Логотип exploitDog
bind:CVE-2025-34287
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-34287

Количество 3

Количество 3

nvd логотип

CVE-2025-34287

3 месяца назад

Nagios XI versions prior to 2024R2 contain an improperly owned script, process_perfdata.pl, which is executed periodically as the nagios user but owned by www-data. Because the file was writable by www-data, an attacker with web server privileges could modify its contents, leading to arbitrary code execution as the nagios user when the script is next run. This improper ownership and permission configuration enables local privilege escalation.

CVSS3: 7.8
EPSS: Низкий
github логотип

GHSA-gvrp-ffhh-698m

3 месяца назад

Nagios XI versions prior to 2024R2 contain an improperly owned script, process_perfdata.pl, which is executed periodically as the nagios user but owned by www-data. Because the file was writable by www-data, an attacker with web server privileges could modify its contents, leading to arbitrary code execution as the nagios user when the script is next run. This improper ownership and permission configuration enables local privilege escalation.

CVSS3: 7.8
EPSS: Низкий
fstec логотип

BDU:2025-14702

3 месяца назад

Уязвимость сценария process_perfdata.pl инструмента для мониторинга ИТ-инфраструктуры Nagios XI, позволяющая нарушителю повысить свои привилегии и выполнить произвольный код

CVSS3: 7.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-34287

Nagios XI versions prior to 2024R2 contain an improperly owned script, process_perfdata.pl, which is executed periodically as the nagios user but owned by www-data. Because the file was writable by www-data, an attacker with web server privileges could modify its contents, leading to arbitrary code execution as the nagios user when the script is next run. This improper ownership and permission configuration enables local privilege escalation.

CVSS3: 7.8
0%
Низкий
3 месяца назад
github логотип
GHSA-gvrp-ffhh-698m

Nagios XI versions prior to 2024R2 contain an improperly owned script, process_perfdata.pl, which is executed periodically as the nagios user but owned by www-data. Because the file was writable by www-data, an attacker with web server privileges could modify its contents, leading to arbitrary code execution as the nagios user when the script is next run. This improper ownership and permission configuration enables local privilege escalation.

CVSS3: 7.8
0%
Низкий
3 месяца назад
fstec логотип
BDU:2025-14702

Уязвимость сценария process_perfdata.pl инструмента для мониторинга ИТ-инфраструктуры Nagios XI, позволяющая нарушителю повысить свои привилегии и выполнить произвольный код

CVSS3: 7.3
0%
Низкий
3 месяца назад

Уязвимостей на страницу