First published: Thu Sep 05 2019(Updated: )
Nagios XI before 5.6.6 allows remote command execution as root. The exploit requires access to the server as the nagios user, or access as the admin user via the web interface. The getprofile.sh script, invoked by downloading a system profile (profile.php?cmd=download), is executed as root via a passwordless sudo entry; the script executes check_plugin, which is owned by the nagios user. A user logged into Nagios XI with permissions to modify plugins, or the nagios user on the server, can modify the check_plugin executable and insert malicious commands to execute as root.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Nagios Nagios XI | <5.6.6 | |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-15949 is a vulnerability in Nagios XI that allows remote code execution as root.
The severity of CVE-2019-15949 is critical with a CVSS score of 8.8.
CVE-2019-15949 can be exploited by accessing the server as the nagios user or as the admin user via the web interface to execute arbitrary commands as root.
Nagios XI versions up to and excluding 5.6.6 are affected by CVE-2019-15949.
To fix CVE-2019-15949, users should update to Nagios XI version 5.6.6 or higher.