Page 11 of 79 results (0.014 seconds)

CVSS: 9.0EPSS: 32%CPEs: 1EXPL: 4

Nagios XI before 5.6.6 allows remote command execution as root. The exploit requires access to the server as the nagios user, or access as the admin user via the web interface. The getprofile.sh script, invoked by downloading a system profile (profile.php?cmd=download), is executed as root via a passwordless sudo entry; the script executes check_plugin, which is owned by the nagios user. A user logged into Nagios XI with permissions to modify plugins, or the nagios user on the server, can modify the check_plugin executable and insert malicious commands to execute as root. • https://www.exploit-db.com/exploits/48191 http://packetstormsecurity.com/files/156676/Nagios-XI-Authenticated-Remote-Command-Execution.html http://packetstormsecurity.com/files/162158/Nagios-XI-getprofile.sh-Remote-Command-Execution.html https://github.com/jakgibb/nagiosxi-root-rce-exploit - • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 4.8EPSS: 0%CPEs: 1EXPL: 0

Nagios XI before 5.5.4 has XSS in the auto login admin management page. Nagios XI versiones anterior a 5.5.4, presenta un problema de tipo XSS en la página de administración admin de inicio de sesión automático. • http://www.securityfocus.com/bid/109116 https://assets.nagios.com/downloads/nagiosxi/CHANGES-5.TXT • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 5.4EPSS: 0%CPEs: 1EXPL: 0

A cross-site scripting vulnerability exists in Nagios XI before 5.5.4 via the 'name' parameter within the Account Information page. Exploitation of this vulnerability allows an attacker to execute arbitrary JavaScript code within the auto login admin management page. Existe una vulnerabilidad de scripts entre sitios en Nagios XI antes de 5.5.4 a través del parámetro 'name' dentro de la página Información de cuenta. La explotación de esta vulnerabilidad permite a un atacante ejecutar código JavaScript arbitrario dentro de la página de administración de inicio de sesión automático. • https://assets.nagios.com/downloads/nagiosxi/CHANGES-5.TXT • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

An Insufficient Access Control vulnerability (leading to credential disclosure) in coreconfigsnapshot.php (aka configuration snapshot page) in Nagios XI before 5.5.4 allows remote attackers to gain access to configuration files containing confidential credentials. Una vulnerabilidad de Control de acceso insuficiente (que lleva a la divulgación de credenciales) en coreconfigsnapshot.php (también conocida como página de instantáneas de configuración) en Nagios XI antes de 5.5.4 permite a los atacantes remotos acceder a los archivos de configuración que contienen credenciales confidenciales. • https://assets.nagios.com/downloads/nagiosxi/CHANGES-5.TXT • CWE-284: Improper Access Control •

CVSS: 9.8EPSS: 1%CPEs: 1EXPL: 2

Nagios XI 5.6.1 allows SQL injection via the username parameter to login.php?forgotpass (aka the reset password form). NOTE: The vendor disputes this issues as not being a vulnerability because the issue does not seem to be a legitimate SQL Injection. The POC does not show any valid injection that can be done with the variable provided, and while the username value being passed does get used in a SQL query, it is passed through SQL escaping functions when creating the call. The vendor tried re-creating the issue with no luck ** EN DIPUTA ** Nagios XI 5.6.1 permite que se produzca inyección SQL mediante el parámetro username para login.php? • https://www.exploit-db.com/exploits/46910 http://packetstormsecurity.com/files/153040/Nagios-XI-5.6.1-SQL-Injection.html http://www.securityfocus.com/bid/108446 https://github.com/JameelNabbo/exploits/blob/master/nagiosxi%20username%20sql%20injection.txt • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •