First published: Tue Jun 09 2020(Updated: )
Nagios 4.4.5 allows an attacker, who already has administrative access to change the "URL for JSON CGIs" configuration setting, to modify the Alert Histogram and Trends code via crafted versions of the archivejson.cgi, objectjson.cgi, and statusjson.cgi files. NOTE: this vulnerability has been mistakenly associated with CVE-2020-1408.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Nagios Nagios | =4.4.5 | |
Fedoraproject Fedora | =32 | |
Fedoraproject Fedora | =33 | |
Fedoraproject Fedora | =34 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2020-13977 is medium with a score of 4.9.
An attacker, with administrative access, can exploit CVE-2020-13977 by changing the 'URL for JSON CGIs' configuration setting and modifying the Alert Histogram and Trends code using crafted versions of the archivejson.cgi, objectjson.cgi, and statusjson.cgi files.
Nagios version 4.4.5 is affected by CVE-2020-13977.
To fix CVE-2020-13977, update to a patched version of Nagios, such as Nagios 4.4.6, which includes the fix for the URL injection vulnerability.
You can find more information about CVE-2020-13977 on the following references: [link1], [link2], [link3].