All the vulnerabilites related to nagios - nagios
Vulnerability from fkie_nvd
Published
2018-07-12 18:29
Modified
2024-11-21 03:47
Summary
qh_help in Nagios Core version 4.4.1 and earlier is prone to a NULL pointer dereference vulnerability, which allows attacker to cause a local denial-of-service condition by sending a crafted payload to the listening UNIX socket.
Impacted products
Vendor Product Version
nagios nagios *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:nagios:nagios:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF320AFD-B04D-47F8-9DC0-0B3722FF8E5E",
              "versionEndIncluding": "4.4.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "qh_help in Nagios Core version 4.4.1 and earlier is prone to a NULL pointer dereference vulnerability, which allows attacker to cause a local denial-of-service condition by sending a crafted payload to the listening UNIX socket."
    },
    {
      "lang": "es",
      "value": "qh_help en Nagios Core en versiones 4.4.1 y anteriores es propenso a una vulnerabilidad de desreferencia de puntero NULL que permite que un atacante provoque una condici\u00f3n de denegaci\u00f3n de servicio (DoS) local mediante el env\u00edo de una carga \u00fatil manipulada al socket UNIX en escucha."
    }
  ],
  "id": "CVE-2018-13441",
  "lastModified": "2024-11-21T03:47:06.000",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": true,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 2.1,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2018-07-12T18:29:00.420",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00014.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00022.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://gist.github.com/fakhrizulkifli/8df4a174158df69ebd765f824bd736b8"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Release Notes"
      ],
      "url": "https://knowledge.opsview.com/v5.3/docs/whats-new"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Release Notes"
      ],
      "url": "https://knowledge.opsview.com/v5.4/docs/whats-new"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://www.exploit-db.com/exploits/45082/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00014.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00022.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://gist.github.com/fakhrizulkifli/8df4a174158df69ebd765f824bd736b8"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes"
      ],
      "url": "https://knowledge.opsview.com/v5.3/docs/whats-new"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes"
      ],
      "url": "https://knowledge.opsview.com/v5.4/docs/whats-new"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://www.exploit-db.com/exploits/45082/"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-476"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2017-08-23 21:29
Modified
2024-11-21 03:10
Summary
Nagios Core before 4.3.3 creates a nagios.lock PID file after dropping privileges to a non-root account, which might allow local users to kill arbitrary processes by leveraging access to this non-root account for nagios.lock modification before a root script executes a "kill `cat /pathname/nagios.lock`" command.
Impacted products
Vendor Product Version
nagios nagios *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:nagios:nagios:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB40EDD4-55D8-4C3C-9D84-1F7B930F476F",
              "versionEndIncluding": "4.3.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Nagios Core before 4.3.3 creates a nagios.lock PID file after dropping privileges to a non-root account, which might allow local users to kill arbitrary processes by leveraging access to this non-root account for nagios.lock modification before a root script executes a \"kill `cat /pathname/nagios.lock`\" command."
    },
    {
      "lang": "es",
      "value": "Nagios Core en versiones anteriores a la 4.3.3 crea un archivo nagios.lock PID tras eliminar privilegios a una cuenta no-root, lo que podr\u00eda permitir que usuarios locales terminen procesos arbitrarios aprovechando el acceso a esta cuenta no-root para modificar nagios.lock antes de que un script root ejecute un comando \"kill `cat /pathname/nagios.lock`\"."
    }
  ],
  "id": "CVE-2017-12847",
  "lastModified": "2024-11-21T03:10:17.673",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 6.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:L/AC:M/Au:N/C:N/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 3.4,
        "impactScore": 9.2,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 1.0,
        "impactScore": 5.2,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2017-08-23T21:29:00.200",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/100403"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Release Notes",
        "Vendor Advisory"
      ],
      "url": "https://github.com/NagiosEnterprises/nagioscore/blob/master/Changelog"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://github.com/NagiosEnterprises/nagioscore/commit/1b197346d490df2e2d3b1dcce5ac6134ad0c8752"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://github.com/NagiosEnterprises/nagioscore/commit/3baffa78bafebbbdf9f448890ba5a952ea2d73cb"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Issue Tracking",
        "Vendor Advisory"
      ],
      "url": "https://github.com/NagiosEnterprises/nagioscore/issues/404"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.gentoo.org/glsa/201710-20"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/100403"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes",
        "Vendor Advisory"
      ],
      "url": "https://github.com/NagiosEnterprises/nagioscore/blob/master/Changelog"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://github.com/NagiosEnterprises/nagioscore/commit/1b197346d490df2e2d3b1dcce5ac6134ad0c8752"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://github.com/NagiosEnterprises/nagioscore/commit/3baffa78bafebbbdf9f448890ba5a952ea2d73cb"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Vendor Advisory"
      ],
      "url": "https://github.com/NagiosEnterprises/nagioscore/issues/404"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.gentoo.org/glsa/201710-20"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-665"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2016-12-15 22:59
Modified
2024-11-21 03:01
Summary
base/logging.c in Nagios Core before 4.2.4 allows local users with access to an account in the nagios group to gain root privileges via a symlink attack on the log file. NOTE: this can be leveraged by remote attackers using CVE-2016-9565.
References
cve@mitre.orghttp://rhn.redhat.com/errata/RHSA-2017-0211.html
cve@mitre.orghttp://rhn.redhat.com/errata/RHSA-2017-0212.html
cve@mitre.orghttp://rhn.redhat.com/errata/RHSA-2017-0213.html
cve@mitre.orghttp://rhn.redhat.com/errata/RHSA-2017-0214.html
cve@mitre.orghttp://rhn.redhat.com/errata/RHSA-2017-0258.html
cve@mitre.orghttp://rhn.redhat.com/errata/RHSA-2017-0259.html
cve@mitre.orghttp://seclists.org/fulldisclosure/2016/Dec/58Mailing List, Third Party Advisory
cve@mitre.orghttp://www.securityfocus.com/bid/94919Third Party Advisory, VDB Entry
cve@mitre.orghttp://www.securitytracker.com/id/1037487
cve@mitre.orghttps://bugzilla.redhat.com/show_bug.cgi?id=1402869Issue Tracking
cve@mitre.orghttps://github.com/NagiosEnterprises/nagioscore/commit/c29557dec91eba2306f5fb11b8da4474ba63f8c4Issue Tracking, Patch
cve@mitre.orghttps://legalhackers.com/advisories/Nagios-Exploit-Root-PrivEsc-CVE-2016-9566.htmlExploit, Third Party Advisory
cve@mitre.orghttps://lists.debian.org/debian-lts-announce/2018/12/msg00014.html
cve@mitre.orghttps://security.gentoo.org/glsa/201612-51
cve@mitre.orghttps://security.gentoo.org/glsa/201702-26
cve@mitre.orghttps://security.gentoo.org/glsa/201710-20
cve@mitre.orghttps://www.exploit-db.com/exploits/40921/
cve@mitre.orghttps://www.nagios.org/projects/nagios-core/history/4x/Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2017-0211.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2017-0212.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2017-0213.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2017-0214.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2017-0258.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2017-0259.html
af854a3a-2127-422b-91ae-364da2661108http://seclists.org/fulldisclosure/2016/Dec/58Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/94919Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id/1037487
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=1402869Issue Tracking
af854a3a-2127-422b-91ae-364da2661108https://github.com/NagiosEnterprises/nagioscore/commit/c29557dec91eba2306f5fb11b8da4474ba63f8c4Issue Tracking, Patch
af854a3a-2127-422b-91ae-364da2661108https://legalhackers.com/advisories/Nagios-Exploit-Root-PrivEsc-CVE-2016-9566.htmlExploit, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2018/12/msg00014.html
af854a3a-2127-422b-91ae-364da2661108https://security.gentoo.org/glsa/201612-51
af854a3a-2127-422b-91ae-364da2661108https://security.gentoo.org/glsa/201702-26
af854a3a-2127-422b-91ae-364da2661108https://security.gentoo.org/glsa/201710-20
af854a3a-2127-422b-91ae-364da2661108https://www.exploit-db.com/exploits/40921/
af854a3a-2127-422b-91ae-364da2661108https://www.nagios.org/projects/nagios-core/history/4x/Vendor Advisory
Impacted products
Vendor Product Version
nagios nagios *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:nagios:nagios:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C4E32CA-1439-4B07-BBB2-38DCD001BD6A",
              "versionEndIncluding": "4.2.3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "base/logging.c in Nagios Core before 4.2.4 allows local users with access to an account in the nagios group to gain root privileges via a symlink attack on the log file.  NOTE: this can be leveraged by remote attackers using CVE-2016-9565."
    },
    {
      "lang": "es",
      "value": "base/logging.c en Nagios Core en versiones anteriores a 4.2.4 permite a usuarios locales con acceso a una cuenta en el grupo nagios obtener privilegios a trav\u00e9s de un ataque de symlink al archivo de inicio de sesi\u00f3n. NOTA: esto puede ser aprovechado por atacantes remotos usando CVE-2016-9565."
    }
  ],
  "id": "CVE-2016-9566",
  "lastModified": "2024-11-21T03:01:24.177",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.2,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2016-12-15T22:59:00.537",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://rhn.redhat.com/errata/RHSA-2017-0211.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://rhn.redhat.com/errata/RHSA-2017-0212.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://rhn.redhat.com/errata/RHSA-2017-0213.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://rhn.redhat.com/errata/RHSA-2017-0214.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://rhn.redhat.com/errata/RHSA-2017-0258.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://rhn.redhat.com/errata/RHSA-2017-0259.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://seclists.org/fulldisclosure/2016/Dec/58"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/94919"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id/1037487"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Issue Tracking"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1402869"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Issue Tracking",
        "Patch"
      ],
      "url": "https://github.com/NagiosEnterprises/nagioscore/commit/c29557dec91eba2306f5fb11b8da4474ba63f8c4"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://legalhackers.com/advisories/Nagios-Exploit-Root-PrivEsc-CVE-2016-9566.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://lists.debian.org/debian-lts-announce/2018/12/msg00014.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://security.gentoo.org/glsa/201612-51"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://security.gentoo.org/glsa/201702-26"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://security.gentoo.org/glsa/201710-20"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.exploit-db.com/exploits/40921/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.nagios.org/projects/nagios-core/history/4x/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2017-0211.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2017-0212.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2017-0213.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2017-0214.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2017-0258.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2017-0259.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://seclists.org/fulldisclosure/2016/Dec/58"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/94919"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id/1037487"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1402869"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Patch"
      ],
      "url": "https://github.com/NagiosEnterprises/nagioscore/commit/c29557dec91eba2306f5fb11b8da4474ba63f8c4"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://legalhackers.com/advisories/Nagios-Exploit-Root-PrivEsc-CVE-2016-9566.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.debian.org/debian-lts-announce/2018/12/msg00014.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://security.gentoo.org/glsa/201612-51"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://security.gentoo.org/glsa/201702-26"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://security.gentoo.org/glsa/201710-20"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.exploit-db.com/exploits/40921/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.nagios.org/projects/nagios-core/history/4x/"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-59"
        },
        {
          "lang": "en",
          "value": "CWE-264"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-03-16 16:15
Modified
2024-11-21 05:36
Summary
Nagios Log Server 2.1.3 allows XSS by visiting /profile and entering a crafted name field that is mishandled on the /admin/users page. Any malicious user with limited access can store an XSS payload in his Name. When any admin views this, the XSS is triggered.
Impacted products
Vendor Product Version
nagios nagios 2.1.3



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "750FFD82-3737-458C-941C-5E2864DEFB76",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Nagios Log Server 2.1.3 allows XSS by visiting /profile and entering a crafted name field that is mishandled on the /admin/users page. Any malicious user with limited access can store an XSS payload in his Name. When any admin views this, the XSS is triggered."
    },
    {
      "lang": "es",
      "value": "Nagios Log Server versi\u00f3n 2.1.3, permite un ataque de tipo XSS al visitar /profile e ingresar un campo name dise\u00f1ado que se maneja inapropiadamente en la p\u00e1gina /admin/users. Cualquier usuario malicioso con acceso limitado puede almacenar una carga \u00fatil de tipo XSS en su . Cuando cualquier administrador visualiza esto, es desencadenado el ataque de tipo XSS."
    }
  ],
  "id": "CVE-2020-6586",
  "lastModified": "2024-11-21T05:36:00.933",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "NONE",
          "baseScore": 3.5,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 6.8,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.3,
        "impactScore": 2.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-03-16T16:15:14.517",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Release Notes",
        "Vendor Advisory"
      ],
      "url": "https://assets.nagios.com/downloads/nagios-log-server/CHANGES.TXT"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://medium.com/%40fixitt6/multiple-vulnerabilities-in-nagios-log-server-2-1-3-af7c160edc60"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Product"
      ],
      "url": "https://www.nagios.com/products/nagios-log-server/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes",
        "Vendor Advisory"
      ],
      "url": "https://assets.nagios.com/downloads/nagios-log-server/CHANGES.TXT"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://medium.com/%40fixitt6/multiple-vulnerabilities-in-nagios-log-server-2-1-3-af7c160edc60"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Product"
      ],
      "url": "https://www.nagios.com/products/nagios-log-server/"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2002-12-31 05:00
Modified
2024-11-20 23:42
Severity ?
Summary
Nagios 1.0b1 through 1.0b3 allows remote attackers to execute arbitrary commands via shell metacharacters in plugin output.
Impacted products
Vendor Product Version
nagios nagios 1.0_b1
nagios nagios 1.0_b2
nagios nagios 1.0_b3



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:nagios:nagios:1.0_b1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C178226A-CBE8-4ECB-BDA7-1E86C61D2A82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:1.0_b2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B75383C-C37C-485F-B6D2-B4A7F2F7B3E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:1.0_b3:*:*:*:*:*:*:*",
              "matchCriteriaId": "67AF4805-B2EE-40F5-8D92-D2953866AD6B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Nagios 1.0b1 through 1.0b3 allows remote attackers to execute arbitrary commands via shell metacharacters in plugin output."
    }
  ],
  "id": "CVE-2002-1959",
  "lastModified": "2024-11-20T23:42:31.570",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": true,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2002-12-31T05:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.iss.net/security_center/static/9508.php"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.nagios.org/changelog.php"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/5174"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.iss.net/security_center/static/9508.php"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.nagios.org/changelog.php"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/5174"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-02-28 14:15
Modified
2024-11-21 04:42
Summary
UNIX Symbolic Link (Symlink) Following vulnerability in the cronjob shipped with nagios of SUSE Linux Enterprise Server 12, SUSE Linux Enterprise Server 11; openSUSE Factory allows local attackers to cause cause DoS or potentially escalate privileges by winning a race. This issue affects: SUSE Linux Enterprise Server 12 nagios version 3.5.1-5.27 and prior versions. SUSE Linux Enterprise Server 11 nagios version 3.0.6-1.25.36.3.1 and prior versions. openSUSE Factory nagios version 4.4.5-2.1 and prior versions.
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:nagios:nagios:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E4F5BA0-53D3-48CD-B62C-34655A0DC5BF",
              "versionEndExcluding": "3.5.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*",
              "matchCriteriaId": "15FC9014-BD85-4382-9D04-C0703E901D7A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:nagios:nagios:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3832D4B6-C269-401F-8A93-2DB052196D07",
              "versionEndExcluding": "3.0.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*",
              "matchCriteriaId": "F13F07CC-739B-465C-9184-0E9D708BD4C7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "40513095-7E6E-46B3-B604-C926F1BA3568",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "UNIX Symbolic Link (Symlink) Following vulnerability in the cronjob shipped with nagios of SUSE Linux Enterprise Server 12, SUSE Linux Enterprise Server 11; openSUSE Factory allows local attackers to cause cause DoS or potentially escalate privileges by winning a race. This issue affects: SUSE Linux Enterprise Server 12 nagios version 3.5.1-5.27 and prior versions. SUSE Linux Enterprise Server 11 nagios version 3.0.6-1.25.36.3.1 and prior versions. openSUSE Factory nagios version 4.4.5-2.1 and prior versions."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad de tipo UNIX Symbolic Link (Symlink) Following en el cronjob enviado con nagios de SUSE Linux Enterprise Server versi\u00f3n 12, SUSE Linux Enterprise Server versi\u00f3n 11; openSUSE Factory, permite a atacantes locales causar una DoS o escalar potencialmente privilegios al ganar una carrera. Este problema afecta: SUSE Linux Enterprise Server versi\u00f3n 12 nagios versi\u00f3n 3.5.1-5.27 y versiones anteriores. SUSE Linux Enterprise Server 11 nagios versi\u00f3n 3.0.6-1.25.36.3.1 y versiones anteriores. openSUSE Factory nagios versi\u00f3n 4.4.5-2.1 y versiones anteriores."
    }
  ],
  "id": "CVE-2019-3698",
  "lastModified": "2024-11-21T04:42:21.410",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 6.9,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 3.4,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "LOCAL",
          "availabilityImpact": "LOW",
          "baseScore": 5.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:L",
          "version": "3.1"
        },
        "exploitabilityScore": 1.4,
        "impactScore": 4.2,
        "source": "meissner@suse.de",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.0,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.0,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-02-28T14:15:09.687",
  "references": [
    {
      "source": "meissner@suse.de",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00014.html"
    },
    {
      "source": "meissner@suse.de",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00022.html"
    },
    {
      "source": "meissner@suse.de",
      "tags": [
        "Exploit",
        "Issue Tracking",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://bugzilla.suse.com/show_bug.cgi?id=1156309"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00014.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00022.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Issue Tracking",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://bugzilla.suse.com/show_bug.cgi?id=1156309"
    }
  ],
  "sourceIdentifier": "meissner@suse.de",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-59"
        }
      ],
      "source": "meissner@suse.de",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-59"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2014-02-10 23:55
Modified
2024-11-21 01:51
Severity ?
Summary
status.cgi in Nagios 4.0 before 4.0 beta4 and 3.x before 3.5.1 does not properly restrict access to certain users that are a contact for a service, which allows remote authenticated users to obtain sensitive information about hostnames via the servicegroup (1) overview, (2) summary, or (3) grid style in status.cgi. NOTE: this behavior is by design in most 3.x versions, but the upstream vendor "decided to change it for Nagios 4" and 3.5.1.
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDCA77EF-1020-4068-9CDC-5CF3B0CD66A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:alpha1:*:*:*:*:*:*",
              "matchCriteriaId": "751C46D5-877F-454B-8488-BBCA10CA4930",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:alpha2:*:*:*:*:*:*",
              "matchCriteriaId": "F4754494-17BE-496E-A7B8-453B3028CC45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:alpha3:*:*:*:*:*:*",
              "matchCriteriaId": "CD15E8FA-04D3-4625-BEA5-9F5CC0337699",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:alpha4:*:*:*:*:*:*",
              "matchCriteriaId": "713C5F3E-AA57-4F52-AC0A-9B1F25C25580",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:alpha5:*:*:*:*:*:*",
              "matchCriteriaId": "690EA084-9E58-4226-B490-2969E6C6BEBC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "0AFABA9F-4A45-4150-AED1-897267076A32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "830BB564-82FD-4519-A8EA-DCDF74F2BC54",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "9A975310-9591-4EBF-B987-CA43433B4C54",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "8653D6A2-4B5B-4F1D-A898-8F81F29C6FC2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:beta5:*:*:*:*:*:*",
              "matchCriteriaId": "D18649FF-8838-432E-93B8-3F8B82B0DEA9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:beta6:*:*:*:*:*:*",
              "matchCriteriaId": "9375EA90-0763-4817-8C7D-2D7E116E043F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:beta7:*:*:*:*:*:*",
              "matchCriteriaId": "C02C2F95-2AC2-4E0C-B5D0-785CDF1EDB85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "12E7BC34-65F0-4DD6-8809-F05320955479",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "390CFA92-68AE-4DE9-A199-1B7290A82168",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "1E56F249-3E6A-4764-8CAE-D3E5B6A86AB3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "953745B7-1381-47F5-8012-E699EFA065CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "87A8A3DA-61AF-4369-ACB0-7D54EEB1DAA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "40B7525F-EEE1-4537-BCE6-15DF3E348FEF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B831C72-C932-4B8C-8B16-C3BC2672AF98",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC5BB3C9-BBC6-43D8-830A-38020F50B148",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC9E1C24-9907-44F4-9166-5C679F05DF12",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8BE6777-6CA9-443E-A2A5-CCD3ED7EAECF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F8F3B76-7443-437E-B908-95D0EF0214C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF23E8B9-6F07-471A-8332-E6B35DFCE37A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EEFF0B7-60B4-4022-9EF5-101B707BAC6C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BC14996-78F9-4A95-9750-1229E57C19C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4C3195A-7B72-45BA-8F83-6B0FE00D3B8B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4584E0CD-A0F9-4AD1-ACC5-800E38F5DD59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "166D983D-2D1B-45D4-8ACF-68ED11BBF5BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "68D2FFFD-9A12-4230-90F6-AC5E3676FD04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "21A1C2E3-9E5C-4F00-8393-33DAC6765332",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2C8C695-EBA7-4FD0-BBD0-F339757559EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "B06E7504-A5C5-42F3-B325-EE9905A9783A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B555161-CF36-47FE-BDAA-C45E8C4B0E33",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1497A778-52F2-4558-B0B4-833FB8D76036",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:4.0.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "834089CF-70FA-4785-9CE0-01CCD5707C19",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:4.0.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "E610186F-91AC-41A6-AC3F-DBFF8EC17316",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:4.0.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "F8911118-ABD8-4698-9E2D-80059F3A5B32",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "status.cgi in Nagios 4.0 before 4.0 beta4 and 3.x before 3.5.1 does not properly restrict access to certain users that are a contact for a service, which allows remote authenticated users to obtain sensitive information about hostnames via the servicegroup (1) overview, (2) summary, or (3) grid style in status.cgi.  NOTE: this behavior is by design in most 3.x versions, but the upstream vendor \"decided to change it for Nagios 4\" and 3.5.1."
    },
    {
      "lang": "es",
      "value": "status.cgi en Nagios 4.0 anterior a 4.0 beta4 y 3.x anterior a 3.5.1 no restringe adecuadamente el acceso a ciertos usuarios que son un contacto para un servicio, lo que permite a usuarios remotos autenticados obtener informaci\u00f3n sensible sobre nombres de host a trav\u00e9s del Servicegroup (1) Overview, (2) Summary o (3) Grid Style en status.cgi.  NOTA: esta conducta es por dise\u00f1o en la mayor\u00eda de las versiones 3.x, no obstante el fabricante \"decidi\u00f3 cambiarlo por Nagios 4\" y 3.5.1."
    }
  ],
  "id": "CVE-2013-2214",
  "lastModified": "2024-11-21T01:51:15.910",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "NONE",
          "baseScore": 4.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-02-10T23:55:04.963",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-07/msg00029.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-07/msg00031.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://seclists.org/oss-sec/2013/q2/619"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://seclists.org/oss-sec/2013/q2/622"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tracker.nagios.org/view.php?id=456"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-07/msg00029.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-07/msg00031.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://seclists.org/oss-sec/2013/q2/619"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://seclists.org/oss-sec/2013/q2/622"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://tracker.nagios.org/view.php?id=456"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-264"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2011-05-03 19:55
Modified
2024-11-21 01:26
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in statusmap.c in statusmap.cgi in Nagios 3.2.3 and earlier allows remote attackers to inject arbitrary web script or HTML via the layer parameter.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:nagios:nagios:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FA76BE8-5C16-4715-9404-5A0AAB73EBCE",
              "versionEndIncluding": "3.2.3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CA91B05-9578-46D8-A21C-4E3C4AB4936A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:1.0_b1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C178226A-CBE8-4ECB-BDA7-1E86C61D2A82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:1.0_b2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B75383C-C37C-485F-B6D2-B4A7F2F7B3E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:1.0_b3:*:*:*:*:*:*:*",
              "matchCriteriaId": "67AF4805-B2EE-40F5-8D92-D2953866AD6B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:1.0b1:*:*:*:*:*:*:*",
              "matchCriteriaId": "52432776-C9C6-4CA7-B3D9-87513CBA5716",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:1.0b2:*:*:*:*:*:*:*",
              "matchCriteriaId": "601958D5-B393-4EFA-9A6F-A5A04A95F4BB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:1.0b3:*:*:*:*:*:*:*",
              "matchCriteriaId": "99B2E88A-A611-43C5-8037-411D6B78EC03",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:1.0b4:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DCEFBFC-38BD-4F78-B068-1A90C6199CEB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:1.0b5:*:*:*:*:*:*:*",
              "matchCriteriaId": "E61ACC55-1002-4FA3-8E5A-52041CE5DCD9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:1.0b6:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C773265-0BE7-463A-8E24-84D804F14AF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A847327-D74E-460C-9F6F-E04C9B77E0C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F7425E3-F152-439B-B95F-5160E4593DBA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5911624-5BD8-4A40-B417-FCD926D352BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF45013F-A844-4726-8B2A-EF602A3BC4C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:1.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0879A39F-7C92-4FD3-9FEF-2E7C4F2C0444",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A91E463-D239-4853-8A63-E01EE7DB319F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.0b1:*:*:*:*:*:*:*",
              "matchCriteriaId": "239CAF7F-E9BF-4D0F-BB99-EF51E1366516",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.0b2:*:*:*:*:*:*:*",
              "matchCriteriaId": "738DF14D-A716-46F0-87AC-2DB2F1E44594",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.0b3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E8E1234-9F0D-4E6F-BF58-5DAE8E41DB85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.0b4:*:*:*:*:*:*:*",
              "matchCriteriaId": "0073F69B-C5FA-470A-BA95-9C4E8033F5CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.0b5:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAA7C5B6-C13D-4814-AA7B-444CF12E4DEF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.0b6:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1209D1C-DD27-41FC-8DAF-BFC0B4B1D602",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.0rc1:*:*:*:*:*:*:*",
              "matchCriteriaId": "39551FFC-E1F0-4D45-ADA6-AB3E74BB576D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.0rc2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BED52AA-BE20-447C-8896-4B591C42F66A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "82DE68E3-7003-4675-96A9-6F7308E1E39C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E3F8DC3-2F34-4E11-A796-4EA7CB17FDDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "7ADCBA8C-06DB-4D85-AEED-807E64A29DFB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D3EE2D7-BD17-4C37-ABA3-79FCE8328EFF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "927B8496-720D-4B15-A12E-52169AFB38D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F9E80B2-E349-488F-A870-9BD50D47A672",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "1121E86B-13EB-4DE3-816A-002C6DC15A70",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C3374C3-9F57-4014-8712-DDDAB52998FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5D4F00F-C732-477B-988A-25F8E8D32D07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7A5D5AC-9E4C-4F3B-A16A-C6DD18DD8D51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "725F9938-0A5C-4A59-BFA4-C58044DE26DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDCA77EF-1020-4068-9CDC-5CF3B0CD66A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:alpha1:*:*:*:*:*:*",
              "matchCriteriaId": "751C46D5-877F-454B-8488-BBCA10CA4930",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:alpha2:*:*:*:*:*:*",
              "matchCriteriaId": "F4754494-17BE-496E-A7B8-453B3028CC45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:alpha3:*:*:*:*:*:*",
              "matchCriteriaId": "CD15E8FA-04D3-4625-BEA5-9F5CC0337699",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:alpha4:*:*:*:*:*:*",
              "matchCriteriaId": "713C5F3E-AA57-4F52-AC0A-9B1F25C25580",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "0AFABA9F-4A45-4150-AED1-897267076A32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "830BB564-82FD-4519-A8EA-DCDF74F2BC54",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "9A975310-9591-4EBF-B987-CA43433B4C54",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "8653D6A2-4B5B-4F1D-A898-8F81F29C6FC2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:beta5:*:*:*:*:*:*",
              "matchCriteriaId": "D18649FF-8838-432E-93B8-3F8B82B0DEA9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:beta6:*:*:*:*:*:*",
              "matchCriteriaId": "9375EA90-0763-4817-8C7D-2D7E116E043F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:beta7:*:*:*:*:*:*",
              "matchCriteriaId": "C02C2F95-2AC2-4E0C-B5D0-785CDF1EDB85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "12E7BC34-65F0-4DD6-8809-F05320955479",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "390CFA92-68AE-4DE9-A199-1B7290A82168",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "1E56F249-3E6A-4764-8CAE-D3E5B6A86AB3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "953745B7-1381-47F5-8012-E699EFA065CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "87A8A3DA-61AF-4369-ACB0-7D54EEB1DAA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "40B7525F-EEE1-4537-BCE6-15DF3E348FEF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B831C72-C932-4B8C-8B16-C3BC2672AF98",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC5BB3C9-BBC6-43D8-830A-38020F50B148",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC9E1C24-9907-44F4-9166-5C679F05DF12",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8BE6777-6CA9-443E-A2A5-CCD3ED7EAECF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F8F3B76-7443-437E-B908-95D0EF0214C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF23E8B9-6F07-471A-8332-E6B35DFCE37A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EEFF0B7-60B4-4022-9EF5-101B707BAC6C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BC14996-78F9-4A95-9750-1229E57C19C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4C3195A-7B72-45BA-8F83-6B0FE00D3B8B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site scripting (XSS) vulnerability in statusmap.c in statusmap.cgi in Nagios 3.2.3 and earlier allows remote attackers to inject arbitrary web script or HTML via the layer parameter."
    },
    {
      "lang": "es",
      "value": "vulnerabilidad de ejecuci\u00f3n de secuencias de comandos en sitios cruzados (XSS) en statusmap.c en statusmap.cgi en Nagios v3.2.3 y anteriores, permite a atacantes remotos inyectar secuencias de comandos web o HTML a trav\u00e9s del par\u00e1metro de la capa."
    }
  ],
  "id": "CVE-2011-1523",
  "lastModified": "2024-11-21T01:26:30.627",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2011-05-03T19:55:10.247",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://openwall.com/lists/oss-security/2011/03/25/3"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://openwall.com/lists/oss-security/2011/03/28/4"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/43287"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/44974"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securityreason.com/securityalert/8241"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://tracker.nagios.org/view.php?id=207"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.rul3z.de/advisories/SSCHADV2011-002.txt"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ubuntu.com/usn/USN-1151-1"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=690877"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://openwall.com/lists/oss-security/2011/03/25/3"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://openwall.com/lists/oss-security/2011/03/28/4"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/43287"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/44974"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securityreason.com/securityalert/8241"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://tracker.nagios.org/view.php?id=207"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.rul3z.de/advisories/SSCHADV2011-002.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-1151-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=690877"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2011-06-14 17:55
Modified
2024-11-21 01:27
Severity ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in config.c in config.cgi in (1) Nagios 3.2.3 and (2) Icinga before 1.4.1 allow remote attackers to inject arbitrary web script or HTML via the expand parameter, as demonstrated by an (a) command action or a (b) hosts action.
References
secalert@redhat.comhttp://archives.neohapsis.com/archives/bugtraq/2011-06/0017.html
secalert@redhat.comhttp://archives.neohapsis.com/archives/bugtraq/2011-06/0018.htmlExploit, Patch
secalert@redhat.comhttp://secunia.com/advisories/44974
secalert@redhat.comhttp://securityreason.com/securityalert/8274
secalert@redhat.comhttp://tracker.nagios.org/view.php?id=224Exploit, Patch, Vendor Advisory
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2011/06/01/10
secalert@redhat.comhttp://www.openwall.com/lists/oss-security/2011/06/02/6
secalert@redhat.comhttp://www.rul3z.de/advisories/SSCHADV2011-005.txtExploit, Patch
secalert@redhat.comhttp://www.rul3z.de/advisories/SSCHADV2011-006.txtExploit, Patch
secalert@redhat.comhttp://www.securityfocus.com/bid/48087
secalert@redhat.comhttp://www.ubuntu.com/usn/USN-1151-1
secalert@redhat.comhttps://bugzilla.redhat.com/show_bug.cgi?id=709871
secalert@redhat.comhttps://dev.icinga.org/issues/1605Exploit, Patch, Vendor Advisory
secalert@redhat.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/67797
af854a3a-2127-422b-91ae-364da2661108http://archives.neohapsis.com/archives/bugtraq/2011-06/0017.html
af854a3a-2127-422b-91ae-364da2661108http://archives.neohapsis.com/archives/bugtraq/2011-06/0018.htmlExploit, Patch
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/44974
af854a3a-2127-422b-91ae-364da2661108http://securityreason.com/securityalert/8274
af854a3a-2127-422b-91ae-364da2661108http://tracker.nagios.org/view.php?id=224Exploit, Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2011/06/01/10
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2011/06/02/6
af854a3a-2127-422b-91ae-364da2661108http://www.rul3z.de/advisories/SSCHADV2011-005.txtExploit, Patch
af854a3a-2127-422b-91ae-364da2661108http://www.rul3z.de/advisories/SSCHADV2011-006.txtExploit, Patch
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/48087
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-1151-1
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=709871
af854a3a-2127-422b-91ae-364da2661108https://dev.icinga.org/issues/1605Exploit, Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/67797
Impacted products
Vendor Product Version
icinga icinga *
icinga icinga 0.8.0
icinga icinga 0.8.1
icinga icinga 0.8.2
icinga icinga 0.8.3
icinga icinga 0.8.4
icinga icinga 1.0
icinga icinga 1.0
icinga icinga 1.0.1
icinga icinga 1.0.2
icinga icinga 1.0.3
icinga icinga 1.2.0
icinga icinga 1.2.1
icinga icinga 1.3.0
icinga icinga 1.3.1
nagios nagios 3.2.3



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:icinga:icinga:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "10436D2F-3CCB-4ED6-9327-3CD6BA5E43D5",
              "versionEndIncluding": "1.4.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:icinga:icinga:0.8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D65D942-0560-42B0-BAF8-D6B8C4237558",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:icinga:icinga:0.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CF3E50F-0DF1-44C1-9E7D-E3AE9BBAC5C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:icinga:icinga:0.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F87DFD18-B038-4E18-889A-FCADDC7E9C23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:icinga:icinga:0.8.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9B482D1-BB5D-41CC-A330-214F1EC9BD43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:icinga:icinga:0.8.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "6EB99BAF-6CF9-4F61-A86B-91F4DAE20F58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:icinga:icinga:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B65BD554-2D66-4237-8829-EC5CFD374E4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:icinga:icinga:1.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "51CBC3F4-EB90-462D-B840-71DB9E8E3667",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:icinga:icinga:1.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "719B37F6-4D3A-4922-B58D-536A775D42D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:icinga:icinga:1.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7890303A-21C3-47B8-86AF-1B07A01C9AE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:icinga:icinga:1.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "CED3BF83-92C3-4324-BC6E-722309A8787B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:icinga:icinga:1.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5F7F451-E7AA-4C84-874D-7C7E5C162DEA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:icinga:icinga:1.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5250AED-B86C-4415-A274-7DD9659F40D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:icinga:icinga:1.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6E333C3-C264-41C9-B358-97A3F62C649D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:icinga:icinga:1.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "BEAD9B4E-66B1-4E82-8A6F-B46A4F0A61D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4584E0CD-A0F9-4AD1-ACC5-800E38F5DD59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple cross-site scripting (XSS) vulnerabilities in config.c in config.cgi in (1) Nagios 3.2.3 and (2) Icinga before 1.4.1 allow remote attackers to inject arbitrary web script or HTML via the expand parameter, as demonstrated by an (a) command action or a (b) hosts action."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples vulnerabilidades de ejecuci\u00f3n de secuencias de comandos en sitios cruzados (XSS) en config.c en config.cgi en (1) Nagios v3.2.3 y (2) Icinga antes de v1.4.1 permite a atacantes remotos inyectar secuencias de comandos web o HTML a trav\u00e9s del par\u00e1metro expand, como se demuestra por (a) la acci\u00f3n command o (b) una acci\u00f3n hosts."
    }
  ],
  "id": "CVE-2011-2179",
  "lastModified": "2024-11-21T01:27:45.740",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2011-06-14T17:55:06.437",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://archives.neohapsis.com/archives/bugtraq/2011-06/0017.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://archives.neohapsis.com/archives/bugtraq/2011-06/0018.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/44974"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://securityreason.com/securityalert/8274"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://tracker.nagios.org/view.php?id=224"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.openwall.com/lists/oss-security/2011/06/01/10"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.openwall.com/lists/oss-security/2011/06/02/6"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://www.rul3z.de/advisories/SSCHADV2011-005.txt"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://www.rul3z.de/advisories/SSCHADV2011-006.txt"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/bid/48087"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.ubuntu.com/usn/USN-1151-1"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=709871"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://dev.icinga.org/issues/1605"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67797"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://archives.neohapsis.com/archives/bugtraq/2011-06/0017.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://archives.neohapsis.com/archives/bugtraq/2011-06/0018.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/44974"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securityreason.com/securityalert/8274"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://tracker.nagios.org/view.php?id=224"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2011/06/01/10"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2011/06/02/6"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://www.rul3z.de/advisories/SSCHADV2011-005.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://www.rul3z.de/advisories/SSCHADV2011-006.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/48087"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-1151-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=709871"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://dev.icinga.org/issues/1605"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67797"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2014-02-28 15:13
Modified
2024-11-21 02:05
Severity ?
Summary
Stack-based buffer overflow in the cmd_submitf function in cgi/cmd.c in Nagios Core, possibly 4.0.3rc1 and earlier, and Icinga before 1.8.6, 1.9 before 1.9.5, and 1.10 before 1.10.3 allows remote attackers to cause a denial of service (segmentation fault) via a long message to cmd.cgi.
Impacted products
Vendor Product Version
icinga icinga *
icinga icinga 1.8.0
icinga icinga 1.8.1
icinga icinga 1.8.2
icinga icinga 1.8.3
icinga icinga 1.8.4
icinga icinga 1.9.0
icinga icinga 1.9.1
icinga icinga 1.9.2
icinga icinga 1.9.3
icinga icinga 1.9.4
icinga icinga 1.10.0
icinga icinga 1.10.1
icinga icinga 1.10.2
nagios nagios *
nagios nagios 4.0.0
nagios nagios 4.0.0
nagios nagios 4.0.0
nagios nagios 4.0.0
nagios nagios 4.0.2



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:icinga:icinga:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E3B5ADE-C251-4A5B-A3E1-323BD96F1242",
              "versionEndIncluding": "1.8.5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:icinga:icinga:1.8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C1DE372-E2A4-4C4B-B85C-104D84696090",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:icinga:icinga:1.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2B3410C-6FF8-4485-AC06-BBA15A4BC9E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:icinga:icinga:1.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "27F6ACDE-05A0-4688-97FF-EB4C23E8F52D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:icinga:icinga:1.8.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "6333E91A-6315-437C-A600-0B824976FBB8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:icinga:icinga:1.8.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "332D5DB3-58A3-41BD-907B-6959B07F643B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:icinga:icinga:1.9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8BCA88C-5AA9-4C0D-9FA3-80BA8FBBD521",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:icinga:icinga:1.9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "821C9240-E41E-4BCC-910E-63304F8E3790",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:icinga:icinga:1.9.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADFD2677-6BF6-4985-B915-A9395B4A620E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:icinga:icinga:1.9.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "FCF96645-E8B6-443A-8761-6F879042F689",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:icinga:icinga:1.9.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "1912AB1A-C7A5-403A-873A-52FF7D2C5BDE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:icinga:icinga:1.10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "21460019-53D0-440D-A0A6-4B778B478B4E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:icinga:icinga:1.10.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "30895AD2-198A-4329-9987-347AABDD7C10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:icinga:icinga:1.10.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "2179AA2D-8FAF-4E1E-8F1F-64BBDEFABB4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:*:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "188CC315-C3B3-467E-BDEC-2C4CAA4B6470",
              "versionEndIncluding": "4.0.3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:4.0.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "834089CF-70FA-4785-9CE0-01CCD5707C19",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:4.0.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "E610186F-91AC-41A6-AC3F-DBFF8EC17316",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:4.0.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "F8911118-ABD8-4698-9E2D-80059F3A5B32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:4.0.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "B737174D-CA20-4DE4-8147-6317E7A51396",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:4.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEE550BE-D6A7-4DB8-9CF1-A265085EC388",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Stack-based buffer overflow in the cmd_submitf function in cgi/cmd.c in Nagios Core, possibly 4.0.3rc1 and earlier, and Icinga before 1.8.6, 1.9 before 1.9.5, and 1.10 before 1.10.3 allows remote attackers to cause a denial of service (segmentation fault) via a long message to cmd.cgi."
    },
    {
      "lang": "es",
      "value": "Desbordamiento de buffer basado en pila en la funci\u00f3n cmd_submitf en cgi/cmd.c en Nagios Core, posiblemente 4.0.3rc1 y anteriores e Icinga anterior a 1.8.6, 1.9 anterior a 1.9.5 y 1.10 anterior a 1.10.3 permite a atacantes remotos causar una denegaci\u00f3n de servicio (fallo de segmentaci\u00f3n) a trav\u00e9s de un mensaje largo hacia cmd.cgi."
    }
  ],
  "id": "CVE-2014-1878",
  "lastModified": "2024-11-21T02:05:11.617",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-02-28T15:13:04.063",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://lists.opensuse.org/opensuse-updates/2014-04/msg00033.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/57024"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/65605"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1066578"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "https://dev.icinga.org/issues/5434"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://lists.debian.org/debian-lts-announce/2018/12/msg00014.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.icinga.org/2014/02/11/bugfix-releases-1-10-3-1-9-5-1-8-6"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2014-04/msg00033.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/57024"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/65605"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1066578"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "https://dev.icinga.org/issues/5434"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.debian.org/debian-lts-announce/2018/12/msg00014.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.icinga.org/2014/02/11/bugfix-releases-1-10-3-1-9-5-1-8-6"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2006-05-03 21:02
Modified
2024-11-21 00:10
Severity ?
Summary
Buffer overflow in CGI scripts in Nagios 1.x before 1.4 and 2.x before 2.3 allows remote attackers to execute arbitrary code via a negative content length (Content-Length) HTTP header.
References
secalert@redhat.comhttp://secunia.com/advisories/19991
secalert@redhat.comhttp://secunia.com/advisories/19998
secalert@redhat.comhttp://secunia.com/advisories/20013
secalert@redhat.comhttp://secunia.com/advisories/20215
secalert@redhat.comhttp://secunia.com/advisories/20247
secalert@redhat.comhttp://www.debian.org/security/2006/dsa-1072
secalert@redhat.comhttp://www.gentoo.org/security/en/glsa/glsa-200605-07.xml
secalert@redhat.comhttp://www.nagios.org/development/changelog.php
secalert@redhat.comhttp://www.novell.com/linux/security/advisories/2006_05_19.html
secalert@redhat.comhttp://www.securityfocus.com/bid/17879
secalert@redhat.comhttp://www.vupen.com/english/advisories/2006/1662
secalert@redhat.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/26253
secalert@redhat.comhttps://sourceforge.net/mailarchive/forum.php?thread_id=10297806&forum_id=7890
secalert@redhat.comhttps://usn.ubuntu.com/282-1/
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/19991
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/19998
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/20013
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/20215
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/20247
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2006/dsa-1072
af854a3a-2127-422b-91ae-364da2661108http://www.gentoo.org/security/en/glsa/glsa-200605-07.xml
af854a3a-2127-422b-91ae-364da2661108http://www.nagios.org/development/changelog.php
af854a3a-2127-422b-91ae-364da2661108http://www.novell.com/linux/security/advisories/2006_05_19.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/17879
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/1662
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/26253
af854a3a-2127-422b-91ae-364da2661108https://sourceforge.net/mailarchive/forum.php?thread_id=10297806&forum_id=7890
af854a3a-2127-422b-91ae-364da2661108https://usn.ubuntu.com/282-1/
Impacted products
Vendor Product Version
nagios nagios *
nagios nagios *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:nagios:nagios:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "195E2FFA-4AA5-498A-AABD-225C2175918A",
              "versionEndIncluding": "1.3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B903D35B-D120-4E63-855F-442F574F9C16",
              "versionEndIncluding": "2.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Buffer overflow in CGI scripts in Nagios 1.x before 1.4 and 2.x before 2.3 allows remote attackers to execute arbitrary code via a negative content length (Content-Length) HTTP header."
    }
  ],
  "evaluatorSolution": "Upgrade to versions 1.4 and 2.3",
  "id": "CVE-2006-2162",
  "lastModified": "2024-11-21T00:10:41.900",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2006-05-03T21:02:00.000",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/19991"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/19998"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/20013"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/20215"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://secunia.com/advisories/20247"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.debian.org/security/2006/dsa-1072"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200605-07.xml"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.nagios.org/development/changelog.php"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.novell.com/linux/security/advisories/2006_05_19.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/bid/17879"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.vupen.com/english/advisories/2006/1662"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26253"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://sourceforge.net/mailarchive/forum.php?thread_id=10297806\u0026forum_id=7890"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://usn.ubuntu.com/282-1/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/19991"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/19998"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/20013"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/20215"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/20247"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2006/dsa-1072"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200605-07.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.nagios.org/development/changelog.php"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.novell.com/linux/security/advisories/2006_05_19.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/17879"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/1662"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26253"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://sourceforge.net/mailarchive/forum.php?thread_id=10297806\u0026forum_id=7890"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://usn.ubuntu.com/282-1/"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2013-01-22 23:55
Modified
2024-11-21 01:45
Severity ?
Summary
Multiple stack-based buffer overflows in the get_history function in history.cgi in Nagios Core before 3.4.4, and Icinga 1.6.x before 1.6.2, 1.7.x before 1.7.4, and 1.8.x before 1.8.4, might allow remote attackers to execute arbitrary code via a long (1) host_name variable (host parameter) or (2) svc_description variable.
References
secalert@redhat.comhttp://lists.grok.org.uk/pipermail/full-disclosure/2012-December/089125.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-updates/2013-01/msg00033.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-updates/2013-01/msg00060.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-updates/2013-01/msg00077.html
secalert@redhat.comhttp://lists.opensuse.org/opensuse-updates/2013-01/msg00088.html
secalert@redhat.comhttp://secunia.com/advisories/51863Vendor Advisory
secalert@redhat.comhttp://www.debian.org/security/2013/dsa-2616
secalert@redhat.comhttp://www.debian.org/security/2013/dsa-2653
secalert@redhat.comhttp://www.exploit-db.com/exploits/24084Exploit
secalert@redhat.comhttp://www.exploit-db.com/exploits/24159Exploit
secalert@redhat.comhttp://www.nagios.org/projects/nagioscore/history/core-3x
secalert@redhat.comhttp://www.osvdb.org/89170
secalert@redhat.comhttp://www.securityfocus.com/bid/56879Exploit
secalert@redhat.comhttps://bugzilla.redhat.com/show_bug.cgi?id=893269
secalert@redhat.comhttps://dev.icinga.org/issues/3532Vendor Advisory
secalert@redhat.comhttps://www.icinga.org/2013/01/14/icinga-1-6-2-1-7-4-1-8-4-released/
af854a3a-2127-422b-91ae-364da2661108http://lists.grok.org.uk/pipermail/full-disclosure/2012-December/089125.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2013-01/msg00033.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2013-01/msg00060.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2013-01/msg00077.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2013-01/msg00088.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/51863Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2013/dsa-2616
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2013/dsa-2653
af854a3a-2127-422b-91ae-364da2661108http://www.exploit-db.com/exploits/24084Exploit
af854a3a-2127-422b-91ae-364da2661108http://www.exploit-db.com/exploits/24159Exploit
af854a3a-2127-422b-91ae-364da2661108http://www.nagios.org/projects/nagioscore/history/core-3x
af854a3a-2127-422b-91ae-364da2661108http://www.osvdb.org/89170
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/56879Exploit
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=893269
af854a3a-2127-422b-91ae-364da2661108https://dev.icinga.org/issues/3532Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.icinga.org/2013/01/14/icinga-1-6-2-1-7-4-1-8-4-released/
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:nagios:nagios:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB2E98B5-7093-4713-BD68-4873F81937A2",
              "versionEndIncluding": "3.4.3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDCA77EF-1020-4068-9CDC-5CF3B0CD66A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:alpha1:*:*:*:*:*:*",
              "matchCriteriaId": "751C46D5-877F-454B-8488-BBCA10CA4930",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:alpha2:*:*:*:*:*:*",
              "matchCriteriaId": "F4754494-17BE-496E-A7B8-453B3028CC45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:alpha3:*:*:*:*:*:*",
              "matchCriteriaId": "CD15E8FA-04D3-4625-BEA5-9F5CC0337699",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:alpha4:*:*:*:*:*:*",
              "matchCriteriaId": "713C5F3E-AA57-4F52-AC0A-9B1F25C25580",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:alpha5:*:*:*:*:*:*",
              "matchCriteriaId": "690EA084-9E58-4226-B490-2969E6C6BEBC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "0AFABA9F-4A45-4150-AED1-897267076A32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "830BB564-82FD-4519-A8EA-DCDF74F2BC54",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "9A975310-9591-4EBF-B987-CA43433B4C54",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "8653D6A2-4B5B-4F1D-A898-8F81F29C6FC2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:beta5:*:*:*:*:*:*",
              "matchCriteriaId": "D18649FF-8838-432E-93B8-3F8B82B0DEA9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:beta6:*:*:*:*:*:*",
              "matchCriteriaId": "9375EA90-0763-4817-8C7D-2D7E116E043F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:beta7:*:*:*:*:*:*",
              "matchCriteriaId": "C02C2F95-2AC2-4E0C-B5D0-785CDF1EDB85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "12E7BC34-65F0-4DD6-8809-F05320955479",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "390CFA92-68AE-4DE9-A199-1B7290A82168",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "1E56F249-3E6A-4764-8CAE-D3E5B6A86AB3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "953745B7-1381-47F5-8012-E699EFA065CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "87A8A3DA-61AF-4369-ACB0-7D54EEB1DAA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "40B7525F-EEE1-4537-BCE6-15DF3E348FEF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B831C72-C932-4B8C-8B16-C3BC2672AF98",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC5BB3C9-BBC6-43D8-830A-38020F50B148",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC9E1C24-9907-44F4-9166-5C679F05DF12",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8BE6777-6CA9-443E-A2A5-CCD3ED7EAECF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F8F3B76-7443-437E-B908-95D0EF0214C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF23E8B9-6F07-471A-8332-E6B35DFCE37A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EEFF0B7-60B4-4022-9EF5-101B707BAC6C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BC14996-78F9-4A95-9750-1229E57C19C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4C3195A-7B72-45BA-8F83-6B0FE00D3B8B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4584E0CD-A0F9-4AD1-ACC5-800E38F5DD59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "166D983D-2D1B-45D4-8ACF-68ED11BBF5BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "68D2FFFD-9A12-4230-90F6-AC5E3676FD04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "21A1C2E3-9E5C-4F00-8393-33DAC6765332",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2C8C695-EBA7-4FD0-BBD0-F339757559EE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:icinga:icinga:1.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "29CC0581-0AE1-43FE-8F98-CB2E7204A7E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:icinga:icinga:1.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "246A0425-A4D6-478D-AADB-07A0D3610FED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:icinga:icinga:1.7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "01476892-42B5-44F6-91D2-8C9F680A2F02",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:icinga:icinga:1.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A830CEA4-06F7-46FB-8216-0D18796F7BF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:icinga:icinga:1.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB9B0C24-D65D-4406-B5F7-5EA60F701872",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:icinga:icinga:1.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "5260A6FA-C393-4AD5-B5C8-73616F21FEA7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:icinga:icinga:1.8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C1DE372-E2A4-4C4B-B85C-104D84696090",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:icinga:icinga:1.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2B3410C-6FF8-4485-AC06-BBA15A4BC9E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:icinga:icinga:1.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "27F6ACDE-05A0-4688-97FF-EB4C23E8F52D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:icinga:icinga:1.8.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "6333E91A-6315-437C-A600-0B824976FBB8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple stack-based buffer overflows in the get_history function in history.cgi in Nagios Core before 3.4.4, and Icinga 1.6.x before 1.6.2, 1.7.x before 1.7.4, and 1.8.x before 1.8.4, might allow remote attackers to execute arbitrary code via a long (1) host_name variable (host parameter) or (2) svc_description variable."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples desbordamientos de b\u00fafer basado en pila en la funci\u00f3n get_history en history.cgi en Nagios core anterior a v3.4.4, y Icinga v1.6.x anterior a v1.6.2, v1.7.x anterior a v1.7.4, y v1.8.x anterior a v1.8.4, permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de una variable (1) host_name de gran longitud o (2) de la variable svc_description."
    }
  ],
  "id": "CVE-2012-6096",
  "lastModified": "2024-11-21T01:45:48.840",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2013-01-22T23:55:03.247",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2012-December/089125.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00033.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00060.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00077.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00088.html"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/51863"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.debian.org/security/2013/dsa-2616"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.debian.org/security/2013/dsa-2653"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.exploit-db.com/exploits/24084"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.exploit-db.com/exploits/24159"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.nagios.org/projects/nagioscore/history/core-3x"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.osvdb.org/89170"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/56879"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=893269"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://dev.icinga.org/issues/3532"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://www.icinga.org/2013/01/14/icinga-1-6-2-1-7-4-1-8-4-released/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2012-December/089125.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00033.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00060.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00077.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00088.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/51863"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2013/dsa-2616"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2013/dsa-2653"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.exploit-db.com/exploits/24084"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.exploit-db.com/exploits/24159"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.nagios.org/projects/nagioscore/history/core-3x"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/89170"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/56879"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=893269"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://dev.icinga.org/issues/3532"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.icinga.org/2013/01/14/icinga-1-6-2-1-7-4-1-8-4-released/"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2017-06-06 18:29
Modified
2024-11-21 02:42
Severity ?
Summary
The Fedora Nagios package uses "nagiosadmin" as the default password for the "nagiosadmin" administrator account, which makes it easier for remote attackers to obtain access by leveraging knowledge of the credentials.
Impacted products
Vendor Product Version
nagios nagios -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:nagios:nagios:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F89339E6-5484-4D0F-B834-FDD743C094B3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The Fedora Nagios package uses \"nagiosadmin\" as the default password for the \"nagiosadmin\" administrator account, which makes it easier for remote attackers to obtain access by leveraging knowledge of the credentials."
    },
    {
      "lang": "es",
      "value": "El paquete Fedora Nagios utiliza \"nagiosadmin\" como contrase\u00f1a predeterminada para la cuenta de administrador \"nagiosadmin\", lo que facilita a los atacantes remotos obtener acceso aprovechando el conocimiento de las credenciales."
    }
  ],
  "id": "CVE-2016-0726",
  "lastModified": "2024-11-21T02:42:15.610",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2017-06-06T18:29:00.277",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1295446"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1295446"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-798"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2017-03-31 16:59
Modified
2024-11-21 02:55
Summary
Cross-site scripting (XSS) vulnerability in Nagios.
Impacted products
Vendor Product Version
nagios nagios -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:nagios:nagios:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F89339E6-5484-4D0F-B834-FDD743C094B3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site scripting (XSS) vulnerability in Nagios."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad XSS en Nagios."
    }
  ],
  "id": "CVE-2016-6209",
  "lastModified": "2024-11-21T02:55:40.350",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.1,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.0"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 2.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2017-03-31T16:59:00.487",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://seclists.org/fulldisclosure/2016/Jun/20"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1346217"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://seclists.org/fulldisclosure/2016/Jun/20"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1346217"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2013-11-23 17:55
Modified
2024-11-21 01:55
Severity ?
Summary
rss-newsfeed.php in Nagios Core 3.4.4, 3.5.1, and earlier, when MAGPIE_CACHE_ON is set to 1, allows local users to overwrite arbitrary files via a symlink attack on /tmp/magpie_cache.
Impacted products
Vendor Product Version
nagios nagios *
nagios nagios 3.4.4
redhat openstack 3.0



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:nagios:nagios:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7145515E-18AD-4DB5-BA67-B9EEE29087D3",
              "versionEndIncluding": "3.5.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.4.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B555161-CF36-47FE-BDAA-C45E8C4B0E33",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:redhat:openstack:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "6533B15B-F748-4A5D-AB86-31D38DFAE60F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "rss-newsfeed.php in Nagios Core 3.4.4, 3.5.1, and earlier, when MAGPIE_CACHE_ON is set to 1, allows local users to overwrite arbitrary files via a symlink attack on /tmp/magpie_cache."
    },
    {
      "lang": "es",
      "value": "rss-newsfeed.php en Nagios Core 3.4.4, 3.5.1, y anteriores versiones, cuando se establece MAGPIE_CACHE_ON en 1, permite a usuarios locales sobreescribir archivos arbitrarios a trav\u00e9s de un ataque symlink en /tmp/magpie_cache."
    }
  ],
  "evaluatorComment": "per http://rhn.redhat.com/errata/RHSA-2013-1526.html\n\n\u0027Affected Products: Red Hat OpenStack 3.0\u0027",
  "id": "CVE-2013-4214",
  "lastModified": "2024-11-21T01:55:08.683",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 6.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:L/AC:M/Au:N/C:N/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 3.4,
        "impactScore": 9.2,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2013-11-23T17:55:03.430",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2013-1526.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/bid/61747"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=958002"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://www.nagios.org/projects/nagios-core/history/4x/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2013-1526.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/61747"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=958002"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.nagios.org/projects/nagios-core/history/4x/"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-59"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-06-09 14:15
Modified
2024-11-21 05:02
Summary
Nagios 4.4.5 allows an attacker, who already has administrative access to change the "URL for JSON CGIs" configuration setting, to modify the Alert Histogram and Trends code via crafted versions of the archivejson.cgi, objectjson.cgi, and statusjson.cgi files. NOTE: this vulnerability has been mistakenly associated with CVE-2020-1408.
References
cve@mitre.orghttps://anhtai.me/nagios-core-4-4-5-url-injection/Exploit, Third Party Advisory
cve@mitre.orghttps://github.com/sawolf/nagioscore/tree/url-injection-fixProduct, Third Party Advisory
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5P6NHNG2SJAM6DXVTXQH3AOJ4WQVKJUE/
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H7T6MSDWMBJEVVFSOK7DOYJJWDAFQCEQ/
cve@mitre.orghttps://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JUEIABR4Y6L5J5MZDFWU46ZWXMJO64U3/
cve@mitre.orghttps://www.nagios.org/projects/nagios-core/history/4x/Release Notes, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://anhtai.me/nagios-core-4-4-5-url-injection/Exploit, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://github.com/sawolf/nagioscore/tree/url-injection-fixProduct, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5P6NHNG2SJAM6DXVTXQH3AOJ4WQVKJUE/
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H7T6MSDWMBJEVVFSOK7DOYJJWDAFQCEQ/
af854a3a-2127-422b-91ae-364da2661108https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JUEIABR4Y6L5J5MZDFWU46ZWXMJO64U3/
af854a3a-2127-422b-91ae-364da2661108https://www.nagios.org/projects/nagios-core/history/4x/Release Notes, Vendor Advisory
Impacted products
Vendor Product Version
nagios nagios 4.4.5
fedoraproject fedora 32
fedoraproject fedora 33
fedoraproject fedora 34



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:nagios:nagios:4.4.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FE9137F-A7A3-4327-86A7-D61BB30DC55F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
              "matchCriteriaId": "36D96259-24BD-44E2-96D9-78CE1D41F956",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
              "matchCriteriaId": "E460AA51-FCDA-46B9-AE97-E6676AA5E194",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
              "matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Nagios 4.4.5 allows an attacker, who already has administrative access to change the \"URL for JSON CGIs\" configuration setting, to modify the Alert Histogram and Trends code via crafted versions of the archivejson.cgi, objectjson.cgi, and statusjson.cgi files. NOTE: this vulnerability has been mistakenly associated with CVE-2020-1408."
    },
    {
      "lang": "es",
      "value": "Nagios versi\u00f3n 4.4.5, permite a un atacante, que presenta acceso administrativo, cambiar el ajuste de configuraci\u00f3n \"URL for JSON CGI\", para modificar el c\u00f3digo de Alert Histogram y Trends por medio de las versiones dise\u00f1adas de los archivos archivejson.cgi, objectjson.cgi y statusjson.cgi. NOTA: esta vulnerabilidad ha sido err\u00f3neamente asociada con CVE-2020-1408"
    }
  ],
  "id": "CVE-2020-13977",
  "lastModified": "2024-11-21T05:02:16.810",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "NONE",
          "baseScore": 4.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 4.9,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.2,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-06-09T14:15:10.063",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://anhtai.me/nagios-core-4-4-5-url-injection/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Product",
        "Third Party Advisory"
      ],
      "url": "https://github.com/sawolf/nagioscore/tree/url-injection-fix"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5P6NHNG2SJAM6DXVTXQH3AOJ4WQVKJUE/"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H7T6MSDWMBJEVVFSOK7DOYJJWDAFQCEQ/"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JUEIABR4Y6L5J5MZDFWU46ZWXMJO64U3/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Release Notes",
        "Vendor Advisory"
      ],
      "url": "https://www.nagios.org/projects/nagios-core/history/4x/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://anhtai.me/nagios-core-4-4-5-url-injection/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Product",
        "Third Party Advisory"
      ],
      "url": "https://github.com/sawolf/nagioscore/tree/url-injection-fix"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5P6NHNG2SJAM6DXVTXQH3AOJ4WQVKJUE/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H7T6MSDWMBJEVVFSOK7DOYJJWDAFQCEQ/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JUEIABR4Y6L5J5MZDFWU46ZWXMJO64U3/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes",
        "Vendor Advisory"
      ],
      "url": "https://www.nagios.org/projects/nagios-core/history/4x/"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-829"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2008-10-30 20:56
Modified
2024-11-21 00:52
Severity ?
Summary
The _httpsrequest function (Snoopy/Snoopy.class.php) in Snoopy 1.2.3 and earlier, as used in (1) ampache, (2) libphp-snoopy, (3) mahara, (4) mediamate, (5) opendb, (6) pixelpost, and possibly other products, allows remote attackers to execute arbitrary commands via shell metacharacters in https URLs.
References
cve@mitre.orghttp://jvn.jp/en/jp/JVN20502807/index.htmlThird Party Advisory, VDB Entry
cve@mitre.orghttp://jvndb.jvn.jp/ja/contents/2008/JVNDB-2008-000074.htmlThird Party Advisory, VDB Entry
cve@mitre.orghttp://secunia.com/advisories/32361Third Party Advisory
cve@mitre.orghttp://sourceforge.net/forum/forum.php?forum_id=879959Broken Link, Patch, Third Party Advisory
cve@mitre.orghttp://www.debian.org/security/2008/dsa-1691Third Party Advisory
cve@mitre.orghttp://www.debian.org/security/2009/dsa-1871Third Party Advisory
cve@mitre.orghttp://www.openwall.com/lists/oss-security/2008/11/01/1Mailing List, Third Party Advisory
cve@mitre.orghttp://www.securityfocus.com/archive/1/496068/100/0/threadedThird Party Advisory, VDB Entry
cve@mitre.orghttp://www.securityfocus.com/bid/31887Patch, Third Party Advisory, VDB Entry
cve@mitre.orghttp://www.vupen.com/english/advisories/2008/2901Third Party Advisory
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/46068Third Party Advisory, VDB Entry
cve@mitre.orghttps://security.gentoo.org/glsa/201702-26Third Party Advisory
cve@mitre.orghttps://www.nagios.org/projects/nagios-core/history/4x/Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://jvn.jp/en/jp/JVN20502807/index.htmlThird Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://jvndb.jvn.jp/ja/contents/2008/JVNDB-2008-000074.htmlThird Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/32361Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://sourceforge.net/forum/forum.php?forum_id=879959Broken Link, Patch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2008/dsa-1691Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2009/dsa-1871Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2008/11/01/1Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/496068/100/0/threadedThird Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/31887Patch, Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/2901Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/46068Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108https://security.gentoo.org/glsa/201702-26Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www.nagios.org/projects/nagios-core/history/4x/Third Party Advisory
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:snoopy_project:snoopy:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "41656D34-7042-48B9-9ADF-D58CA525087A",
              "versionEndIncluding": "1.2.3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F92AB32-E7DE-43F4-B877-1F41FA162EC7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C757774-08E7-40AA-B532-6F705C8F7639",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:nagios:nagios:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B23B79AF-8C39-4188-B404-40AE46D4617B",
              "versionEndExcluding": "4.2.2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:wordpress:wordpress:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A88DFCEE-A687-4A3E-9912-76E45C8B3B7E",
              "versionEndExcluding": "2.6.3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The _httpsrequest function (Snoopy/Snoopy.class.php) in Snoopy 1.2.3 and earlier, as used in (1) ampache, (2) libphp-snoopy, (3) mahara, (4) mediamate, (5) opendb, (6) pixelpost, and possibly other products, allows remote attackers to execute arbitrary commands via shell metacharacters in https URLs."
    },
    {
      "lang": "es",
      "value": "La funci\u00f3n _httpsrequest function (Snoopy/Snoopy.class.php) en Snoopy 1.2.3 y versiones anteriores, cuando es usada en (1) ampache, (2) libphp-snoopy, (3) mahara, (4) mediamate, (5) opendb, (6) pixelpost y posiblemente otros productos, permite a atacantes remotos ejecutar comandos arbitrarios a trav\u00e9s de metacar\u00e1cteres shell en URLs https."
    }
  ],
  "id": "CVE-2008-4796",
  "lastModified": "2024-11-21T00:52:35.230",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2008-10-30T20:56:54.770",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://jvn.jp/en/jp/JVN20502807/index.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://jvndb.jvn.jp/ja/contents/2008/JVNDB-2008-000074.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/32361"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Broken Link",
        "Patch",
        "Third Party Advisory"
      ],
      "url": "http://sourceforge.net/forum/forum.php?forum_id=879959"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.debian.org/security/2008/dsa-1691"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.debian.org/security/2009/dsa-1871"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2008/11/01/1"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/archive/1/496068/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/31887"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2008/2901"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46068"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.gentoo.org/glsa/201702-26"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.nagios.org/projects/nagios-core/history/4x/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://jvn.jp/en/jp/JVN20502807/index.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://jvndb.jvn.jp/ja/contents/2008/JVNDB-2008-000074.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://secunia.com/advisories/32361"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Broken Link",
        "Patch",
        "Third Party Advisory"
      ],
      "url": "http://sourceforge.net/forum/forum.php?forum_id=879959"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.debian.org/security/2008/dsa-1691"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.debian.org/security/2009/dsa-1871"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2008/11/01/1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/archive/1/496068/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/31887"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2008/2901"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46068"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.gentoo.org/glsa/201702-26"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.nagios.org/projects/nagios-core/history/4x/"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-78"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-03-16 16:15
Modified
2024-11-21 05:36
Summary
Nagios Log Server 2.1.3 has Incorrect Access Control.
Impacted products
Vendor Product Version
nagios nagios 2.1.3



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "750FFD82-3737-458C-941C-5E2864DEFB76",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Nagios Log Server 2.1.3 has Incorrect Access Control."
    },
    {
      "lang": "es",
      "value": "Nagios Log Server versi\u00f3n 2.1.3, presenta un Control de Acceso Incorrecto."
    }
  ],
  "id": "CVE-2020-6584",
  "lastModified": "2024-11-21T05:36:00.673",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "NONE",
          "baseScore": 4.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-03-16T16:15:14.313",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Release Notes",
        "Vendor Advisory"
      ],
      "url": "https://assets.nagios.com/downloads/nagios-log-server/CHANGES.TXT"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://medium.com/%40fixitt6/multiple-vulnerabilities-in-nagios-log-server-2-1-3-af7c160edc60"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Product"
      ],
      "url": "https://www.nagios.com/products/nagios-log-server/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes",
        "Vendor Advisory"
      ],
      "url": "https://assets.nagios.com/downloads/nagios-log-server/CHANGES.TXT"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://medium.com/%40fixitt6/multiple-vulnerabilities-in-nagios-log-server-2-1-3-af7c160edc60"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Product"
      ],
      "url": "https://www.nagios.com/products/nagios-log-server/"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-269"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2017-02-15 15:59
Modified
2024-11-21 02:43
Summary
Nagios 4.3.2 and earlier allows local users to gain root privileges via a hard link attack on the Nagios init script file, related to CVE-2016-8641.
Impacted products
Vendor Product Version
nagios nagios *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:nagios:nagios:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "46169755-05CD-4043-A730-5A4D2433D407",
              "versionEndIncluding": "4.2.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Nagios 4.3.2 and earlier allows local users to gain root privileges via a hard link attack on the Nagios init script file, related to CVE-2016-8641."
    },
    {
      "lang": "es",
      "value": "Nagios 4.3.2 y anteriores permite a los usuarios locales obtener privilegios root mediante un ataque de v\u00ednculo f\u00edsico en el archivo de script init de Nagios. Esta vulnerabilidad est\u00e1 relacionada con CVE-2016-8641."
    }
  ],
  "id": "CVE-2016-10089",
  "lastModified": "2024-11-21T02:43:16.733",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.2,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 10.0,
        "obtainAllPrivilege": true,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2017-02-15T15:59:00.277",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2016/12/30/6"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/95171"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2016/12/30/6"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/95171"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-264"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2009-03-02 19:30
Modified
2024-11-21 00:56
Severity ?
Summary
Unspecified vulnerability in Nagios before 3.0.6 has unspecified impact and remote attack vectors related to CGI programs, "adaptive external commands," and "writing newlines and submitting service comments."
References
cve@mitre.orghttp://marc.info/?l=bugtraq&m=124156641928637&w=2
cve@mitre.orghttp://marc.info/?l=bugtraq&m=124156641928637&w=2
cve@mitre.orghttp://secunia.com/advisories/32909Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/35002
cve@mitre.orghttp://security.gentoo.org/glsa/glsa-200907-15.xml
cve@mitre.orghttp://www.nagios.org/development/history/nagios-3x.phpPatch, Vendor Advisory
cve@mitre.orghttp://www.nagios.org/news/#88Patch, Vendor Advisory
cve@mitre.orghttp://www.securityfocus.com/bid/32611
cve@mitre.orghttp://www.securitytracker.com/id?1022165
cve@mitre.orghttp://www.vupen.com/english/advisories/2009/1256
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/47081
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=124156641928637&w=2
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=124156641928637&w=2
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/32909Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/35002
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-200907-15.xml
af854a3a-2127-422b-91ae-364da2661108http://www.nagios.org/development/history/nagios-3x.phpPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.nagios.org/news/#88Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/32611
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1022165
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2009/1256
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/47081



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:nagios:nagios:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E3568E9-9239-4AD8-A5AC-0457918DD2AE",
              "versionEndIncluding": "3.0.5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CA91B05-9578-46D8-A21C-4E3C4AB4936A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:1.0_b1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C178226A-CBE8-4ECB-BDA7-1E86C61D2A82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:1.0_b2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B75383C-C37C-485F-B6D2-B4A7F2F7B3E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:1.0_b3:*:*:*:*:*:*:*",
              "matchCriteriaId": "67AF4805-B2EE-40F5-8D92-D2953866AD6B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:1.0b1:*:*:*:*:*:*:*",
              "matchCriteriaId": "52432776-C9C6-4CA7-B3D9-87513CBA5716",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:1.0b2:*:*:*:*:*:*:*",
              "matchCriteriaId": "601958D5-B393-4EFA-9A6F-A5A04A95F4BB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:1.0b3:*:*:*:*:*:*:*",
              "matchCriteriaId": "99B2E88A-A611-43C5-8037-411D6B78EC03",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:1.0b4:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DCEFBFC-38BD-4F78-B068-1A90C6199CEB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:1.0b5:*:*:*:*:*:*:*",
              "matchCriteriaId": "E61ACC55-1002-4FA3-8E5A-52041CE5DCD9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:1.0b6:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C773265-0BE7-463A-8E24-84D804F14AF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A847327-D74E-460C-9F6F-E04C9B77E0C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F7425E3-F152-439B-B95F-5160E4593DBA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5911624-5BD8-4A40-B417-FCD926D352BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF45013F-A844-4726-8B2A-EF602A3BC4C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:1.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0879A39F-7C92-4FD3-9FEF-2E7C4F2C0444",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A91E463-D239-4853-8A63-E01EE7DB319F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.0b1:*:*:*:*:*:*:*",
              "matchCriteriaId": "239CAF7F-E9BF-4D0F-BB99-EF51E1366516",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.0b2:*:*:*:*:*:*:*",
              "matchCriteriaId": "738DF14D-A716-46F0-87AC-2DB2F1E44594",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.0b3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E8E1234-9F0D-4E6F-BF58-5DAE8E41DB85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.0b4:*:*:*:*:*:*:*",
              "matchCriteriaId": "0073F69B-C5FA-470A-BA95-9C4E8033F5CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.0b5:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAA7C5B6-C13D-4814-AA7B-444CF12E4DEF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.0b6:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1209D1C-DD27-41FC-8DAF-BFC0B4B1D602",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.0rc1:*:*:*:*:*:*:*",
              "matchCriteriaId": "39551FFC-E1F0-4D45-ADA6-AB3E74BB576D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.0rc2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BED52AA-BE20-447C-8896-4B591C42F66A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "82DE68E3-7003-4675-96A9-6F7308E1E39C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E3F8DC3-2F34-4E11-A796-4EA7CB17FDDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "7ADCBA8C-06DB-4D85-AEED-807E64A29DFB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D3EE2D7-BD17-4C37-ABA3-79FCE8328EFF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "927B8496-720D-4B15-A12E-52169AFB38D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F9E80B2-E349-488F-A870-9BD50D47A672",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "1121E86B-13EB-4DE3-816A-002C6DC15A70",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C3374C3-9F57-4014-8712-DDDAB52998FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5D4F00F-C732-477B-988A-25F8E8D32D07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7A5D5AC-9E4C-4F3B-A16A-C6DD18DD8D51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "725F9938-0A5C-4A59-BFA4-C58044DE26DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDCA77EF-1020-4068-9CDC-5CF3B0CD66A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:alpha1:*:*:*:*:*:*",
              "matchCriteriaId": "751C46D5-877F-454B-8488-BBCA10CA4930",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:alpha2:*:*:*:*:*:*",
              "matchCriteriaId": "F4754494-17BE-496E-A7B8-453B3028CC45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:alpha3:*:*:*:*:*:*",
              "matchCriteriaId": "CD15E8FA-04D3-4625-BEA5-9F5CC0337699",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:alpha4:*:*:*:*:*:*",
              "matchCriteriaId": "713C5F3E-AA57-4F52-AC0A-9B1F25C25580",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "0AFABA9F-4A45-4150-AED1-897267076A32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "830BB564-82FD-4519-A8EA-DCDF74F2BC54",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "9A975310-9591-4EBF-B987-CA43433B4C54",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "8653D6A2-4B5B-4F1D-A898-8F81F29C6FC2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:beta5:*:*:*:*:*:*",
              "matchCriteriaId": "D18649FF-8838-432E-93B8-3F8B82B0DEA9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:beta6:*:*:*:*:*:*",
              "matchCriteriaId": "9375EA90-0763-4817-8C7D-2D7E116E043F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:beta7:*:*:*:*:*:*",
              "matchCriteriaId": "C02C2F95-2AC2-4E0C-B5D0-785CDF1EDB85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "12E7BC34-65F0-4DD6-8809-F05320955479",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "390CFA92-68AE-4DE9-A199-1B7290A82168",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "1E56F249-3E6A-4764-8CAE-D3E5B6A86AB3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "953745B7-1381-47F5-8012-E699EFA065CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "87A8A3DA-61AF-4369-ACB0-7D54EEB1DAA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "40B7525F-EEE1-4537-BCE6-15DF3E348FEF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B831C72-C932-4B8C-8B16-C3BC2672AF98",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unspecified vulnerability in Nagios before 3.0.6 has unspecified impact and remote attack vectors related to CGI programs, \"adaptive external commands,\" and \"writing newlines and submitting service comments.\""
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad no especificada en Nagios versiones anteriores a v3.0.6 tiene un impacto no especificado y vectores de ataque remoto relacionados con los programas CGI, \"comandos de adaptaci\u00f3n externa\", e \"introducci\u00f3n de nuevas l\u00edneas y env\u00edo de comentarios de servicio\"."
    }
  ],
  "id": "CVE-2008-6373",
  "lastModified": "2024-11-21T00:56:22.243",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2009-03-02T19:30:00.360",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=124156641928637\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=124156641928637\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/32909"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/35002"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://security.gentoo.org/glsa/glsa-200907-15.xml"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.nagios.org/development/history/nagios-3x.php"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.nagios.org/news/#88"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/32611"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id?1022165"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2009/1256"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47081"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=124156641928637\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=124156641928637\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/32909"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/35002"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-200907-15.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.nagios.org/development/history/nagios-3x.php"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.nagios.org/news/#88"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/32611"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1022165"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2009/1256"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47081"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-94"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2014-01-15 16:08
Modified
2024-11-21 02:00
Severity ?
Summary
Multiple off-by-one errors in Nagios Core 3.5.1, 4.0.2, and earlier, and Icinga before 1.8.5, 1.9 before 1.9.4, and 1.10 before 1.10.2 allow remote authenticated users to obtain sensitive information from process memory or cause a denial of service (crash) via a long string in the last key value in the variable list to the process_cgivars function in (1) avail.c, (2) cmd.c, (3) config.c, (4) extinfo.c, (5) histogram.c, (6) notifications.c, (7) outages.c, (8) status.c, (9) statusmap.c, (10) summary.c, and (11) trends.c in cgi/, which triggers a heap-based buffer over-read.
References
cve@mitre.orghttp://lists.opensuse.org/opensuse-updates/2014-01/msg00010.html
cve@mitre.orghttp://lists.opensuse.org/opensuse-updates/2014-01/msg00028.html
cve@mitre.orghttp://lists.opensuse.org/opensuse-updates/2014-01/msg00046.html
cve@mitre.orghttp://lists.opensuse.org/opensuse-updates/2014-01/msg00068.html
cve@mitre.orghttp://secunia.com/advisories/55976Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/56316Vendor Advisory
cve@mitre.orghttp://sourceforge.net/p/nagios/nagioscore/ci/d97e03f32741a7d851826b03ed73ff4c9612a866/
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDVSA-2014:004
cve@mitre.orghttp://www.openwall.com/lists/oss-security/2013/12/24/1
cve@mitre.orghttp://www.securityfocus.com/bid/64363
cve@mitre.orghttps://dev.icinga.org/issues/5251Vendor Advisory
cve@mitre.orghttps://lists.debian.org/debian-lts-announce/2018/12/msg00014.html
cve@mitre.orghttps://www.icinga.org/2013/12/17/icinga-security-releases-1-10-2-1-9-4-1-8-5/
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2014-01/msg00010.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2014-01/msg00028.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2014-01/msg00046.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-updates/2014-01/msg00068.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/55976Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/56316Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://sourceforge.net/p/nagios/nagioscore/ci/d97e03f32741a7d851826b03ed73ff4c9612a866/
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2014:004
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2013/12/24/1
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/64363
af854a3a-2127-422b-91ae-364da2661108https://dev.icinga.org/issues/5251Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://lists.debian.org/debian-lts-announce/2018/12/msg00014.html
af854a3a-2127-422b-91ae-364da2661108https://www.icinga.org/2013/12/17/icinga-security-releases-1-10-2-1-9-4-1-8-5/
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:nagios:nagios:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6B3FCCE-CD72-42D2-9ED4-DE7E0F7D5770",
              "versionEndIncluding": "4.0.2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDCA77EF-1020-4068-9CDC-5CF3B0CD66A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:alpha1:*:*:*:*:*:*",
              "matchCriteriaId": "751C46D5-877F-454B-8488-BBCA10CA4930",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:alpha2:*:*:*:*:*:*",
              "matchCriteriaId": "F4754494-17BE-496E-A7B8-453B3028CC45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:alpha3:*:*:*:*:*:*",
              "matchCriteriaId": "CD15E8FA-04D3-4625-BEA5-9F5CC0337699",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:alpha4:*:*:*:*:*:*",
              "matchCriteriaId": "713C5F3E-AA57-4F52-AC0A-9B1F25C25580",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:alpha5:*:*:*:*:*:*",
              "matchCriteriaId": "690EA084-9E58-4226-B490-2969E6C6BEBC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "0AFABA9F-4A45-4150-AED1-897267076A32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "830BB564-82FD-4519-A8EA-DCDF74F2BC54",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "9A975310-9591-4EBF-B987-CA43433B4C54",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "8653D6A2-4B5B-4F1D-A898-8F81F29C6FC2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:beta5:*:*:*:*:*:*",
              "matchCriteriaId": "D18649FF-8838-432E-93B8-3F8B82B0DEA9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:beta6:*:*:*:*:*:*",
              "matchCriteriaId": "9375EA90-0763-4817-8C7D-2D7E116E043F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:beta7:*:*:*:*:*:*",
              "matchCriteriaId": "C02C2F95-2AC2-4E0C-B5D0-785CDF1EDB85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "12E7BC34-65F0-4DD6-8809-F05320955479",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "390CFA92-68AE-4DE9-A199-1B7290A82168",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "1E56F249-3E6A-4764-8CAE-D3E5B6A86AB3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "953745B7-1381-47F5-8012-E699EFA065CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "87A8A3DA-61AF-4369-ACB0-7D54EEB1DAA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "40B7525F-EEE1-4537-BCE6-15DF3E348FEF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B831C72-C932-4B8C-8B16-C3BC2672AF98",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC5BB3C9-BBC6-43D8-830A-38020F50B148",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC9E1C24-9907-44F4-9166-5C679F05DF12",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8BE6777-6CA9-443E-A2A5-CCD3ED7EAECF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F8F3B76-7443-437E-B908-95D0EF0214C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF23E8B9-6F07-471A-8332-E6B35DFCE37A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EEFF0B7-60B4-4022-9EF5-101B707BAC6C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BC14996-78F9-4A95-9750-1229E57C19C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4C3195A-7B72-45BA-8F83-6B0FE00D3B8B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4584E0CD-A0F9-4AD1-ACC5-800E38F5DD59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "166D983D-2D1B-45D4-8ACF-68ED11BBF5BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "68D2FFFD-9A12-4230-90F6-AC5E3676FD04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "21A1C2E3-9E5C-4F00-8393-33DAC6765332",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2C8C695-EBA7-4FD0-BBD0-F339757559EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "B06E7504-A5C5-42F3-B325-EE9905A9783A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4594D8DC-97C7-4D8A-8CF8-56BD11C85733",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:icinga:icinga:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3BD88897-2A40-4127-B8B6-A4DEAF4BE166",
              "versionEndIncluding": "1.8.4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:icinga:icinga:0.8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D65D942-0560-42B0-BAF8-D6B8C4237558",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:icinga:icinga:0.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CF3E50F-0DF1-44C1-9E7D-E3AE9BBAC5C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:icinga:icinga:0.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F87DFD18-B038-4E18-889A-FCADDC7E9C23",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:icinga:icinga:0.8.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9B482D1-BB5D-41CC-A330-214F1EC9BD43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:icinga:icinga:0.8.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "6EB99BAF-6CF9-4F61-A86B-91F4DAE20F58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:icinga:icinga:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B65BD554-2D66-4237-8829-EC5CFD374E4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:icinga:icinga:1.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "51CBC3F4-EB90-462D-B840-71DB9E8E3667",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:icinga:icinga:1.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "719B37F6-4D3A-4922-B58D-536A775D42D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:icinga:icinga:1.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7890303A-21C3-47B8-86AF-1B07A01C9AE6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:icinga:icinga:1.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "CED3BF83-92C3-4324-BC6E-722309A8787B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:icinga:icinga:1.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5F7F451-E7AA-4C84-874D-7C7E5C162DEA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:icinga:icinga:1.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D5250AED-B86C-4415-A274-7DD9659F40D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:icinga:icinga:1.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6E333C3-C264-41C9-B358-97A3F62C649D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:icinga:icinga:1.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "BEAD9B4E-66B1-4E82-8A6F-B46A4F0A61D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:icinga:icinga:1.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "0166CAEF-0126-4B6E-BE57-5398375C17EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:icinga:icinga:1.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "11406052-8C4C-4CA4-9A73-82135D236741",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:icinga:icinga:1.6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "29CC0581-0AE1-43FE-8F98-CB2E7204A7E7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:icinga:icinga:1.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "246A0425-A4D6-478D-AADB-07A0D3610FED",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:icinga:icinga:1.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D7488AD-C2CA-491E-B4E4-322A275EE13A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:icinga:icinga:1.7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "01476892-42B5-44F6-91D2-8C9F680A2F02",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:icinga:icinga:1.7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A830CEA4-06F7-46FB-8216-0D18796F7BF0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:icinga:icinga:1.7.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB9B0C24-D65D-4406-B5F7-5EA60F701872",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:icinga:icinga:1.7.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "5260A6FA-C393-4AD5-B5C8-73616F21FEA7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:icinga:icinga:1.7.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "94C19BC7-55B5-4D0D-96CC-1C9C40F7829F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:icinga:icinga:1.8.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C1DE372-E2A4-4C4B-B85C-104D84696090",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:icinga:icinga:1.8.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2B3410C-6FF8-4485-AC06-BBA15A4BC9E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:icinga:icinga:1.8.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "27F6ACDE-05A0-4688-97FF-EB4C23E8F52D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:icinga:icinga:1.8.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "6333E91A-6315-437C-A600-0B824976FBB8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:icinga:icinga:1.9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8BCA88C-5AA9-4C0D-9FA3-80BA8FBBD521",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:icinga:icinga:1.9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "821C9240-E41E-4BCC-910E-63304F8E3790",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:icinga:icinga:1.9.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADFD2677-6BF6-4985-B915-A9395B4A620E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:icinga:icinga:1.9.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "FCF96645-E8B6-443A-8761-6F879042F689",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:icinga:icinga:1.10.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "21460019-53D0-440D-A0A6-4B778B478B4E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:icinga:icinga:1.10.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "30895AD2-198A-4329-9987-347AABDD7C10",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple off-by-one errors in Nagios Core 3.5.1, 4.0.2, and earlier, and Icinga before 1.8.5, 1.9 before 1.9.4, and 1.10 before 1.10.2 allow remote authenticated users to obtain sensitive information from process memory or cause a denial of service (crash) via a long string in the last key value in the variable list to the process_cgivars function in (1) avail.c, (2) cmd.c, (3) config.c, (4) extinfo.c, (5) histogram.c, (6) notifications.c, (7) outages.c, (8) status.c, (9) statusmap.c, (10) summary.c, and (11) trends.c in cgi/, which triggers a heap-based buffer over-read."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples errores de superaci\u00f3n de l\u00edmite (off-by-one) en Nagios Core 3.5.1, 4.0.2 y anteriores, e Icinga anteriores a 1.8.5, 1.9 anteriores a 1.9.4 y 1.10 anteriores a 1.10.2 permite a usuarios autenticados remotamente obtener informaci\u00f3n sensible de procesos de memoria o causar denegaci\u00f3n de servicio (ca\u00edda) a trav\u00e9s de una adena larga en el valor de la \u00faltima clave en la lista de variables de la funci\u00f3n process_cgivars en (1) avail.c, (2) cmd.c, (3) config.c, 84) extinfo.c, (5) histogram.c, (6) notifications.c, (7) outages.c, (8) status.c, (9) statusmap.c, (10) summary.c, y (11) trends.c en cgi/, lo cual lanza una sobre-lectura de buffer basado en memoria din\u00e1mica."
    }
  ],
  "id": "CVE-2013-7108",
  "lastModified": "2024-11-21T02:00:22.007",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 4.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-01-15T16:08:04.017",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00010.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00028.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00046.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00068.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/55976"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/56316"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://sourceforge.net/p/nagios/nagioscore/ci/d97e03f32741a7d851826b03ed73ff4c9612a866/"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:004"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.openwall.com/lists/oss-security/2013/12/24/1"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/64363"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://dev.icinga.org/issues/5251"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://lists.debian.org/debian-lts-announce/2018/12/msg00014.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.icinga.org/2013/12/17/icinga-security-releases-1-10-2-1-9-4-1-8-5/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00010.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00028.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00046.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00068.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/55976"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/56316"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://sourceforge.net/p/nagios/nagioscore/ci/d97e03f32741a7d851826b03ed73ff4c9612a866/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:004"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2013/12/24/1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/64363"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://dev.icinga.org/issues/5251"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.debian.org/debian-lts-announce/2018/12/msg00014.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.icinga.org/2013/12/17/icinga-security-releases-1-10-2-1-9-4-1-8-5/"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2017-03-31 16:59
Modified
2024-11-21 02:11
Severity ?
Summary
Snoopy allows remote attackers to execute arbitrary commands. NOTE: this vulnerability exists due to an incomplete fix for CVE-2014-5008.
References
cve@mitre.orghttp://rhn.redhat.com/errata/RHSA-2017-0211.htmlPatch, Third Party Advisory
cve@mitre.orghttp://rhn.redhat.com/errata/RHSA-2017-0212.htmlPatch, Third Party Advisory
cve@mitre.orghttp://rhn.redhat.com/errata/RHSA-2017-0213.htmlPatch, Third Party Advisory
cve@mitre.orghttp://rhn.redhat.com/errata/RHSA-2017-0214.htmlPatch, Third Party Advisory
cve@mitre.orghttp://snoopy.cvs.sourceforge.net/viewvc/snoopy/Snoopy/Snoopy.class.php?r1=1.28&r2=1.29Patch, Third Party Advisory
cve@mitre.orghttp://www.openwall.com/lists/oss-security/2014/07/09/11Mailing List, Patch, Third Party Advisory
cve@mitre.orghttp://www.openwall.com/lists/oss-security/2014/07/16/10Mailing List, Patch, Third Party Advisory
cve@mitre.orghttp://www.openwall.com/lists/oss-security/2014/07/18/2Mailing List, Patch, Third Party Advisory
cve@mitre.orghttp://www.securityfocus.com/bid/68783Third Party Advisory, VDB Entry
cve@mitre.orghttps://bugzilla.redhat.com/show_bug.cgi?id=1121497Issue Tracking, Patch
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/94738
cve@mitre.orghttps://github.com/cogdog/feed2js/pull/12#issuecomment-48283706Issue Tracking, Patch, Third Party Advisory
cve@mitre.orghttps://www-01.ibm.com/support/docview.wss?uid=isg3T1024264Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2017-0211.htmlPatch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2017-0212.htmlPatch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2017-0213.htmlPatch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2017-0214.htmlPatch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://snoopy.cvs.sourceforge.net/viewvc/snoopy/Snoopy/Snoopy.class.php?r1=1.28&r2=1.29Patch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2014/07/09/11Mailing List, Patch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2014/07/16/10Mailing List, Patch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2014/07/18/2Mailing List, Patch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/68783Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=1121497Issue Tracking, Patch
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/94738
af854a3a-2127-422b-91ae-364da2661108https://github.com/cogdog/feed2js/pull/12#issuecomment-48283706Issue Tracking, Patch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://www-01.ibm.com/support/docview.wss?uid=isg3T1024264Third Party Advisory
Impacted products
Vendor Product Version
snoopy snoopy -
redhat openstack 5.0
redhat openstack 6.0
nagios nagios *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:snoopy:snoopy:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0E13E52-C863-4679-9B96-476DD95B4FC2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:redhat:openstack:5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B152EDF3-3140-4343-802F-F4F1C329F5C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:redhat:openstack:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "31EC146C-A6F6-4C0D-AF87-685286262DAA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:nagios:nagios:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C4E32CA-1439-4B07-BBB2-38DCD001BD6A",
              "versionEndIncluding": "4.2.3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Snoopy allows remote attackers to execute arbitrary commands.  NOTE: this vulnerability exists due to an incomplete fix for CVE-2014-5008."
    },
    {
      "lang": "es",
      "value": "Snoopy permite a atacantes remotos ejecutar comandos arbitrarios. NOTA: esta vulnerabilidad existe debido a una correcci\u00f3n incompleta para CVE-2014-5008."
    }
  ],
  "id": "CVE-2014-5009",
  "lastModified": "2024-11-21T02:11:16.423",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2017-03-31T16:59:00.333",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2017-0211.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2017-0212.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2017-0213.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2017-0214.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "http://snoopy.cvs.sourceforge.net/viewvc/snoopy/Snoopy/Snoopy.class.php?r1=1.28\u0026r2=1.29"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Patch",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2014/07/09/11"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Patch",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2014/07/16/10"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Patch",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2014/07/18/2"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/68783"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Issue Tracking",
        "Patch"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1121497"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94738"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Issue Tracking",
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://github.com/cogdog/feed2js/pull/12#issuecomment-48283706"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www-01.ibm.com/support/docview.wss?uid=isg3T1024264"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2017-0211.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2017-0212.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2017-0213.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "http://rhn.redhat.com/errata/RHSA-2017-0214.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "http://snoopy.cvs.sourceforge.net/viewvc/snoopy/Snoopy/Snoopy.class.php?r1=1.28\u0026r2=1.29"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Patch",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2014/07/09/11"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Patch",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2014/07/16/10"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Patch",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2014/07/18/2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/68783"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Patch"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1121497"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94738"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://github.com/cogdog/feed2js/pull/12#issuecomment-48283706"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www-01.ibm.com/support/docview.wss?uid=isg3T1024264"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-77"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2018-08-01 14:29
Modified
2024-11-21 02:59
Summary
A privilege escalation vulnerability was found in nagios 4.2.x that occurs in daemon-init.in when creating necessary files and insecurely changing the ownership afterwards. It's possible for the local attacker to create symbolic links before the files are to be created and possibly escalating the privileges with the ownership change.
Impacted products
Vendor Product Version
nagios nagios 4.2.0
nagios nagios 4.2.1
nagios nagios 4.2.2
nagios nagios 4.2.3



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:nagios:nagios:4.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D960AF89-A2C5-4171-8E87-E3EABBE006B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:4.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D771D732-FF04-4B4B-AC59-0626BDD7216E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:4.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE63D733-D2C2-4468-ADE1-4F1ED33BEE76",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:4.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "259150A0-6283-4C6D-99E2-B6DD6110FE12",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A privilege escalation vulnerability was found in nagios 4.2.x that occurs in daemon-init.in when creating necessary files and insecurely changing the ownership afterwards. It\u0027s possible for the local attacker to create symbolic links before the files are to be created and possibly escalating the privileges with the ownership change."
    },
    {
      "lang": "es",
      "value": "Se ha encontrado una vulnerabilidad de escalado de privilegios en nagios 4.2.x que ocurre en daemon-init.in al crear archivos necesarios y, posteriormente, cambiar de forma no segura la propiedad. Es posible que el atacante local cree v\u00ednculos simb\u00f3licos antes de que se creen los archivos y escale privilegios con el cambio de propiedad."
    }
  ],
  "id": "CVE-2016-8641",
  "lastModified": "2024-11-21T02:59:44.760",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.2,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "secalert@redhat.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2018-08-01T14:29:00.253",
  "references": [
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/95121"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Issue Tracking",
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8641"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://github.com/NagiosEnterprises/nagioscore/commit/f2ed227673d3b2da643eb5cad26b2d87674f28c1.patch"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.gentoo.org/glsa/201702-26"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Exploit",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://www.exploit-db.com/exploits/40774/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/95121"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8641"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://github.com/NagiosEnterprises/nagioscore/commit/f2ed227673d3b2da643eb5cad26b2d87674f28c1.patch"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.gentoo.org/glsa/201702-26"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://www.exploit-db.com/exploits/40774/"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-59"
        }
      ],
      "source": "secalert@redhat.com",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-59"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2014-12-05 16:59
Modified
2024-11-21 02:10
Severity ?
Summary
The check_icmp plugin in Nagios Plugins before 2.0.2 allows local users to obtain sensitive information from INI configuration files via the extra-opts flag, a different vulnerability than CVE-2014-4701.
Impacted products
Vendor Product Version
nagios nagios *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:nagios:nagios:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0E012FD-A29D-4436-AE54-A0054F9431E7",
              "versionEndIncluding": "2.0.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The check_icmp plugin in Nagios Plugins before 2.0.2 allows local users to obtain sensitive information from INI configuration files via the extra-opts flag, a different vulnerability than CVE-2014-4701."
    },
    {
      "lang": "es",
      "value": "El plugin check_icmp en Nagios Plugins anterior a 2.0.2 permite a usuarios locales obtener informaci\u00f3n sensible de los ficheros de configuraciones INI a trav\u00e9s del indicador extra-opts, una vulnerabilidad diferente a CVE-2014-4701."
    }
  ],
  "id": "CVE-2014-4702",
  "lastModified": "2024-11-21T02:10:44.893",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 2.1,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-12-05T16:59:07.393",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://nagios-plugins.org/nagios-plugins-2-0-2-released/?utm_source=Nagios.org\u0026utm_medium=News+Post\u0026utm_content=Nagios%20Plugins%202.0.2%20Released\u0026utm_campaign=Nagios%20Plugins"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/58751"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/61319"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.openwall.com/lists/oss-security/2014/06/30/6"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/68293"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.suse.com/support/update/announcement/2014/suse-su-20141352-1.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://nagios-plugins.org/nagios-plugins-2-0-2-released/?utm_source=Nagios.org\u0026utm_medium=News+Post\u0026utm_content=Nagios%20Plugins%202.0.2%20Released\u0026utm_campaign=Nagios%20Plugins"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/58751"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/61319"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2014/06/30/6"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/68293"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.suse.com/support/update/announcement/2014/suse-su-20141352-1.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-200"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2008-05-13 23:20
Modified
2024-11-21 00:38
Severity ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in CGI programs in Nagios before 2.12 might allow remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different issue than CVE-2007-5624 and CVE-2008-1360.
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:nagios:nagios:1.0b1:*:*:*:*:*:*:*",
              "matchCriteriaId": "52432776-C9C6-4CA7-B3D9-87513CBA5716",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:1.0b2:*:*:*:*:*:*:*",
              "matchCriteriaId": "601958D5-B393-4EFA-9A6F-A5A04A95F4BB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:1.0b3:*:*:*:*:*:*:*",
              "matchCriteriaId": "99B2E88A-A611-43C5-8037-411D6B78EC03",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:1.0b4:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DCEFBFC-38BD-4F78-B068-1A90C6199CEB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:1.0b5:*:*:*:*:*:*:*",
              "matchCriteriaId": "E61ACC55-1002-4FA3-8E5A-52041CE5DCD9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:1.0b6:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C773265-0BE7-463A-8E24-84D804F14AF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A847327-D74E-460C-9F6F-E04C9B77E0C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F7425E3-F152-439B-B95F-5160E4593DBA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5911624-5BD8-4A40-B417-FCD926D352BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF45013F-A844-4726-8B2A-EF602A3BC4C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:1.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0879A39F-7C92-4FD3-9FEF-2E7C4F2C0444",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A91E463-D239-4853-8A63-E01EE7DB319F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.0b1:*:*:*:*:*:*:*",
              "matchCriteriaId": "239CAF7F-E9BF-4D0F-BB99-EF51E1366516",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.0b2:*:*:*:*:*:*:*",
              "matchCriteriaId": "738DF14D-A716-46F0-87AC-2DB2F1E44594",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.0b3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E8E1234-9F0D-4E6F-BF58-5DAE8E41DB85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.0b4:*:*:*:*:*:*:*",
              "matchCriteriaId": "0073F69B-C5FA-470A-BA95-9C4E8033F5CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.0b5:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAA7C5B6-C13D-4814-AA7B-444CF12E4DEF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.0b6:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1209D1C-DD27-41FC-8DAF-BFC0B4B1D602",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.0rc1:*:*:*:*:*:*:*",
              "matchCriteriaId": "39551FFC-E1F0-4D45-ADA6-AB3E74BB576D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.0rc2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BED52AA-BE20-447C-8896-4B591C42F66A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "82DE68E3-7003-4675-96A9-6F7308E1E39C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E3F8DC3-2F34-4E11-A796-4EA7CB17FDDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "7ADCBA8C-06DB-4D85-AEED-807E64A29DFB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D3EE2D7-BD17-4C37-ABA3-79FCE8328EFF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "927B8496-720D-4B15-A12E-52169AFB38D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F9E80B2-E349-488F-A870-9BD50D47A672",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "1121E86B-13EB-4DE3-816A-002C6DC15A70",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C3374C3-9F57-4014-8712-DDDAB52998FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5D4F00F-C732-477B-988A-25F8E8D32D07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7A5D5AC-9E4C-4F3B-A16A-C6DD18DD8D51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "725F9938-0A5C-4A59-BFA4-C58044DE26DB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple cross-site scripting (XSS) vulnerabilities in CGI programs in Nagios before 2.12 might allow remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different issue than CVE-2007-5624 and CVE-2008-1360."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples vulnerabilidades de tipo cross-site scripting (XSS) en programas CGI en Nagios versiones anteriores a  2.12,  podr\u00edan permitir a atacantes remotos inyectar script web o HTML arbitrario por medio  de vectores no especificados, un problema diferente de CVE-2007-5624 y CVE-2008-1360."
    }
  ],
  "id": "CVE-2007-5803",
  "lastModified": "2024-11-21T00:38:43.887",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2008-05-13T23:20:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2008-05/msg00000.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/30202"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/30283"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://sourceforge.net/project/shownotes.php?release_id=600377"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://sourceforge.net/project/shownotes.php?release_id=600377\u0026group_id=26589"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/29140"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2008/1567/references"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42522"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://lists.opensuse.org/opensuse-security-announce/2008-05/msg00000.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/30202"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/30283"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://sourceforge.net/project/shownotes.php?release_id=600377"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://sourceforge.net/project/shownotes.php?release_id=600377\u0026group_id=26589"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/29140"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/1567/references"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42522"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2014-12-05 16:59
Modified
2024-11-21 02:10
Severity ?
Summary
The check_dhcp plugin in Nagios Plugins before 2.0.2 allows local users to obtain sensitive information from INI configuration files via the extra-opts flag, a different vulnerability than CVE-2014-4702.
References
cve@mitre.orghttp://legalhackers.com/advisories/nagios-check_dhcp.txtExploit
cve@mitre.orghttp://nagios-plugins.org/nagios-plugins-2-0-2-released/?utm_source=Nagios.org&utm_medium=News+Post&utm_content=Nagios%20Plugins%202.0.2%20Released&utm_campaign=Nagios%20PluginsPatch, Vendor Advisory
cve@mitre.orghttp://seclists.org/fulldisclosure/2014/May/74Exploit
cve@mitre.orghttp://secunia.com/advisories/58751
cve@mitre.orghttp://secunia.com/advisories/61319
cve@mitre.orghttp://www.exploit-db.com/exploits/33387Exploit
cve@mitre.orghttp://www.openwall.com/lists/oss-security/2014/06/30/6
cve@mitre.orghttp://www.securityfocus.com/bid/67433
cve@mitre.orghttps://www.suse.com/support/update/announcement/2014/suse-su-20141352-1.html
af854a3a-2127-422b-91ae-364da2661108http://legalhackers.com/advisories/nagios-check_dhcp.txtExploit
af854a3a-2127-422b-91ae-364da2661108http://nagios-plugins.org/nagios-plugins-2-0-2-released/?utm_source=Nagios.org&utm_medium=News+Post&utm_content=Nagios%20Plugins%202.0.2%20Released&utm_campaign=Nagios%20PluginsPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://seclists.org/fulldisclosure/2014/May/74Exploit
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/58751
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/61319
af854a3a-2127-422b-91ae-364da2661108http://www.exploit-db.com/exploits/33387Exploit
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2014/06/30/6
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/67433
af854a3a-2127-422b-91ae-364da2661108https://www.suse.com/support/update/announcement/2014/suse-su-20141352-1.html
Impacted products
Vendor Product Version
nagios nagios *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:nagios:nagios:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0E012FD-A29D-4436-AE54-A0054F9431E7",
              "versionEndIncluding": "2.0.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The check_dhcp plugin in Nagios Plugins before 2.0.2 allows local users to obtain sensitive information from INI configuration files via the extra-opts flag, a different vulnerability than CVE-2014-4702."
    },
    {
      "lang": "es",
      "value": "El plugin check_dhcp en Nagios Plugins anterior a 2.0.2 permite a usuarios locales obtener informaci\u00f3n sensible de los ficheros de configuraciones INI a trav\u00e9s del indicador extra-opts, una vulnerabilidad diferente a CVE-2014-4702."
    }
  ],
  "id": "CVE-2014-4701",
  "lastModified": "2024-11-21T02:10:44.743",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 2.1,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-12-05T16:59:05.330",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://legalhackers.com/advisories/nagios-check_dhcp.txt"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://nagios-plugins.org/nagios-plugins-2-0-2-released/?utm_source=Nagios.org\u0026utm_medium=News+Post\u0026utm_content=Nagios%20Plugins%202.0.2%20Released\u0026utm_campaign=Nagios%20Plugins"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://seclists.org/fulldisclosure/2014/May/74"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/58751"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/61319"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.exploit-db.com/exploits/33387"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.openwall.com/lists/oss-security/2014/06/30/6"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/67433"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.suse.com/support/update/announcement/2014/suse-su-20141352-1.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://legalhackers.com/advisories/nagios-check_dhcp.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://nagios-plugins.org/nagios-plugins-2-0-2-released/?utm_source=Nagios.org\u0026utm_medium=News+Post\u0026utm_content=Nagios%20Plugins%202.0.2%20Released\u0026utm_campaign=Nagios%20Plugins"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://seclists.org/fulldisclosure/2014/May/74"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/58751"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/61319"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.exploit-db.com/exploits/33387"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2014/06/30/6"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/67433"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.suse.com/support/update/announcement/2014/suse-su-20141352-1.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-200"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2008-11-10 15:23
Modified
2024-11-21 00:53
Severity ?
Summary
The Nagios process in (1) Nagios before 3.0.5 and (2) op5 Monitor before 4.0.1 allows remote authenticated users to bypass authorization checks, and trigger execution of arbitrary programs by this process, via an (a) custom form or a (b) browser addon.
