CISA KEV 정보
| 취약점명 | Nagios XI Remote Code Execution Vulnerability |
|---|---|
| 설명 | Nagios XI contains a remote code execution vulnerability in which a user can modify the check_plugin executable and insert malicious commands to execute as root. |
| 조치사항 | Apply updates per vendor instructions. |
| 랜섬웨어 캠페인 악용 | Unknown |
| CWE | CWE-78 |
| 등록일 (KEV) | 2021-11-03 |
| 조치 기한 | 2022-05-03 |
| 추가 참고 | https://nvd.nist.gov/vuln/detail/CVE-2019-15949 |
NVD 상세 정보
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HAV:N/AC:L/Au:S/C:C/I:C/A:C설명: Nagios XI before 5.6.6 allows remote command execution as root. The exploit requires access to the server as the nagios user, or access as the admin user via the web interface. The getprofile.sh script, invoked by downloading a system profile (profile.php?cmd=download), is executed as root via a passwordless sudo entry; the script executes check_plugin, which is owned by the nagios user. A user logged into Nagios XI with permissions to modify plugins, or the nagios user on the server, can modify the check_plugin executable and insert malicious commands to execute as root.
CWE: CWE-78 | CWE-78
참조
- http://packetstormsecurity.com/files/156676/Nagios-XI-Authenticated-Remote-Command-Execution.html [Exploit, Third Party Advisory, VDB Entry]
- http://packetstormsecurity.com/files/162158/Nagios-XI-getprofile.sh-Remote-Command-Execution.html [Exploit, Third Party Advisory, VDB Entry]
- https://github.com/jakgibb/nagiosxi-root-rce-exploit [Exploit, Third Party Advisory]
- http://packetstormsecurity.com/files/156676/Nagios-XI-Authenticated-Remote-Command-Execution.html [Exploit, Third Party Advisory, VDB Entry]
- http://packetstormsecurity.com/files/162158/Nagios-XI-getprofile.sh-Remote-Command-Execution.html [Exploit, Third Party Advisory, VDB Entry]
- https://github.com/jakgibb/nagiosxi-root-rce-exploit [Exploit, Third Party Advisory]
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2019-15949 [US Government Resource]
This product uses the NVD API but is not endorsed or certified by the NVD.