Page 6 of 57 results (0.012 seconds)

CVSS: 4.8EPSS: 40%CPEs: 1EXPL: 1

22 Mar 2020 — Nagios XI 5.6.11 allows XSS via the includes/components/ldap_ad_integration/ password parameter. Nagios versión XI 5.6.11, permite un ataque de tipo XSS por medio del parámetro password del archivo includes/components/ldap_ad_integration/. • https://code610.blogspot.com/2020/03/nagios-5611-xssd.html • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 4.8EPSS: 24%CPEs: 1EXPL: 1

22 Mar 2020 — Nagios XI 5.6.11 allows XSS via the account/main.php theme parameter. Nagios versión XI 5.6.11, permite un ataque de tipo XSS por medio del parámetro theme del archivo account/main.php. • https://code610.blogspot.com/2020/03/nagios-5611-xssd.html • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 9.0EPSS: 58%CPEs: 1EXPL: 3

31 Dec 2019 — In Nagios XI 5.6.9, an authenticated user is able to execute arbitrary OS commands via shell metacharacters in the id parameter to schedulereport.php, in the context of the web-server user account. En Nagios XI versión 5.6.9, un usuario autenticado puede ejecutar comandos arbitrarios del Sistema Operativo por medio de metacaracteres de shell en el parámetro id en el archivo schedulereport.php, en el contexto de la cuenta de usuario del servidor web. • https://github.com/jas502n/CVE-2019-20197 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 5.4EPSS: 58%CPEs: 1EXPL: 1

30 Dec 2019 — In Nagios XI 5.6.9, XSS exists via the nocscreenapi.php host, hostgroup, or servicegroup parameter, or the schedulereport.php hour or frequency parameter. Any authenticated user can attack the admin user. En Nagios XI versión 5.6.9, existe una vulnerabilidad de tipo XSS por medio del parámetro host, hostgroup o servicegroup del archivo nocscreenapi.php o el parámetro hour o frequency en el archivo schedulereport.php. Cualquier usuario autenticado puede atacar al usuario administrador. • https://code610.blogspot.com/2019/12/multiple-xss-bugs-in-nagios-569.html • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 9.0EPSS: 91%CPEs: 1EXPL: 8

05 Sep 2019 — Nagios XI before 5.6.6 allows remote command execution as root. The exploit requires access to the server as the nagios user, or access as the admin user via the web interface. The getprofile.sh script, invoked by downloading a system profile (profile.php?cmd=download), is executed as root via a passwordless sudo entry; the script executes check_plugin, which is owned by the nagios user. A user logged into Nagios XI with permissions to modify plugins, or the nagios user on the server, can modify the check_p... • https://packetstorm.news/files/id/162158 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 9.8EPSS: 25%CPEs: 1EXPL: 3

22 May 2019 — Nagios XI 5.6.1 allows SQL injection via the username parameter to login.php?forgotpass (aka the reset password form). NOTE: The vendor disputes this issues as not being a vulnerability because the issue does not seem to be a legitimate SQL Injection. The POC does not show any valid injection that can be done with the variable provided, and while the username value being passed does get used in a SQL query, it is passed through SQL escaping functions when creating the call. The vendor tried re-creating the ... • https://packetstorm.news/files/id/153040 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 9.8EPSS: 22%CPEs: 17EXPL: 2

26 Nov 2013 — SQL injection vulnerability in functions/prepend_adm.php in Nagios Core Config Manager in Nagios XI before 2012R2.4 allows remote attackers to execute arbitrary SQL commands via the tfPassword parameter to nagiosql/index.php. Vulnerabilidad de inyección de SQL en functions/prepend_adm.php de Nagios Core Config Manager de Nagios XI anterior a la versión 2012R2.4 permite a atacantes remotos ejecutar comandos SQL a través del parámetro tfPassword hacia nagiosql/index.php. • https://www.exploit-db.com/exploits/38827 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •