenapi.php host, hostgroup, or servicegroup parameter, or the schedulereport.php hour or frequency parameter. Any authenticated user can attack the admin user.
CVSS Score
5.4
EPSS Score
0.083
Published
2019-12-30
CVE-2019-15949
Known exploited
Nagios XI before 5.6.6 allows remote command execution as root. The exploit requires access to the server as the nagios user, or access as the admin user via the web interface. The getprofile.sh script, invoked by downloading a system profile (profile.php?cmd=download), is executed as root via a passwordless sudo entry; the script executes check_plugin, which is owned by the nagios user. A user logged into Nagios XI with permissions to modify plugins, or the nagios user on the server, can modify the check_plugin executable and insert malicious commands to execute as root.
CVSS Score
8.8
EPSS Score
0.872
Published
2019-09-05


Contact Us

Shodan ® - All rights reserved