Lucene search

K
saintSAINT CorporationSAINT:C5023AAA861EB37606B05D5A55B52555
HistoryApr 13, 2010 - 12:00 a.m.

Nagios statuswml.cgi Command Injection

2010-04-1300:00:00
SAINT Corporation
www.saintcorporation.com
13

0.969 High

EPSS

Percentile

99.6%

Added: 04/13/2010
CVE: CVE-2009-2288
BID: 35464
OSVDB: 55281

Background

Nagios is a network host and service monitoring and management system.

Problem

The Nagios statuswml.cgi script passes unsanitized data to the ping and traceroute commands, resulting in shell command execution via metacharacters. A successful remote attacker could use a specially crafted request to execute arbitrary commands.

Resolution

Upgrade to Nagios 3.1.1 or later.

References

<http://secunia.com/advisories/35543/&gt;

Limitations

Exploit works on Nagios 2.11.
Valid Nagios user credentials must be provided.