SB2018111423 - Multiple vulnerabilities in Nagios XI
Published: November 14, 2018 Updated: August 8, 2020
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 7 secuirty vulnerabilities.
1) Input validation error (CVE-ID: CVE-2018-15708)
The vulnerability allows a remote non-authenticated attacker to execute arbitrary code.
Snoopy 1.0 in Nagios XI 5.5.6 allows remote unauthenticated attackers to execute arbitrary commands via a crafted HTTP request.
2) OS Command Injection (CVE-ID: CVE-2018-15709)
The vulnerability allows a remote authenticated user to execute arbitrary code.
Nagios XI 5.5.6 allows remote authenticated attackers to execute arbitrary commands via a crafted HTTP request.
3) OS Command Injection (CVE-ID: CVE-2018-15710)
The vulnerability allows a local authenticated user to execute arbitrary code.
Nagios XI 5.5.6 allows local authenticated attackers to escalate privileges to root via Autodiscover_new.php.
4) OS Command Injection (CVE-ID: CVE-2018-15711)
The vulnerability allows a remote authenticated user to execute arbitrary code.
Nagios XI 5.5.6 allows remote authenticated attackers to reset and regenerate the API key of more privileged users. The attacker can then use the new API key to execute API calls at elevated privileges.
5) Cross-site scripting (CVE-ID: CVE-2018-15712)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
Nagios XI 5.5.6 allows reflected cross site scripting from remote unauthenticated attackers via the host parameter in api_tool.php.
6) Cross-site scripting (CVE-ID: CVE-2018-15713)
The vulnerability allows a remote authenticated user to read and manipulate data.
Nagios XI 5.5.6 allows persistent cross site scripting from remote authenticated attackers via the stored email address in admin/users.php.
7) Cross-site scripting (CVE-ID: CVE-2018-15714)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
Nagios XI 5.5.6 allows reflected cross site scripting from remote unauthenticated attackers via the oname and oname2 parameters.
Remediation
Install update from vendor's website.