Nagios XI < 5.9.3 Multiple Vulnerabilities

high Nessus Plugin ID 181759


The remote host has a web application affected by multiple vulnerabilities.


According to the self-reported version of Nagios XI, the remote host is affected by multiple vulnerabilities, including the following:

- The session ID for API Authentication is generated using uniqid, which is based on the current time. An attacker can brute-force a valid session ID by guessing when a previous user authenticated against the API. (CVE-2023-24036)

- The “Insecure Backend Ticket” Authentication (which is disabled by default) uses an insecure timing comparison. An attacker can brute-force the admin passive by measuring timing difference in the comparison. (CVE-2023-24035)

- An issue was discovered in twilio_ajax_handler.php in Nagios XI 5.9.2. An attacker can force a user to visit a malicious site by using an open redirect vulnerability. (CVE-2023-24034)

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.


Upgrade to Nagios XI 5.9.3 or later.

See Also

Plugin Details

Severity: High

ID: 181759

File Name: nagiosxi_5_9_3.nasl

Version: 1.5

Type: combined

Agent: unix

Family: CGI abuses

Published: 9/21/2023

Updated: 6/5/2024

Configuration: Enable thorough checks

Supported Sensors: Nessus Agent, Nessus

Risk Information


Risk Factor: Medium

Score: 6.7


Risk Factor: Medium

Base Score: 6.4

Temporal Score: 4.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N

CVSS Score Source: CVE-2023-24036


Risk Factor: High

Base Score: 7.2

Temporal Score: 6.3

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:nagios:nagios_xi

Exploit Ease: No known exploits are available

Patch Publication Date: 2/1/2023

Vulnerability Publication Date: 2/1/2023

Reference Information

CVE: CVE-2023-24034, CVE-2023-24035, CVE-2023-24036

IAVB: 2023-B-0071-S