Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2019-15949

Опубликовано: 05 сент. 2019
Источник: nvd
CVSS3: 8.8
CVSS2: 9
EPSS Высокий

Описание

Nagios XI before 5.6.6 allows remote command execution as root. The exploit requires access to the server as the nagios user, or access as the admin user via the web interface. The getprofile.sh script, invoked by downloading a system profile (profile.php?cmd=download), is executed as root via a passwordless sudo entry; the script executes check_plugin, which is owned by the nagios user. A user logged into Nagios XI with permissions to modify plugins, or the nagios user on the server, can modify the check_plugin executable and insert malicious commands to execute as root.

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:nagios:nagios_xi:*:*:*:*:*:*:*:*
Версия до 5.6.6 (исключая)

EPSS

Процентиль: 99%
0.87053
Высокий

8.8 High

CVSS3

9 Critical

CVSS2

Дефекты

CWE-78
CWE-78

Связанные уязвимости

CVSS3: 8.8
github
больше 3 лет назад

Nagios XI before 5.6.6 allows remote command execution as root. The exploit requires access to the server as the nagios user, or access as the admin user via the web interface. The getprofile.sh script, invoked by downloading a system profile (profile.php?cmd=download), is executed as root via a passwordless sudo entry; the script executes check_plugin, which is owned by the nagios user. A user logged into Nagios XI with permissions to modify plugins, or the nagios user on the server, can modify the check_plugin executable and insert malicious commands to execute as root.

CVSS3: 8.8
fstec
больше 6 лет назад

Уязвимость реализации сценария getprofile.sh инструмента для мониторинга Nagios XI, позволяющая нарушителю выполнить произвольные команды

EPSS

Процентиль: 99%
0.87053
Высокий

8.8 High

CVSS3

9 Critical

CVSS2

Дефекты

CWE-78
CWE-78