Nagios XI version xi-5.7.5 is affected by OS command injection. The vulnerability exists in the file /usr/local/nagiosxi/html/includes/configwizards/switch/switch.inc.php due to improper sanitization of authenticated user-controlled input by a single HTTP request, which can lead to OS command injection on the Nagios XI server.
References
Link | Resource |
---|---|
http://nagios.com | Product |
http://packetstormsecurity.com/files/161561/Nagios-XI-5.7.5-Remote-Code-Execution.html | Exploit Third Party Advisory VDB Entry |
http://packetstormsecurity.com/files/170924/Nagios-XI-5.7.5-Remote-Code-Execution.html | Exploit Third Party Advisory VDB Entry |
https://assets.nagios.com/downloads/nagiosxi/versions.php | Exploit Product |
https://github.com/fs0c-sh/nagios-xi-5.7.5-bugs/blob/main/README.md | Exploit Third Party Advisory |
https://www.fastly.com/blog/anatomy-of-a-command-injection-cve-2021-25296-7-8-with-metasploit-module-and | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2021-02-15 13:15
Updated : 2024-07-24 16:46
NVD link : CVE-2021-25297
Mitre link : CVE-2021-25297
CVE.ORG link : CVE-2021-25297
JSON object : View
Products Affected
nagios
- nagios_xi
CWE