First published: Wed May 22 2019(Updated: )
** DISPUTED ** Nagios XI 5.6.1 allows SQL injection via the username parameter to login.php?forgotpass (aka the reset password form). NOTE: The vendor disputes this issues as not being a vulnerability because the issue does not seem to be a legitimate SQL Injection. The POC does not show any valid injection that can be done with the variable provided, and while the username value being passed does get used in a SQL query, it is passed through SQL escaping functions when creating the call. The vendor tried re-creating the issue with no luck.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Nagios | =5.6.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2019-12279 is currently disputed by the vendor, as they do not consider it a legitimate SQL injection vulnerability.
The vendor has not provided a fix for CVE-2019-12279, and they dispute the classification of this issue as a vulnerability.
CVE-2019-12279 affects Nagios XI version 5.6.1.
The vendor claims that CVE-2019-12279 does not enable a successful SQL injection attack, thus disputing its impact.
CVE-2019-12279 remains a topic of discussion among users, but its relevance is minimized due to the vendor's stance on the vulnerability.