what you don't know can hurt you

Nagios XI Network Monitor 2011R1.9 OS Command Injection

Nagios XI Network Monitor 2011R1.9 OS Command Injection
Posted Nov 30, 2012
Authored by Daniel Compton | Site nccgroup.com

Nagios XI Network Monitor version 2011R1.9 suffers from OS command injection vulnerabilities.

tags | exploit, vulnerability
MD5 | 8282d53e99b1e8dbcb80909ec38492d2

Nagios XI Network Monitor 2011R1.9 OS Command Injection

Change Mirror Download
=======
Summary
=======
Name: Nagios XI Network Monitor - OS Command Injection
Release Date: 30 November 2012
Reference: NGS00196
Discoverer: Daniel Compton <daniel.compton@ngssecure.com>
Vendor: Nagios
Vendor Reference: 0000283
Systems Affected: Nagios XI Network Monitor 2011R1.9
Risk: High
Status: Published

========
TimeLine
========
Discovered: 30 January 2012
Released: 31 January 2012
Approved: 31 January 2012
Reported: 31 January 2012
Fixed: 23 May 2012
Published: 30 November 2012

===========
Description
===========
Nagios XI Network Monitor 2011R1.9 - OS Command Injection/Execution within the administrator/monitoring interface. This is a commertical product for monitoring severs and network monitoring equipment.

I. VULNERABILITY
-------------------------
Nagios XI Network Monitor 2011R1.9 suffers from OS command injection in several pages and parameters. This is exploitable as an authenticated user.

II. BACKGROUND
-------------------------
Nagios provide enterprise level network and server monitor software.

http://www.nagios.com/

III. DESCRIPTION
-------------------------
OS command injection has been found and exploited/confirmed within the software as an authenticated user. This is the latest version of Nagios XI.


=================
Technical Details
=================
IV. PROOF OF CONCEPT
-------------------------
The following URL and parameters have been confirmed to all suffer from OS command injection.

/nagiosxi/includes/components/graphexplorer/visApi.php (GET parameters:
host, service, opt, end, start)

URL:

http://192.168.1.121/nagiosxi/includes/components/graphexplorer/visApi.php?type=stack&host=localhost`cat%20/etc/passwd%20>%20/tmp/passwd.txt`&service=Swap_Usage&div=visContainer1566841654&opt=days

Result: creates a new file with /etc/passwd contents.

===============
Fix Information
===============
Resolved in SVN 1.3 of Graph Explorer

http://exchange.nagios.org/directory/Addons/Components/Graph-Explorer-Component/details

CHANGES:
1.3 05/23/2012
========================
- Fixed shell vulnerabilities (reported by Daniel Compton from NGS Secure)

NCC Group Research
http://www.nccgroup.com/research


For more information please visit <a href="http://www.mimecast.com">http://www.mimecast.com<br>
This email message has been delivered safely and archived online by Mimecast.
</a>

Comments

RSS Feed Subscribe to this comment feed

No comments yet, be the first!

Login or Register to post a comment

File Archive:

September 2019

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    1 Files
  • 2
    Sep 2nd
    38 Files
  • 3
    Sep 3rd
    30 Files
  • 4
    Sep 4th
    15 Files
  • 5
    Sep 5th
    12 Files
  • 6
    Sep 6th
    17 Files
  • 7
    Sep 7th
    3 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    24 Files
  • 10
    Sep 10th
    22 Files
  • 11
    Sep 11th
    22 Files
  • 12
    Sep 12th
    15 Files
  • 13
    Sep 13th
    5 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    0 Files
  • 17
    Sep 17th
    0 Files
  • 18
    Sep 18th
    0 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2019 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close