Nagios XI < 5.6.6 RCE

high Nessus Plugin ID 154935

Synopsis

The remote host has a web application affected by a remote code execution vulnerability.

Description

Nagios XI before 5.6.6 allows remote command execution as root. The exploit requires access to the server as the nagios user, or access as the admin user via the web interface. The getprofile.sh script, invoked by downloading a system profile (profile.php?cmd=download), is executed as root via a passwordless sudo entry; the script executes check_plugin, which is owned by the nagios user. A user logged into Nagios XI with permissions to modify plugins, or the nagios user on the server, can modify the check_plugin executable and insert malicious commands to execute as root.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Upgrade to Nagios XI 5.6.6 or later.

See Also

https://www.nagios.com/downloads/nagios-xi/change-log/

https://www.nagios.com/products/security/

Plugin Details

Severity: High

ID: 154935

File Name: nagiosxi_5_6_6.nasl

Version: 1.8

Type: combined

Agent: unix

Family: CGI abuses

Published: 11/5/2021

Updated: 6/5/2024

Configuration: Enable thorough checks

Supported Sensors: Nessus Agent, Nessus

Enable CGI Scanning: true

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: High

Base Score: 9

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:S/C:C/I:C/A:C

CVSS Score Source: CVE-2019-15949

CVSS v3

Risk Factor: High

Base Score: 8.8

Temporal Score: 8.2

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:nagios:nagios_xi

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 8/20/2019

Vulnerability Publication Date: 9/5/2019

CISA Known Exploited Vulnerability Due Dates: 5/3/2022

Exploitable With

Metasploit (Nagios XI Prior to 5.6.6 getprofile.sh Authenticated Remote Command Execution)

Reference Information

CVE: CVE-2019-15949