Nagios XI version xi-5.7.5 is affected by OS command injection. The vulnerability exists in the file /usr/local/nagiosxi/html/includes/configwizards/windowswmi/windowswmi.inc.php due to improper sanitization of authenticated user-controlled input by a single HTTP request, which can lead to OS command injection on the Nagios XI server.
References
Link | Resource |
---|---|
http://nagios.com | Product |
https://github.com/fs0c-sh/nagios-xi-5.7.5-bugs/blob/main/README.md | Exploit Third Party Advisory |
https://assets.nagios.com/downloads/nagiosxi/versions.php | Exploit Product |
http://packetstormsecurity.com/files/161561/Nagios-XI-5.7.5-Remote-Code-Execution.html | Exploit Third Party Advisory VDB Entry |
http://packetstormsecurity.com/files/170924/Nagios-XI-5.7.5-Remote-Code-Execution.html | |
https://www.fastly.com/blog/anatomy-of-a-command-injection-cve-2021-25296-7-8-with-metasploit-module-and |
Configurations
Information
Published : 2021-02-15 05:15
Updated : 2023-02-28 18:15
NVD link : CVE-2021-25296
Mitre link : CVE-2021-25296
JSON object : View
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Products Affected
nagios
- nagios_xi