Amazon Linux AMI : nrpe Arbitrary Code Execution (ALAS-2013-203)

This script is Copyright (C) 2013-2014 Tenable Network Security, Inc.


Synopsis :

The remote Amazon Linux AMI host is missing a security update.

Description :

nrpe 2.13 has, in src/nrpc.c, line 52 :

#define NASTY_METACHARS '|`&><''\[]{}
'

This allows the passing of $() to plugins/scripts which, if run under
bash, will execute that shell command under a subprocess and pass the
output as a parameter to the called script. Using this, it is possible
to get called scripts, such as check_http, to execute arbitrary
commands under the uid that NRPE/nagios is running as (typically,
'nagios').

See also :

http://www.nessus.org/u?13776898

Solution :

Run 'yum update nrpe' to update your system.

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)
Public Exploit Available : true

Family: Amazon Linux Local Security Checks

Nessus Plugin ID: 69761 ()

Bugtraq ID:

CVE ID: CVE-2013-1362