Nagios 4.4.5 allows an attacker, who already has administrative access to change the "URL for JSON CGIs" configuration setting, to modify the Alert Histogram and Trends code via crafted versions of the archivejson.cgi, objectjson.cgi, and statusjson.cgi files. NOTE: this vulnerability has been mistakenly associated with CVE-2020-1408.
References
Link | Resource |
---|---|
https://www.nagios.org/projects/nagios-core/history/4x/ | Release Notes Vendor Advisory |
https://github.com/sawolf/nagioscore/tree/url-injection-fix | Product Third Party Advisory |
https://anhtai.me/nagios-core-4-4-5-url-injection/ | Exploit Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H7T6MSDWMBJEVVFSOK7DOYJJWDAFQCEQ/ | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUEIABR4Y6L5J5MZDFWU46ZWXMJO64U3/ | Mailing List Third Party Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5P6NHNG2SJAM6DXVTXQH3AOJ4WQVKJUE/ | Mailing List Third Party Advisory |
Information
Published : 2020-06-09 07:15
Updated : 2021-07-21 04:39
NVD link : CVE-2020-13977
Mitre link : CVE-2020-13977
JSON object : View
CWE
CWE-829
Inclusion of Functionality from Untrusted Control Sphere
Products Affected
nagios
- nagios
fedoraproject
- fedora