Nagios XI before version 5.11.3 was discovered to contain a remote code execution (RCE) vulnerability via the component command_test.php.
Max CVSS
9.8
EPSS Score
28.54%
Published
2023-12-14
Updated
2023-12-19
Nagios XI before version 5.11.3 was discovered to contain a SQL injection vulnerability via the bulk modification tool.
Max CVSS
9.8
EPSS Score
0.11%
Published
2023-12-14
Updated
2023-12-19
Nagios XI v5.8.6 was discovered to contain a SQL injection vulnerability via the mib_name parameter at the Manage MIBs page.
Max CVSS
9.8
EPSS Score
0.21%
Published
2022-09-07
Updated
2022-09-09
An issue was discovered in Nagios XI 5.8.5. In the Manage Dashlets section of the Admin panel, an administrator can upload ZIP files. A command injection (within the name of the first file in the archive) allows an attacker to execute system commands.
Max CVSS
9.0
EPSS Score
5.77%
Published
2021-10-26
Updated
2022-11-08
Nagios XI before version 5.8.5 is vulnerable to SQL injection vulnerability in Bulk Modifications Tool due to improper input sanitisation.
Max CVSS
9.8
EPSS Score
0.29%
Published
2021-08-13
Updated
2021-08-23
Nagios XI before 5.8.5 incorrectly allows manage_services.sh wildcards.
Max CVSS
9.8
EPSS Score
0.22%
Published
2021-09-28
Updated
2021-10-04
Nagios XI before 5.8.5 has Incorrect Permission Assignment for repairmysql.sh.
Max CVSS
9.8
EPSS Score
0.22%
Published
2021-09-28
Updated
2021-10-01
Nagios XI before 5.8.5 incorrectly allows backup_xi.sh wildcards.
Max CVSS
9.8
EPSS Score
0.22%
Published
2021-09-28
Updated
2021-10-04
Nagios XI before 5.8.5 has Incorrect Permission Assignment for migrate.php.
Max CVSS
9.8
EPSS Score
0.22%
Published
2021-09-28
Updated
2021-10-01

CVE-2021-25298

Known exploited
Public exploit
Nagios XI version xi-5.7.5 is affected by OS command injection. The vulnerability exists in the file /usr/local/nagiosxi/html/includes/configwizards/cloud-vm/cloud-vm.inc.php due to improper sanitization of authenticated user-controlled input by a single HTTP request, which can lead to OS command injection on the Nagios XI server.
Max CVSS
9.0
EPSS Score
97.25%
Published
2021-02-15
Updated
2023-03-01
CISA KEV Added
2022-01-18

CVE-2021-25297

Known exploited
Public exploit
Nagios XI version xi-5.7.5 is affected by OS command injection. The vulnerability exists in the file /usr/local/nagiosxi/html/includes/configwizards/switch/switch.inc.php due to improper sanitization of authenticated user-controlled input by a single HTTP request, which can lead to OS command injection on the Nagios XI server.
Max CVSS
9.0
EPSS Score
89.04%
Published
2021-02-15
Updated
2023-03-01
CISA KEV Added
2022-01-18

CVE-2021-25296

Known exploited
Public exploit
Nagios XI version xi-5.7.5 is affected by OS command injection. The vulnerability exists in the file /usr/local/nagiosxi/html/includes/configwizards/windowswmi/windowswmi.inc.php due to improper sanitization of authenticated user-controlled input by a single HTTP request, which can lead to OS command injection on the Nagios XI server.
Max CVSS
9.0
EPSS Score
89.04%
Published
2021-02-15
Updated
2023-03-01
CISA KEV Added
2022-01-18
Nagios XI below 5.7 is affected by code injection in the /nagiosxi/admin/graphtemplates.php component. To exploit this vulnerability, someone must have an admin user account in Nagios XI's web system.
Max CVSS
9.0
EPSS Score
0.11%
Published
2021-02-25
Updated
2021-03-02
Improper access and command validation in the Nagios Docker Config Wizard before 1.1.2, as used in Nagios XI through 5.7, allows an unauthenticated attacker to execute remote code as the apache user.
Max CVSS
9.8
EPSS Score
0.22%
Published
2021-01-26
Updated
2021-02-03