References
cve@mitre.orghttp://marc.info/?l=bugtraq&m=124156641928637&w=2
cve@mitre.orghttp://marc.info/?l=bugtraq&m=124156641928637&w=2
cve@mitre.orghttp://secunia.com/advisories/33320
cve@mitre.orghttp://secunia.com/advisories/35002
cve@mitre.orghttp://security.gentoo.org/glsa/glsa-200907-15.xml
cve@mitre.orghttp://sourceforge.net/mailarchive/forum.php?thread_name=4914396D.5010009%40op5.se&forum_name=nagios-develPatch, Vendor Advisory
cve@mitre.orghttp://www.nagios.org/development/history/nagios-3x.phpPatch
cve@mitre.orghttp://www.op5.com/support/news/389-important-security-fix-available-for-op5-monitorVendor Advisory
cve@mitre.orghttp://www.openwall.com/lists/oss-security/2008/11/06/2
cve@mitre.orghttp://www.securityfocus.com/bid/32156Patch
cve@mitre.orghttp://www.securitytracker.com/id?1022165
cve@mitre.orghttp://www.ubuntu.com/usn/USN-698-1
cve@mitre.orghttp://www.vupen.com/english/advisories/2008/3029
cve@mitre.orghttp://www.vupen.com/english/advisories/2008/3364
cve@mitre.orghttp://www.vupen.com/english/advisories/2009/1256
cve@mitre.orghttps://www.ubuntu.com/usn/USN-698-3/
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=124156641928637&w=2
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=124156641928637&w=2
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/33320
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/35002
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-200907-15.xml
af854a3a-2127-422b-91ae-364da2661108http://sourceforge.net/mailarchive/forum.php?thread_name=4914396D.5010009%40op5.se&forum_name=nagios-develPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.nagios.org/development/history/nagios-3x.phpPatch
af854a3a-2127-422b-91ae-364da2661108http://www.op5.com/support/news/389-important-security-fix-available-for-op5-monitorVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2008/11/06/2
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/32156Patch
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1022165
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-698-1
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/3029
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/3364
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2009/1256
af854a3a-2127-422b-91ae-364da2661108https://www.ubuntu.com/usn/USN-698-3/



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:nagios:nagios:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "286F0DB6-652E-4F1C-BB94-5D2F1C771697",
              "versionEndIncluding": "3.0.4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CA91B05-9578-46D8-A21C-4E3C4AB4936A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:1.0_b1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C178226A-CBE8-4ECB-BDA7-1E86C61D2A82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:1.0_b2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B75383C-C37C-485F-B6D2-B4A7F2F7B3E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:1.0_b3:*:*:*:*:*:*:*",
              "matchCriteriaId": "67AF4805-B2EE-40F5-8D92-D2953866AD6B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:1.0b1:*:*:*:*:*:*:*",
              "matchCriteriaId": "52432776-C9C6-4CA7-B3D9-87513CBA5716",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:1.0b2:*:*:*:*:*:*:*",
              "matchCriteriaId": "601958D5-B393-4EFA-9A6F-A5A04A95F4BB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:1.0b3:*:*:*:*:*:*:*",
              "matchCriteriaId": "99B2E88A-A611-43C5-8037-411D6B78EC03",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:1.0b4:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DCEFBFC-38BD-4F78-B068-1A90C6199CEB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:1.0b5:*:*:*:*:*:*:*",
              "matchCriteriaId": "E61ACC55-1002-4FA3-8E5A-52041CE5DCD9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:1.0b6:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C773265-0BE7-463A-8E24-84D804F14AF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A847327-D74E-460C-9F6F-E04C9B77E0C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F7425E3-F152-439B-B95F-5160E4593DBA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5911624-5BD8-4A40-B417-FCD926D352BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF45013F-A844-4726-8B2A-EF602A3BC4C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:1.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0879A39F-7C92-4FD3-9FEF-2E7C4F2C0444",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A91E463-D239-4853-8A63-E01EE7DB319F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.0b1:*:*:*:*:*:*:*",
              "matchCriteriaId": "239CAF7F-E9BF-4D0F-BB99-EF51E1366516",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.0b2:*:*:*:*:*:*:*",
              "matchCriteriaId": "738DF14D-A716-46F0-87AC-2DB2F1E44594",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.0b3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E8E1234-9F0D-4E6F-BF58-5DAE8E41DB85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.0b4:*:*:*:*:*:*:*",
              "matchCriteriaId": "0073F69B-C5FA-470A-BA95-9C4E8033F5CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.0b5:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAA7C5B6-C13D-4814-AA7B-444CF12E4DEF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.0b6:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1209D1C-DD27-41FC-8DAF-BFC0B4B1D602",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.0rc1:*:*:*:*:*:*:*",
              "matchCriteriaId": "39551FFC-E1F0-4D45-ADA6-AB3E74BB576D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.0rc2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BED52AA-BE20-447C-8896-4B591C42F66A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "82DE68E3-7003-4675-96A9-6F7308E1E39C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E3F8DC3-2F34-4E11-A796-4EA7CB17FDDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "7ADCBA8C-06DB-4D85-AEED-807E64A29DFB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D3EE2D7-BD17-4C37-ABA3-79FCE8328EFF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "927B8496-720D-4B15-A12E-52169AFB38D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F9E80B2-E349-488F-A870-9BD50D47A672",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "1121E86B-13EB-4DE3-816A-002C6DC15A70",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C3374C3-9F57-4014-8712-DDDAB52998FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5D4F00F-C732-477B-988A-25F8E8D32D07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7A5D5AC-9E4C-4F3B-A16A-C6DD18DD8D51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "725F9938-0A5C-4A59-BFA4-C58044DE26DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDCA77EF-1020-4068-9CDC-5CF3B0CD66A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:alpha1:*:*:*:*:*:*",
              "matchCriteriaId": "751C46D5-877F-454B-8488-BBCA10CA4930",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:alpha2:*:*:*:*:*:*",
              "matchCriteriaId": "F4754494-17BE-496E-A7B8-453B3028CC45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:alpha3:*:*:*:*:*:*",
              "matchCriteriaId": "CD15E8FA-04D3-4625-BEA5-9F5CC0337699",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:alpha4:*:*:*:*:*:*",
              "matchCriteriaId": "713C5F3E-AA57-4F52-AC0A-9B1F25C25580",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "0AFABA9F-4A45-4150-AED1-897267076A32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "830BB564-82FD-4519-A8EA-DCDF74F2BC54",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "9A975310-9591-4EBF-B987-CA43433B4C54",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "8653D6A2-4B5B-4F1D-A898-8F81F29C6FC2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:beta5:*:*:*:*:*:*",
              "matchCriteriaId": "D18649FF-8838-432E-93B8-3F8B82B0DEA9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:beta6:*:*:*:*:*:*",
              "matchCriteriaId": "9375EA90-0763-4817-8C7D-2D7E116E043F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:beta7:*:*:*:*:*:*",
              "matchCriteriaId": "C02C2F95-2AC2-4E0C-B5D0-785CDF1EDB85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "12E7BC34-65F0-4DD6-8809-F05320955479",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "390CFA92-68AE-4DE9-A199-1B7290A82168",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "1E56F249-3E6A-4764-8CAE-D3E5B6A86AB3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "953745B7-1381-47F5-8012-E699EFA065CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "87A8A3DA-61AF-4369-ACB0-7D54EEB1DAA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "40B7525F-EEE1-4537-BCE6-15DF3E348FEF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:op5:monitor:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A9A803F-1AD0-4359-B08C-79A68818BCA3",
              "versionEndIncluding": "4.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:op5:monitor:2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "B40BB586-111A-427F-9B16-53423B0AD939",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:op5:monitor:2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "061C311A-ABC7-49CA-B2FC-021A5E003000",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:op5:monitor:2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF2D71BF-88DE-4963-9313-30BFEC24DB37",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:op5:monitor:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3DA7FD7-C403-4086-AC2F-A51CE368FFF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:op5:monitor:3.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4D52212-93AF-4397-B87B-7D778589F547",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:op5:monitor:3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "B760C26C-40A8-43DD-ADEA-7E2F0C8443A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:op5:monitor:3.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "30126655-10BC-4EBF-9D60-D97EBFC8C6DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:op5:monitor:3.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "516245EB-0DB3-48F0-917D-B93135C287BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:op5:monitor:3.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "3BB3AA0C-8439-4B87-BC36-DBF0F2E4C794",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:op5:monitor:3.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "6BA52C25-22A5-460F-82B8-E9CB6A3CF618",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The Nagios process in (1) Nagios before 3.0.5 and (2) op5 Monitor before 4.0.1 allows remote authenticated users to bypass authorization checks, and trigger execution of arbitrary programs by this process, via an (a) custom form or a (b) browser addon."
    },
    {
      "lang": "es",
      "value": "El proceso Nagios en (1) Nagios anterior a v3.0.5 y (2) op5 Monitor anterior a v4.0.1 ; permite a usuarios autenticados en remoto evitar las comprobaciones de autorizaci\u00f3n y provocar la ejecuci\u00f3n de ficheros de su elecci\u00f3n por este proceso a trav\u00e9s de (a) un formulario personalizado o (b) un complemento para el navegador."
    }
  ],
  "id": "CVE-2008-5027",
  "lastModified": "2024-11-21T00:53:06.740",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": true,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2008-11-10T15:23:29.533",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=124156641928637\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=124156641928637\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/33320"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/35002"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://security.gentoo.org/glsa/glsa-200907-15.xml"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://sourceforge.net/mailarchive/forum.php?thread_name=4914396D.5010009%40op5.se\u0026forum_name=nagios-devel"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.nagios.org/development/history/nagios-3x.php"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.op5.com/support/news/389-important-security-fix-available-for-op5-monitor"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.openwall.com/lists/oss-security/2008/11/06/2"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/32156"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id?1022165"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ubuntu.com/usn/USN-698-1"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2008/3029"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2008/3364"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2009/1256"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.ubuntu.com/usn/USN-698-3/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=124156641928637\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=124156641928637\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/33320"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/35002"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-200907-15.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://sourceforge.net/mailarchive/forum.php?thread_name=4914396D.5010009%40op5.se\u0026forum_name=nagios-devel"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.nagios.org/development/history/nagios-3x.php"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.op5.com/support/news/389-important-security-fix-available-for-op5-monitor"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2008/11/06/2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/32156"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1022165"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-698-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/3029"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/3364"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2009/1256"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.ubuntu.com/usn/USN-698-3/"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-264"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2009-07-01 13:00
Modified
2024-11-21 01:04
Severity ?
Summary
statuswml.cgi in Nagios before 3.1.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) ping or (2) Traceroute parameters.
References
cve@mitre.orghttp://marc.info/?l=bugtraq&m=126996888626964&w=2
cve@mitre.orghttp://marc.info/?l=bugtraq&m=126996888626964&w=2
cve@mitre.orghttp://secunia.com/advisories/35543Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/35688
cve@mitre.orghttp://secunia.com/advisories/35692
cve@mitre.orghttp://secunia.com/advisories/39227
cve@mitre.orghttp://security.gentoo.org/glsa/glsa-200907-15.xml
cve@mitre.orghttp://tracker.nagios.org/view.php?id=15Exploit
cve@mitre.orghttp://www.debian.org/security/2009/dsa-1825
cve@mitre.orghttp://www.nagios.org/development/history/core-3x/
cve@mitre.orghttp://www.securitytracker.com/id?1022503
cve@mitre.orghttp://www.ubuntu.com/usn/USN-795-1
cve@mitre.orghttp://www.vupen.com/english/advisories/2010/0750
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=126996888626964&w=2
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=126996888626964&w=2
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/35543Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/35688
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/35692
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/39227
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-200907-15.xml
af854a3a-2127-422b-91ae-364da2661108http://tracker.nagios.org/view.php?id=15Exploit
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2009/dsa-1825
af854a3a-2127-422b-91ae-364da2661108http://www.nagios.org/development/history/core-3x/
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1022503
af854a3a-2127-422b-91ae-364da2661108http://www.ubuntu.com/usn/USN-795-1
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2010/0750



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:nagios:nagios:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "19A78517-7672-4267-924E-1C18F41B10C9",
              "versionEndIncluding": "3.1.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CA91B05-9578-46D8-A21C-4E3C4AB4936A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:1.0b1:*:*:*:*:*:*:*",
              "matchCriteriaId": "52432776-C9C6-4CA7-B3D9-87513CBA5716",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:1.0b2:*:*:*:*:*:*:*",
              "matchCriteriaId": "601958D5-B393-4EFA-9A6F-A5A04A95F4BB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:1.0b4:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DCEFBFC-38BD-4F78-B068-1A90C6199CEB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A847327-D74E-460C-9F6F-E04C9B77E0C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:1.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0879A39F-7C92-4FD3-9FEF-2E7C4F2C0444",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A91E463-D239-4853-8A63-E01EE7DB319F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.0b4:*:*:*:*:*:*:*",
              "matchCriteriaId": "0073F69B-C5FA-470A-BA95-9C4E8033F5CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "1121E86B-13EB-4DE3-816A-002C6DC15A70",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7A5D5AC-9E4C-4F3B-A16A-C6DD18DD8D51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDCA77EF-1020-4068-9CDC-5CF3B0CD66A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:alpha1:*:*:*:*:*:*",
              "matchCriteriaId": "751C46D5-877F-454B-8488-BBCA10CA4930",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:alpha2:*:*:*:*:*:*",
              "matchCriteriaId": "F4754494-17BE-496E-A7B8-453B3028CC45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:alpha3:*:*:*:*:*:*",
              "matchCriteriaId": "CD15E8FA-04D3-4625-BEA5-9F5CC0337699",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:alpha4:*:*:*:*:*:*",
              "matchCriteriaId": "713C5F3E-AA57-4F52-AC0A-9B1F25C25580",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "0AFABA9F-4A45-4150-AED1-897267076A32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "830BB564-82FD-4519-A8EA-DCDF74F2BC54",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "9A975310-9591-4EBF-B987-CA43433B4C54",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "8653D6A2-4B5B-4F1D-A898-8F81F29C6FC2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:beta5:*:*:*:*:*:*",
              "matchCriteriaId": "D18649FF-8838-432E-93B8-3F8B82B0DEA9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:beta6:*:*:*:*:*:*",
              "matchCriteriaId": "9375EA90-0763-4817-8C7D-2D7E116E043F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:beta7:*:*:*:*:*:*",
              "matchCriteriaId": "C02C2F95-2AC2-4E0C-B5D0-785CDF1EDB85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "12E7BC34-65F0-4DD6-8809-F05320955479",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "390CFA92-68AE-4DE9-A199-1B7290A82168",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "1E56F249-3E6A-4764-8CAE-D3E5B6A86AB3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "953745B7-1381-47F5-8012-E699EFA065CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "87A8A3DA-61AF-4369-ACB0-7D54EEB1DAA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "40B7525F-EEE1-4537-BCE6-15DF3E348FEF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B831C72-C932-4B8C-8B16-C3BC2672AF98",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC5BB3C9-BBC6-43D8-830A-38020F50B148",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC9E1C24-9907-44F4-9166-5C679F05DF12",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "statuswml.cgi in Nagios before 3.1.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) ping or (2) Traceroute parameters."
    },
    {
      "lang": "es",
      "value": "statuswml.cgi en Nagios v3.1.1, permite a atacantes remotos ejecutar comandos de su elecci\u00f3n a trav\u00e9s de metacaracteres de consola en los par\u00e1metros (1) ping o (2) Traceroute."
    }
  ],
  "id": "CVE-2009-2288",
  "lastModified": "2024-11-21T01:04:31.717",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2009-07-01T13:00:01.827",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=126996888626964\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=126996888626964\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/35543"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/35688"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/35692"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/39227"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://security.gentoo.org/glsa/glsa-200907-15.xml"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://tracker.nagios.org/view.php?id=15"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2009/dsa-1825"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.nagios.org/development/history/core-3x/"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id?1022503"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.ubuntu.com/usn/USN-795-1"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2010/0750"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=126996888626964\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=126996888626964\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/35543"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/35688"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/35692"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/39227"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-200907-15.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://tracker.nagios.org/view.php?id=15"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2009/dsa-1825"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.nagios.org/development/history/core-3x/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1022503"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.ubuntu.com/usn/USN-795-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2010/0750"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-78"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2016-12-15 22:59
Modified
2024-11-21 03:01
Severity ?
Summary
MagpieRSS, as used in the front-end component in Nagios Core before 4.2.2 might allow remote attackers to read or write to arbitrary files by spoofing a crafted response from the Nagios RSS feed server. NOTE: this vulnerability exists because of an incomplete fix for CVE-2008-4796.
References
cve@mitre.orghttp://packetstormsecurity.com/files/140169/Nagios-Core-Curl-Command-Injection-Code-Execution.htmlExploit, Third Party Advisory, VDB Entry
cve@mitre.orghttp://rhn.redhat.com/errata/RHSA-2017-0211.html
cve@mitre.orghttp://rhn.redhat.com/errata/RHSA-2017-0212.html
cve@mitre.orghttp://rhn.redhat.com/errata/RHSA-2017-0213.html
cve@mitre.orghttp://rhn.redhat.com/errata/RHSA-2017-0214.html
cve@mitre.orghttp://rhn.redhat.com/errata/RHSA-2017-0258.html
cve@mitre.orghttp://rhn.redhat.com/errata/RHSA-2017-0259.html
cve@mitre.orghttp://seclists.org/fulldisclosure/2016/Dec/57Mailing List, Third Party Advisory
cve@mitre.orghttp://www.securityfocus.com/archive/1/539925/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/bid/94922Third Party Advisory, VDB Entry
cve@mitre.orghttp://www.securitytracker.com/id/1037488
cve@mitre.orghttps://legalhackers.com/advisories/Nagios-Exploit-Command-Injection-CVE-2016-9565-2008-4796.htmlExploit, Third Party Advisory
cve@mitre.orghttps://security.gentoo.org/glsa/201702-26
cve@mitre.orghttps://security.gentoo.org/glsa/201710-20
cve@mitre.orghttps://www.exploit-db.com/exploits/40920/
cve@mitre.orghttps://www.nagios.org/projects/nagios-core/history/4x/Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://packetstormsecurity.com/files/140169/Nagios-Core-Curl-Command-Injection-Code-Execution.htmlExploit, Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2017-0211.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2017-0212.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2017-0213.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2017-0214.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2017-0258.html
af854a3a-2127-422b-91ae-364da2661108http://rhn.redhat.com/errata/RHSA-2017-0259.html
af854a3a-2127-422b-91ae-364da2661108http://seclists.org/fulldisclosure/2016/Dec/57Mailing List, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/539925/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/94922Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id/1037488
af854a3a-2127-422b-91ae-364da2661108https://legalhackers.com/advisories/Nagios-Exploit-Command-Injection-CVE-2016-9565-2008-4796.htmlExploit, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://security.gentoo.org/glsa/201702-26
af854a3a-2127-422b-91ae-364da2661108https://security.gentoo.org/glsa/201710-20
af854a3a-2127-422b-91ae-364da2661108https://www.exploit-db.com/exploits/40920/
af854a3a-2127-422b-91ae-364da2661108https://www.nagios.org/projects/nagios-core/history/4x/Vendor Advisory
Impacted products
Vendor Product Version
nagios nagios *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:nagios:nagios:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "61838238-588B-48A8-879C-DE0F84E47967",
              "versionEndIncluding": "4.2.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "MagpieRSS, as used in the front-end component in Nagios Core before 4.2.2 might allow remote attackers to read or write to arbitrary files by spoofing a crafted response from the Nagios RSS feed server.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2008-4796."
    },
    {
      "lang": "es",
      "value": "MagpieRSS, como es usado en el componente front-end en Nagios Core en versiones anteriores a 4.2.2 podr\u00eda permitir a atacantes remotos leer o escribir archivos arbitrarios falsificando una respuesta manipulada del servidor de alimentaci\u00f3n Nagios RSS. NOTA: esta vulnerabilidad existe debido a una incompleta reparaci\u00f3n de CVE-2008-4796."
    }
  ],
  "id": "CVE-2016-9565",
  "lastModified": "2024-11-21T03:01:24.010",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2016-12-15T22:59:00.460",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://packetstormsecurity.com/files/140169/Nagios-Core-Curl-Command-Injection-Code-Execution.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://rhn.redhat.com/errata/RHSA-2017-0211.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://rhn.redhat.com/errata/RHSA-2017-0212.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://rhn.redhat.com/errata/RHSA-2017-0213.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://rhn.redhat.com/errata/RHSA-2017-0214.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://rhn.redhat.com/errata/RHSA-2017-0258.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://rhn.redhat.com/errata/RHSA-2017-0259.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://seclists.org/fulldisclosure/2016/Dec/57"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/539925/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/94922"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id/1037488"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://legalhackers.com/advisories/Nagios-Exploit-Command-Injection-CVE-2016-9565-2008-4796.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://security.gentoo.org/glsa/201702-26"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://security.gentoo.org/glsa/201710-20"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.exploit-db.com/exploits/40920/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.nagios.org/projects/nagios-core/history/4x/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://packetstormsecurity.com/files/140169/Nagios-Core-Curl-Command-Injection-Code-Execution.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2017-0211.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2017-0212.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2017-0213.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2017-0214.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2017-0258.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://rhn.redhat.com/errata/RHSA-2017-0259.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://seclists.org/fulldisclosure/2016/Dec/57"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/539925/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/94922"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id/1037488"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Third Party Advisory"
      ],
      "url": "https://legalhackers.com/advisories/Nagios-Exploit-Command-Injection-CVE-2016-9565-2008-4796.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://security.gentoo.org/glsa/201702-26"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://security.gentoo.org/glsa/201710-20"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.exploit-db.com/exploits/40920/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.nagios.org/projects/nagios-core/history/4x/"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-284"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2017-03-31 16:59
Modified
2024-11-21 00:58
Severity ?
Summary
The _httpsrequest function in Snoopy allows remote attackers to execute arbitrary commands. NOTE: this issue exists dues to an incomplete fix for CVE-2008-4796.
