Page 14 of 97 results (0.012 seconds)

CVSS: 4.8EPSS: 5%CPEs: 1EXPL: 1

Nagios XI 5.6.11 allows XSS via the account/main.php theme parameter. Nagios versión XI 5.6.11, permite un ataque de tipo XSS por medio del parámetro theme del archivo account/main.php. • https://code610.blogspot.com/2020/03/nagios-5611-xssd.html • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 9.0EPSS: 0%CPEs: 1EXPL: 3

In Nagios XI 5.6.9, an authenticated user is able to execute arbitrary OS commands via shell metacharacters in the id parameter to schedulereport.php, in the context of the web-server user account. En Nagios XI versión 5.6.9, un usuario autenticado puede ejecutar comandos arbitrarios del Sistema Operativo por medio de metacaracteres de shell en el parámetro id en el archivo schedulereport.php, en el contexto de la cuenta de usuario del servidor web. • https://github.com/jas502n/CVE-2019-20197 https://github.com/lp008/CVE-2019-20197 https://code610.blogspot.com/2019/12/postauth-rce-in-latest-nagiosxi.html • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 5.4EPSS: 5%CPEs: 1EXPL: 1

In Nagios XI 5.6.9, XSS exists via the nocscreenapi.php host, hostgroup, or servicegroup parameter, or the schedulereport.php hour or frequency parameter. Any authenticated user can attack the admin user. En Nagios XI versión 5.6.9, existe una vulnerabilidad de tipo XSS por medio del parámetro host, hostgroup o servicegroup del archivo nocscreenapi.php o el parámetro hour o frequency en el archivo schedulereport.php. Cualquier usuario autenticado puede atacar al usuario administrador. • https://code610.blogspot.com/2019/12/multiple-xss-bugs-in-nagios-569.html • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 9.0EPSS: 32%CPEs: 1EXPL: 4

Nagios XI before 5.6.6 allows remote command execution as root. The exploit requires access to the server as the nagios user, or access as the admin user via the web interface. The getprofile.sh script, invoked by downloading a system profile (profile.php?cmd=download), is executed as root via a passwordless sudo entry; the script executes check_plugin, which is owned by the nagios user. A user logged into Nagios XI with permissions to modify plugins, or the nagios user on the server, can modify the check_plugin executable and insert malicious commands to execute as root. • https://www.exploit-db.com/exploits/48191 http://packetstormsecurity.com/files/156676/Nagios-XI-Authenticated-Remote-Command-Execution.html http://packetstormsecurity.com/files/162158/Nagios-XI-getprofile.sh-Remote-Command-Execution.html https://github.com/jakgibb/nagiosxi-root-rce-exploit - • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 4.8EPSS: 0%CPEs: 1EXPL: 0

Nagios XI before 5.5.4 has XSS in the auto login admin management page. Nagios XI versiones anterior a 5.5.4, presenta un problema de tipo XSS en la página de administración admin de inicio de sesión automático. • http://www.securityfocus.com/bid/109116 https://assets.nagios.com/downloads/nagiosxi/CHANGES-5.TXT • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •