Nagios NRPE nrpe.c Arbitrary Command Execution

High Nessus Plugin ID 66361


The monitoring service running on the remote host is affected by an arbitrary command execution vulnerability.


The remote host is running a version of Nagios NRPE that contains a flaw that is triggered when input passed via '$()' is not properly sanitized before being used to execute plugins.

An unauthenticated, remote attacker could exploit this issue to execute arbitrary commands within the context of the vulnerable application.


Upgrade to Nagios NRPE 2.14 or later.

See Also

Plugin Details

Severity: High

ID: 66361

File Name: nagios_nrpe_2_14.nasl

Version: $Revision: 1.5 $

Type: remote

Family: Misc.

Published: 2013/05/09

Modified: 2016/05/20

Dependencies: 66360

Risk Information

Risk Factor: High


Base Score: 7.5

Temporal Score: 5.9

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:POC/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:nagios:nagios

Required KB Items: Settings/ParanoidReport

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2012/12/21

Vulnerability Publication Date: 2013/02/21

Exploitable With

Metasploit (Nagios Remote Plugin Executor Arbitrary Command Execution)

Reference Information

CVE: CVE-2013-1362

BID: 58142

OSVDB: 90582

EDB-ID: 24955