Описание
check_by_ssh in Nagios nagios-plugins 2.4.5 allows arbitrary command execution via ProxyCommand, LocalCommand, and PermitLocalCommand with \${IFS}. This has been categorized both as fixed in e8810de, and as intended behavior.
Пакеты
Пакет | Статус | Версия исправления | Релиз | Тип |
---|---|---|---|---|
monitoring-plugins | unfixed | package |
Примечания
Fix in nagios-plugins project: https://github.com/nagios-plugins/nagios-plugins/commit/e8810de21be80148562b7e0168b0a62aeedffde6
monitoring-plugins upstream does not plan to make an upstream change similar to
nagios-plugins because there are valid usecases to execute stuff locally via
check_by_ssh (although not commonly known and used).
Documentation for expected behaviour in monitoring-plugins/check_by_ssh:
https://github.com/monitoring-plugins/monitoring-plugins/security/advisories/GHSA-p3gv-vmpx-hhw4
https://joshua.hu/nagios-hacking-cve-2023-37154
EPSS
Связанные уязвимости
check_by_ssh in Nagios nagios-plugins 2.4.5 allows arbitrary command execution via ProxyCommand, LocalCommand, and PermitLocalCommand with \${IFS}. This has been categorized both as fixed in e8810de, and as intended behavior.
check_by_ssh in Nagios nagios-plugins 2.4.5 allows arbitrary command execution via ProxyCommand, LocalCommand, and PermitLocalCommand with \${IFS}. This has been categorized both as fixed in e8810de, and as intended behavior.
Уязвимость компонента check_by_ssh.c набора плагинов для системы мониторинга Nagios-plugins, позволяющая нарушителю выполнить произвольные команды
EPSS