1 results (0.010 seconds)

CVSS: 7.5EPSS: 93%CPEs: 32EXPL: 2

Incomplete blacklist vulnerability in nrpc.c in Nagios Remote Plug-In Executor (NRPE) before 2.14 might allow remote attackers to execute arbitrary shell commands via "$()" shell metacharacters, which are processed by bash. Vulenrabilidad de lista negra incompleta en nrpc.c en Nagios Remote Plug-In Executor (NRPE) anteriroes a v2.14 podría permitir a atacantes remotos ejecutar comandos del sistema a través de los metacaracteres "$()" , que son procesados por bash. The Nagios Remote Plugin Executor (NRPE) is installed to allow a central Nagios server to actively poll information from the hosts it monitors. NRPE has a configuration option dont_blame_nrpe which enables command-line arguments to be provided remote plugins. When this option is enabled, even when NRPE makes an effort to sanitize arguments to prevent command execution, it is possible to execute arbitrary commands. • https://www.exploit-db.com/exploits/24955 http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00005.html http://lists.opensuse.org/opensuse-security-announce/2013-04/msg00006.html http://seclists.org/bugtraq/2013/Feb/119 http://www.exploit-db.com/exploits/24955 http://www.occamsec.com/vulnerabilities.html#nagios_metacharacter_vulnerability https://bugzilla.novell.com/show_bug.cgi?id=807241 • CWE-20: Improper Input Validation •