Логотип exploitDog
bind:CVE-2019-15949
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2019-15949

Количество 3

Количество 3

nvd логотип

CVE-2019-15949

больше 6 лет назад

Nagios XI before 5.6.6 allows remote command execution as root. The exploit requires access to the server as the nagios user, or access as the admin user via the web interface. The getprofile.sh script, invoked by downloading a system profile (profile.php?cmd=download), is executed as root via a passwordless sudo entry; the script executes check_plugin, which is owned by the nagios user. A user logged into Nagios XI with permissions to modify plugins, or the nagios user on the server, can modify the check_plugin executable and insert malicious commands to execute as root.

CVSS3: 8.8
EPSS: Высокий
github логотип

GHSA-8qv6-943v-r8gm

больше 3 лет назад

Nagios XI before 5.6.6 allows remote command execution as root. The exploit requires access to the server as the nagios user, or access as the admin user via the web interface. The getprofile.sh script, invoked by downloading a system profile (profile.php?cmd=download), is executed as root via a passwordless sudo entry; the script executes check_plugin, which is owned by the nagios user. A user logged into Nagios XI with permissions to modify plugins, or the nagios user on the server, can modify the check_plugin executable and insert malicious commands to execute as root.

CVSS3: 8.8
EPSS: Высокий
fstec логотип

BDU:2021-05690

больше 6 лет назад

Уязвимость реализации сценария getprofile.sh инструмента для мониторинга Nagios XI, позволяющая нарушителю выполнить произвольные команды

CVSS3: 8.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2019-15949

Nagios XI before 5.6.6 allows remote command execution as root. The exploit requires access to the server as the nagios user, or access as the admin user via the web interface. The getprofile.sh script, invoked by downloading a system profile (profile.php?cmd=download), is executed as root via a passwordless sudo entry; the script executes check_plugin, which is owned by the nagios user. A user logged into Nagios XI with permissions to modify plugins, or the nagios user on the server, can modify the check_plugin executable and insert malicious commands to execute as root.

CVSS3: 8.8
87%
Высокий
больше 6 лет назад
github логотип
GHSA-8qv6-943v-r8gm

Nagios XI before 5.6.6 allows remote command execution as root. The exploit requires access to the server as the nagios user, or access as the admin user via the web interface. The getprofile.sh script, invoked by downloading a system profile (profile.php?cmd=download), is executed as root via a passwordless sudo entry; the script executes check_plugin, which is owned by the nagios user. A user logged into Nagios XI with permissions to modify plugins, or the nagios user on the server, can modify the check_plugin executable and insert malicious commands to execute as root.

CVSS3: 8.8
87%
Высокий
больше 3 лет назад
fstec логотип
BDU:2021-05690

Уязвимость реализации сценария getprofile.sh инструмента для мониторинга Nagios XI, позволяющая нарушителю выполнить произвольные команды

CVSS3: 8.8
больше 6 лет назад

Уязвимостей на страницу