Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2008-5027

Опубликовано: 10 нояб. 2008
Источник: debian
EPSS Низкий

Описание

The Nagios process in (1) Nagios before 3.0.5 and (2) op5 Monitor before 4.0.1 allows remote authenticated users to bypass authorization checks, and trigger execution of arbitrary programs by this process, via an (a) custom form or a (b) browser addon.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
nagios3removedpackage

Примечания

  • the nagios process shouldnt have rights to execute important commands and non-trusted

  • users shouldn't have access to nagios anyway

EPSS

Процентиль: 70%
0.00707
Низкий

Связанные уязвимости

ubuntu
около 17 лет назад

The Nagios process in (1) Nagios before 3.0.5 and (2) op5 Monitor before 4.0.1 allows remote authenticated users to bypass authorization checks, and trigger execution of arbitrary programs by this process, via an (a) custom form or a (b) browser addon.

redhat
около 17 лет назад

The Nagios process in (1) Nagios before 3.0.5 and (2) op5 Monitor before 4.0.1 allows remote authenticated users to bypass authorization checks, and trigger execution of arbitrary programs by this process, via an (a) custom form or a (b) browser addon.

nvd
около 17 лет назад

The Nagios process in (1) Nagios before 3.0.5 and (2) op5 Monitor before 4.0.1 allows remote authenticated users to bypass authorization checks, and trigger execution of arbitrary programs by this process, via an (a) custom form or a (b) browser addon.

github
больше 3 лет назад

The Nagios process in (1) Nagios before 3.0.5 and (2) op5 Monitor before 4.0.1 allows remote authenticated users to bypass authorization checks, and trigger execution of arbitrary programs by this process, via an (a) custom form or a (b) browser addon.

EPSS

Процентиль: 70%
0.00707
Низкий