CVE-2020-35578

Public exploit
An issue was discovered in the Manage Plugins page in Nagios XI before 5.8.0. Because the line-ending conversion feature is mishandled during a plugin upload, a remote, authenticated admin user can execute operating-system commands.
Max CVSS
9.0
EPSS Score
94.76%
Published
2021-01-13
Updated
2021-04-26
Creation of a Temporary Directory with Insecure Permissions in Nagios XI 5.7.5 and earlier allows for Privilege Escalation via creation of symlinks, which are mishandled in getprofile.sh.
Max CVSS
10.0
EPSS Score
12.31%
Published
2021-05-24
Updated
2022-07-12
Incorrect File Permissions in Nagios XI 5.7.5 and earlier and Nagios Fusion 4.1.8 and earlier allows for Privilege Escalation to root. Low-privileged users are able to modify files that are included (aka sourced) by scripts executed by root.
Max CVSS
9.0
EPSS Score
0.29%
Published
2021-05-24
Updated
2021-05-28
Insufficient Verification of Data Authenticity in Nagios Fusion 4.1.8 and earlier and Nagios XI 5.7.5 and earlier allows for Escalation of Privileges or Code Execution as root via vectors related to an untrusted update package to upgrade_to_latest.sh.
Max CVSS
10.0
EPSS Score
7.35%
Published
2021-05-24
Updated
2021-05-28
Improper input validation in the Auto-Discovery component of Nagios XI before 5.7.5 allows an authenticated attacker to execute remote code.
Max CVSS
9.0
EPSS Score
11.50%
Published
2020-11-16
Updated
2022-10-18
An issue was found in Nagios XI before 5.7.3. There is a privilege escalation vulnerability in backend scripts that ran as root where some included files were editable by nagios user. This issue was fixed in version 5.7.3.
Max CVSS
10.0
EPSS Score
0.22%
Published
2020-09-09
Updated
2021-07-21

CVE-2020-5791

Public exploit
Improper neutralization of special elements used in an OS command in Nagios XI 5.7.3 allows a remote, authenticated admin user to execute operating system commands with the privileges of the apache user.
Max CVSS
9.0
EPSS Score
84.50%
Published
2020-10-20
Updated
2023-01-24
In Nagios XI 5.6.9, an authenticated user is able to execute arbitrary OS commands via shell metacharacters in the id parameter to schedulereport.php, in the context of the web-server user account.
Max CVSS
9.0
EPSS Score
0.76%
Published
2019-12-31
Updated
2020-01-07

CVE-2019-15949

Known exploited
Public exploit
Nagios XI before 5.6.6 allows remote command execution as root. The exploit requires access to the server as the nagios user, or access as the admin user via the web interface. The getprofile.sh script, invoked by downloading a system profile (profile.php?cmd=download), is executed as root via a passwordless sudo entry; the script executes check_plugin, which is owned by the nagios user. A user logged into Nagios XI with permissions to modify plugins, or the nagios user on the server, can modify the check_plugin executable and insert malicious commands to execute as root.
Max CVSS
9.0
EPSS Score
35.52%
Published
2019-09-05
Updated
2021-04-15
CISA KEV Added
2021-11-03
Nagios XI 5.6.1 allows SQL injection via the username parameter to login.php?forgotpass (aka the reset password form). NOTE: The vendor disputes this issues as not being a vulnerability because the issue does not seem to be a legitimate SQL Injection. The POC does not show any valid injection that can be done with the variable provided, and while the username value being passed does get used in a SQL query, it is passed through SQL escaping functions when creating the call. The vendor tried re-creating the issue with no luck
Max CVSS
9.8
EPSS Score
1.37%
Published
2019-05-22
Updated
2024-04-11
SQL injection vulnerability in Nagios XI before 5.5.11 allows attackers to execute arbitrary SQL commands via the API when using fusekeys and malicious user id.
Max CVSS
9.8
EPSS Score
2.33%
Published
2019-03-28
Updated
2022-10-06
31 vulnerabilities found
1 2
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!