SB2018051705 - SQL-injection in Nagios
Published: May 17, 2018
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 4 secuirty vulnerabilities.
1) SQL injection (CVE-ID: CVE-2018-10738)
The vulnerability allows a remote attacker to execute arbitrary SQL commands in web application database.
The weakness exists in the admin/menuaccess.php code due to insufficient sanitization of user-supplied data. A remote attacker can send a specially crafted chbKey1 parameters to vulnerable script and execute arbitrary SQL commands in web application database.
Successful exploitation of the vulnerability may allow an attacker to gain administrative access to vulnerable web application.
2) SQL injection (CVE-ID: CVE-2018-10736)
The vulnerability allows a remote attacker to execute arbitrary SQL commands in web application database.
The weakness exists in the admin/info.php cod due to insufficient sanitization of user-supplied data. A remote attacker can send a specially crafted key1 parameter to vulnerable script and execute arbitrary SQL commands in web application database.
Successful exploitation of the vulnerability may allow an attacker to gain administrative access to vulnerable web application.
3) SQL injection (CVE-ID: CVE-2018-10735)
The vulnerability allows a remote attacker to execute arbitrary SQL commands in web application database.
The weakness exists in the admin/commandline.php code due to insufficient sanitization of user-supplied data. A remote attacker can send a specially crafted cname parameters to vulnerable script and execute arbitrary SQL commands in web application database.
Successful exploitation of the vulnerability may allow an attacker to gain administrative access to vulnerable web application.
4) SQL injection (CVE-ID: CVE-2018-10737)
The vulnerability allows a remote attacker to execute arbitrary SQL commands in web application database.
The weakness exists due to insufficient sanitization of user-supplied data. A remote attacker can send a specially crafted HTTP request to vulnerable script and execute arbitrary SQL commands in web application database.
Successful exploitation of the vulnerability may allow an attacker to gain administrative access to vulnerable web application.
Remediation
Cybersecurity Help is not aware of any official remediation provided by the vendor.