Логотип exploitDog
bind:CVE-2020-36856
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2020-36856

Количество 3

Количество 3

nvd логотип

CVE-2020-36856

3 месяца назад

Nagios XI versions prior to 5.6.14 contain an authenticated remote command execution vulnerability in the CCM command_test.php script. Insufficient validation of the `address` parameter allows an authenticated user with access to the Core Config Manager to inject shell metacharacters that are incorporated into backend command invocations. Successful exploitation enables arbitrary command execution with the privileges of the Nagios XI web application user and may be leveraged to execute commands on the underlying XI host, modify system configuration, or fully compromise the host.

CVSS3: 8.8
EPSS: Низкий
github логотип

GHSA-9f8q-34c7-3prr

3 месяца назад

Nagios XI versions prior to 5.6.14 contain an authenticated remote command execution vulnerability in the CCM command_test.php script. Insufficient validation of the `address` parameter allows an authenticated user with access to the Core Config Manager to inject shell metacharacters that are incorporated into backend command invocations. Successful exploitation enables arbitrary command execution with the privileges of the Nagios XI web application user and may be leveraged to execute commands on the underlying XI host, modify system configuration, or fully compromise the host.

CVSS3: 8.8
EPSS: Низкий
fstec логотип

BDU:2025-14519

3 месяца назад

Уязвимость сценария command_test.php компонента Core Config Manager инструмента для мониторинга Nagios XI, позволяющая нарушителю выполнить произвольные команды

CVSS3: 9.1
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2020-36856

Nagios XI versions prior to 5.6.14 contain an authenticated remote command execution vulnerability in the CCM command_test.php script. Insufficient validation of the `address` parameter allows an authenticated user with access to the Core Config Manager to inject shell metacharacters that are incorporated into backend command invocations. Successful exploitation enables arbitrary command execution with the privileges of the Nagios XI web application user and may be leveraged to execute commands on the underlying XI host, modify system configuration, or fully compromise the host.

CVSS3: 8.8
0%
Низкий
3 месяца назад
github логотип
GHSA-9f8q-34c7-3prr

Nagios XI versions prior to 5.6.14 contain an authenticated remote command execution vulnerability in the CCM command_test.php script. Insufficient validation of the `address` parameter allows an authenticated user with access to the Core Config Manager to inject shell metacharacters that are incorporated into backend command invocations. Successful exploitation enables arbitrary command execution with the privileges of the Nagios XI web application user and may be leveraged to execute commands on the underlying XI host, modify system configuration, or fully compromise the host.

CVSS3: 8.8
0%
Низкий
3 месяца назад
fstec логотип
BDU:2025-14519

Уязвимость сценария command_test.php компонента Core Config Manager инструмента для мониторинга Nagios XI, позволяющая нарушителю выполнить произвольные команды

CVSS3: 9.1
0%
Низкий
3 месяца назад

Уязвимостей на страницу