Nagios XI < 5.6.6 RCE

high Nessus Plugin ID 154935

Synopsis

The remote host has a web application affected by a remote code execution vulnerability.

Description

Nagios XI before 5.6.6 allows remote command execution as root. The exploit requires access to the server as the nagios user, or access as the admin user via the web interface. The getprofile.sh script, invoked by downloading a system profile (profile.php?cmd=download), is executed as root via a passwordless sudo entry; the script executes check_plugin, which is owned by the nagios user. A user logged into Nagios XI with permissions to modify plugins, or the nagios user on the server, can modify the check_plugin executable and insert malicious commands to execute as root.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Upgrade to Nagios XI 5.6.6 or later.

See Also

https://www.nagios.com/downloads/nagios-xi/change-log/

https://www.nagios.com/products/security/

Plugin Details

Severity: High

ID: 154935

File Name: nagiosxi_5_6_6.nasl

Version: 1.5

Type: remote

Family: CGI abuses

Published: 11/5/2021

Updated: 1/20/2022

Risk Information

CVSS Score Source: CVE-2019-15949

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: High

Base Score: 9

Temporal Score: 7.8

Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C

Temporal Vector: E:H/RL:OF/RC:C

CVSS v3

Risk Factor: High

Base Score: 8.8

Temporal Score: 8.4

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: E:H/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:nagios:nagios_xi

Required KB Items: installed_sw/nagios_xi

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 8/20/2019

Vulnerability Publication Date: 9/5/2019

CISA Known Exploited Dates: 5/3/2022

Exploitable With

Metasploit (Nagios XI Prior to 5.6.6 getprofile.sh Authenticated Remote Command Execution)

Reference Information

CVE: CVE-2019-15949