Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2023-37154

Опубликовано: 09 окт. 2024
Источник: debian
EPSS Низкий

Описание

check_by_ssh in Nagios nagios-plugins 2.4.5 allows arbitrary command execution via ProxyCommand, LocalCommand, and PermitLocalCommand with \${IFS}. This has been categorized both as fixed in e8810de, and as intended behavior.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
monitoring-pluginsunfixedpackage

Примечания

  • Fix in nagios-plugins project: https://github.com/nagios-plugins/nagios-plugins/commit/e8810de21be80148562b7e0168b0a62aeedffde6

  • monitoring-plugins upstream does not plan to make an upstream change similar to

  • nagios-plugins because there are valid usecases to execute stuff locally via

  • check_by_ssh (although not commonly known and used).

  • Documentation for expected behaviour in monitoring-plugins/check_by_ssh:

  • https://github.com/monitoring-plugins/monitoring-plugins/security/advisories/GHSA-p3gv-vmpx-hhw4

  • https://joshua.hu/nagios-hacking-cve-2023-37154

EPSS

Процентиль: 13%
0.00044
Низкий

Связанные уязвимости

CVSS3: 8.4
ubuntu
9 месяцев назад

check_by_ssh in Nagios nagios-plugins 2.4.5 allows arbitrary command execution via ProxyCommand, LocalCommand, and PermitLocalCommand with \${IFS}. This has been categorized both as fixed in e8810de, and as intended behavior.

CVSS3: 8.4
nvd
9 месяцев назад

check_by_ssh in Nagios nagios-plugins 2.4.5 allows arbitrary command execution via ProxyCommand, LocalCommand, and PermitLocalCommand with \${IFS}. This has been categorized both as fixed in e8810de, and as intended behavior.

CVSS3: 9.1
fstec
почти 2 года назад

Уязвимость компонента check_by_ssh.c набора плагинов для системы мониторинга Nagios-plugins, позволяющая нарушителю выполнить произвольные команды

CVSS3: 9.1
redos
8 месяцев назад

Уязвимость nagios

EPSS

Процентиль: 13%
0.00044
Низкий