References
cve@mitre.orghttp://snoopy.cvs.sourceforge.net/viewvc/snoopy/Snoopy/Snoopy.class.php?view=log#rev1.27Patch, Third Party Advisory
cve@mitre.orghttp://www.openwall.com/lists/oss-security/2014/07/09/11Mailing List, Patch, Third Party Advisory
cve@mitre.orghttp://www.openwall.com/lists/oss-security/2014/07/16/10Mailing List, Patch, Third Party Advisory
cve@mitre.orghttp://www.openwall.com/lists/oss-security/2014/07/18/2Mailing List, Patch, Third Party Advisory
cve@mitre.orghttp://www.securityfocus.com/bid/68776Third Party Advisory, VDB Entry
cve@mitre.orghttps://bugzilla.redhat.com/show_bug.cgi?id=1121497Issue Tracking, Patch
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/94737Third Party Advisory, VDB Entry
cve@mitre.orghttps://rhn.redhat.com/errata/RHSA-2017-0211.htmlPatch, Third Party Advisory
cve@mitre.orghttps://rhn.redhat.com/errata/RHSA-2017-0212.htmlPatch, Third Party Advisory
cve@mitre.orghttps://rhn.redhat.com/errata/RHSA-2017-0213.htmlPatch, Third Party Advisory
cve@mitre.orghttps://rhn.redhat.com/errata/RHSA-2017-0214.htmlPatch, Third Party Advisory
cve@mitre.orghttps://security.gentoo.org/glsa/201702-26Patch, Third Party Advisory, VDB Entry
cve@mitre.orghttps://www-01.ibm.com/support/docview.wss?uid=isg3T1024264Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://snoopy.cvs.sourceforge.net/viewvc/snoopy/Snoopy/Snoopy.class.php?view=log#rev1.27Patch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2014/07/09/11Mailing List, Patch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2014/07/16/10Mailing List, Patch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2014/07/18/2Mailing List, Patch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/68776Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=1121497Issue Tracking, Patch
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/94737Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108https://rhn.redhat.com/errata/RHSA-2017-0211.htmlPatch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://rhn.redhat.com/errata/RHSA-2017-0212.htmlPatch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://rhn.redhat.com/errata/RHSA-2017-0213.htmlPatch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://rhn.redhat.com/errata/RHSA-2017-0214.htmlPatch, Third Party Advisory
af854a3a-2127-422b-91ae-364da2661108https://security.gentoo.org/glsa/201702-26Patch, Third Party Advisory, VDB Entry
af854a3a-2127-422b-91ae-364da2661108https://www-01.ibm.com/support/docview.wss?uid=isg3T1024264Third Party Advisory
Impacted products
Vendor Product Version
snoopy snoopy -
redhat openstack 5.0
redhat openstack 6.0
nagios nagios *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:snoopy:snoopy:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0E13E52-C863-4679-9B96-476DD95B4FC2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:redhat:openstack:5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B152EDF3-3140-4343-802F-F4F1C329F5C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:redhat:openstack:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "31EC146C-A6F6-4C0D-AF87-685286262DAA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:nagios:nagios:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C4E32CA-1439-4B07-BBB2-38DCD001BD6A",
              "versionEndIncluding": "4.2.3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The _httpsrequest function in Snoopy allows remote attackers to execute arbitrary commands.  NOTE: this issue exists dues to an incomplete fix for CVE-2008-4796."
    },
    {
      "lang": "es",
      "value": "La funci\u00f3n _httpsrequest en Snoopy permite a atacantes remotos ejecutar comandos arbitrarios. NOTA: este problema existe debido a una soluci\u00f3n incompleta para CVE-2008-4796."
    }
  ],
  "id": "CVE-2008-7313",
  "lastModified": "2024-11-21T00:58:48.240",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2017-03-31T16:59:00.177",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "http://snoopy.cvs.sourceforge.net/viewvc/snoopy/Snoopy/Snoopy.class.php?view=log#rev1.27"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Patch",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2014/07/09/11"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Patch",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2014/07/16/10"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mailing List",
        "Patch",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2014/07/18/2"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/68776"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Issue Tracking",
        "Patch"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1121497"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94737"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://rhn.redhat.com/errata/RHSA-2017-0211.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://rhn.redhat.com/errata/RHSA-2017-0212.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://rhn.redhat.com/errata/RHSA-2017-0213.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://rhn.redhat.com/errata/RHSA-2017-0214.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://security.gentoo.org/glsa/201702-26"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www-01.ibm.com/support/docview.wss?uid=isg3T1024264"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "http://snoopy.cvs.sourceforge.net/viewvc/snoopy/Snoopy/Snoopy.class.php?view=log#rev1.27"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Patch",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2014/07/09/11"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Patch",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2014/07/16/10"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Patch",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2014/07/18/2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/68776"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Issue Tracking",
        "Patch"
      ],
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1121497"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94737"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://rhn.redhat.com/errata/RHSA-2017-0211.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://rhn.redhat.com/errata/RHSA-2017-0212.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://rhn.redhat.com/errata/RHSA-2017-0213.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory"
      ],
      "url": "https://rhn.redhat.com/errata/RHSA-2017-0214.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://security.gentoo.org/glsa/201702-26"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www-01.ibm.com/support/docview.wss?uid=isg3T1024264"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-77"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2014-12-05 16:59
Modified
2024-11-21 02:10
Severity ?
Summary
lib/parse_ini.c in Nagios Plugins 2.0.2 allows local users to obtain sensitive information via a symlink attack on the configuration file in the extra-opts flag. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-4701.
Impacted products
Vendor Product Version
nagios nagios 2.0.2



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8081639-4F7A-498D-97CE-8E700C29E441",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "lib/parse_ini.c in Nagios Plugins 2.0.2 allows local users to obtain sensitive information via a symlink attack on the configuration file in the extra-opts flag.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-4701."
    },
    {
      "lang": "es",
      "value": "lib/parse_ini.c en Nagios Plugins 2.0.2 permite a usuarios locales obtener informaci\u00f3n sensible a trav\u00e9s de un ataque de enlace simb\u00f3lico en el ficheros de configuraciones en el indicador extra-opts. NOTA:esta vulnerabilidad existe debido a una soluci\u00f3n incompleta para CVE-2014-4701."
    }
  ],
  "id": "CVE-2014-4703",
  "lastModified": "2024-11-21T02:10:45.033",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 2.1,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-12-05T16:59:08.597",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://nagios-plugins.org/nagios-plugins-2-0-3-released/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://seclists.org/fulldisclosure/2014/Jun/141"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.openwall.com/lists/oss-security/2014/06/30/6"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/76810"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://nagios-plugins.org/nagios-plugins-2-0-3-released/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://seclists.org/fulldisclosure/2014/Jun/141"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2014/06/30/6"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/76810"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-59"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-03-16 16:15
Modified
2024-11-21 05:36
Summary
Nagios Log Server 2.1.3 has CSRF.
Impacted products
Vendor Product Version
nagios nagios 2.1.3



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "750FFD82-3737-458C-941C-5E2864DEFB76",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Nagios Log Server 2.1.3 has CSRF."
    },
    {
      "lang": "es",
      "value": "Nagios Log Server versi\u00f3n 2.1.3, presenta una vulnerabilidad de tipo CSRF."
    }
  ],
  "id": "CVE-2020-6585",
  "lastModified": "2024-11-21T05:36:00.807",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-03-16T16:15:14.437",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Release Notes",
        "Vendor Advisory"
      ],
      "url": "https://assets.nagios.com/downloads/nagios-log-server/CHANGES.TXT"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://medium.com/%40fixitt6/multiple-vulnerabilities-in-nagios-log-server-2-1-3-af7c160edc60"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Product"
      ],
      "url": "https://www.nagios.com/products/nagios-log-server/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Release Notes",
        "Vendor Advisory"
      ],
      "url": "https://assets.nagios.com/downloads/nagios-log-server/CHANGES.TXT"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://medium.com/%40fixitt6/multiple-vulnerabilities-in-nagios-log-server-2-1-3-af7c160edc60"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Product"
      ],
      "url": "https://www.nagios.com/products/nagios-log-server/"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-352"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2008-11-10 15:23
Modified
2024-11-21 00:53
Severity ?
Summary
Cross-site request forgery (CSRF) vulnerability in cmd.cgi in (1) Nagios 3.0.5 and (2) op5 Monitor before 4.0.1 allows remote attackers to send commands to the Nagios process, and trigger execution of arbitrary programs by this process, via unspecified HTTP requests.
References
cve@mitre.orghttp://git.op5.org/git/?p=nagios.git%3Ba=commit%3Bh=814d8d4d1a73f7151eeed187c0667585d79fea18
cve@mitre.orghttp://marc.info/?l=bugtraq&m=124156641928637&w=2
cve@mitre.orghttp://marc.info/?l=bugtraq&m=124156641928637&w=2
cve@mitre.orghttp://osvdb.org/49678
cve@mitre.orghttp://secunia.com/advisories/32610Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/32630
cve@mitre.orghttp://secunia.com/advisories/33320
cve@mitre.orghttp://secunia.com/advisories/35002
cve@mitre.orghttp://security.gentoo.org/glsa/glsa-200907-15.xml
cve@mitre.orghttp://sourceforge.net/mailarchive/forum.php?thread_name=4914396D.5010009%40op5.se&forum_name=nagios-develPatch
cve@mitre.orghttp://www.op5.com/support/news/389-important-security-fix-available-for-op5-monitorPatch, Vendor Advisory
cve@mitre.orghttp://www.openwall.com/lists/oss-security/2008/11/06/2
cve@mitre.orghttp://www.securitytracker.com/id?1022165
cve@mitre.orghttp://www.vupen.com/english/advisories/2008/3029
cve@mitre.orghttp://www.vupen.com/english/advisories/2009/1256
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/46426
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/46521
cve@mitre.orghttps://www.ubuntu.com/usn/USN-698-3/
af854a3a-2127-422b-91ae-364da2661108http://git.op5.org/git/?p=nagios.git%3Ba=commit%3Bh=814d8d4d1a73f7151eeed187c0667585d79fea18
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=124156641928637&w=2
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=124156641928637&w=2
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/49678
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/32610Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/32630
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/33320
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/35002
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-200907-15.xml
af854a3a-2127-422b-91ae-364da2661108http://sourceforge.net/mailarchive/forum.php?thread_name=4914396D.5010009%40op5.se&forum_name=nagios-develPatch
af854a3a-2127-422b-91ae-364da2661108http://www.op5.com/support/news/389-important-security-fix-available-for-op5-monitorPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2008/11/06/2
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1022165
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/3029
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2009/1256
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/46426
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/46521
af854a3a-2127-422b-91ae-364da2661108https://www.ubuntu.com/usn/USN-698-3/



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:nagios:nagios:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "286F0DB6-652E-4F1C-BB94-5D2F1C771697",
              "versionEndIncluding": "3.0.4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CA91B05-9578-46D8-A21C-4E3C4AB4936A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:1.0_b1:*:*:*:*:*:*:*",
              "matchCriteriaId": "C178226A-CBE8-4ECB-BDA7-1E86C61D2A82",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:1.0_b2:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B75383C-C37C-485F-B6D2-B4A7F2F7B3E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:1.0_b3:*:*:*:*:*:*:*",
              "matchCriteriaId": "67AF4805-B2EE-40F5-8D92-D2953866AD6B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:1.0b1:*:*:*:*:*:*:*",
              "matchCriteriaId": "52432776-C9C6-4CA7-B3D9-87513CBA5716",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:1.0b2:*:*:*:*:*:*:*",
              "matchCriteriaId": "601958D5-B393-4EFA-9A6F-A5A04A95F4BB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:1.0b3:*:*:*:*:*:*:*",
              "matchCriteriaId": "99B2E88A-A611-43C5-8037-411D6B78EC03",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:1.0b4:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DCEFBFC-38BD-4F78-B068-1A90C6199CEB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:1.0b5:*:*:*:*:*:*:*",
              "matchCriteriaId": "E61ACC55-1002-4FA3-8E5A-52041CE5DCD9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:1.0b6:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C773265-0BE7-463A-8E24-84D804F14AF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A847327-D74E-460C-9F6F-E04C9B77E0C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F7425E3-F152-439B-B95F-5160E4593DBA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5911624-5BD8-4A40-B417-FCD926D352BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF45013F-A844-4726-8B2A-EF602A3BC4C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:1.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0879A39F-7C92-4FD3-9FEF-2E7C4F2C0444",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A91E463-D239-4853-8A63-E01EE7DB319F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.0b1:*:*:*:*:*:*:*",
              "matchCriteriaId": "239CAF7F-E9BF-4D0F-BB99-EF51E1366516",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.0b2:*:*:*:*:*:*:*",
              "matchCriteriaId": "738DF14D-A716-46F0-87AC-2DB2F1E44594",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.0b3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E8E1234-9F0D-4E6F-BF58-5DAE8E41DB85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.0b4:*:*:*:*:*:*:*",
              "matchCriteriaId": "0073F69B-C5FA-470A-BA95-9C4E8033F5CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.0b5:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAA7C5B6-C13D-4814-AA7B-444CF12E4DEF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.0b6:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1209D1C-DD27-41FC-8DAF-BFC0B4B1D602",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.0rc1:*:*:*:*:*:*:*",
              "matchCriteriaId": "39551FFC-E1F0-4D45-ADA6-AB3E74BB576D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.0rc2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BED52AA-BE20-447C-8896-4B591C42F66A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "82DE68E3-7003-4675-96A9-6F7308E1E39C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E3F8DC3-2F34-4E11-A796-4EA7CB17FDDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "7ADCBA8C-06DB-4D85-AEED-807E64A29DFB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D3EE2D7-BD17-4C37-ABA3-79FCE8328EFF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "927B8496-720D-4B15-A12E-52169AFB38D4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F9E80B2-E349-488F-A870-9BD50D47A672",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "1121E86B-13EB-4DE3-816A-002C6DC15A70",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C3374C3-9F57-4014-8712-DDDAB52998FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5D4F00F-C732-477B-988A-25F8E8D32D07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7A5D5AC-9E4C-4F3B-A16A-C6DD18DD8D51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "725F9938-0A5C-4A59-BFA4-C58044DE26DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDCA77EF-1020-4068-9CDC-5CF3B0CD66A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:alpha1:*:*:*:*:*:*",
              "matchCriteriaId": "751C46D5-877F-454B-8488-BBCA10CA4930",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:alpha2:*:*:*:*:*:*",
              "matchCriteriaId": "F4754494-17BE-496E-A7B8-453B3028CC45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:alpha3:*:*:*:*:*:*",
              "matchCriteriaId": "CD15E8FA-04D3-4625-BEA5-9F5CC0337699",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:alpha4:*:*:*:*:*:*",
              "matchCriteriaId": "713C5F3E-AA57-4F52-AC0A-9B1F25C25580",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "0AFABA9F-4A45-4150-AED1-897267076A32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "830BB564-82FD-4519-A8EA-DCDF74F2BC54",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "9A975310-9591-4EBF-B987-CA43433B4C54",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "8653D6A2-4B5B-4F1D-A898-8F81F29C6FC2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:beta5:*:*:*:*:*:*",
              "matchCriteriaId": "D18649FF-8838-432E-93B8-3F8B82B0DEA9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:beta6:*:*:*:*:*:*",
              "matchCriteriaId": "9375EA90-0763-4817-8C7D-2D7E116E043F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:beta7:*:*:*:*:*:*",
              "matchCriteriaId": "C02C2F95-2AC2-4E0C-B5D0-785CDF1EDB85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "12E7BC34-65F0-4DD6-8809-F05320955479",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "390CFA92-68AE-4DE9-A199-1B7290A82168",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "1E56F249-3E6A-4764-8CAE-D3E5B6A86AB3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "953745B7-1381-47F5-8012-E699EFA065CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "87A8A3DA-61AF-4369-ACB0-7D54EEB1DAA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "40B7525F-EEE1-4537-BCE6-15DF3E348FEF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:op5:monitor:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A9A803F-1AD0-4359-B08C-79A68818BCA3",
              "versionEndIncluding": "4.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:op5:monitor:2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "B40BB586-111A-427F-9B16-53423B0AD939",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:op5:monitor:2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "061C311A-ABC7-49CA-B2FC-021A5E003000",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:op5:monitor:2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF2D71BF-88DE-4963-9313-30BFEC24DB37",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:op5:monitor:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3DA7FD7-C403-4086-AC2F-A51CE368FFF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:op5:monitor:3.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4D52212-93AF-4397-B87B-7D778589F547",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:op5:monitor:3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "B760C26C-40A8-43DD-ADEA-7E2F0C8443A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:op5:monitor:3.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "30126655-10BC-4EBF-9D60-D97EBFC8C6DF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:op5:monitor:3.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "516245EB-0DB3-48F0-917D-B93135C287BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:op5:monitor:3.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "3BB3AA0C-8439-4B87-BC36-DBF0F2E4C794",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:op5:monitor:3.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "6BA52C25-22A5-460F-82B8-E9CB6A3CF618",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site request forgery (CSRF) vulnerability in cmd.cgi in (1) Nagios 3.0.5 and (2) op5 Monitor before 4.0.1 allows remote attackers to send commands to the Nagios process, and trigger execution of arbitrary programs by this process, via unspecified HTTP requests."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de falsificaci\u00f3n de petici\u00f3n en sitios cruzados (CSRF) en cmd.cgi en (1) Nagios 3.0.5 y (2) op5 Monitor antes de v4.0.1 permite a atacantes remotos enviar comandos al proceso Nagios y dispara la ejecuci\u00f3n de programas de su elecci\u00f3n por este proceso, mediante peticiones HTTP no especificadas."
    }
  ],
  "id": "CVE-2008-5028",
  "lastModified": "2024-11-21T00:53:06.920",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": true,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2008-11-10T15:23:29.563",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://git.op5.org/git/?p=nagios.git%3Ba=commit%3Bh=814d8d4d1a73f7151eeed187c0667585d79fea18"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=124156641928637\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=124156641928637\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/49678"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/32610"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/32630"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/33320"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/35002"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://security.gentoo.org/glsa/glsa-200907-15.xml"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://sourceforge.net/mailarchive/forum.php?thread_name=4914396D.5010009%40op5.se\u0026forum_name=nagios-devel"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.op5.com/support/news/389-important-security-fix-available-for-op5-monitor"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.openwall.com/lists/oss-security/2008/11/06/2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id?1022165"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2008/3029"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2009/1256"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46426"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46521"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.ubuntu.com/usn/USN-698-3/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://git.op5.org/git/?p=nagios.git%3Ba=commit%3Bh=814d8d4d1a73f7151eeed187c0667585d79fea18"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=124156641928637\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=124156641928637\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/49678"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/32610"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/32630"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/33320"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/35002"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-200907-15.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://sourceforge.net/mailarchive/forum.php?thread_name=4914396D.5010009%40op5.se\u0026forum_name=nagios-devel"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.op5.com/support/news/389-important-security-fix-available-for-op5-monitor"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2008/11/06/2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1022165"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/3029"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2009/1256"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46426"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46521"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.ubuntu.com/usn/USN-698-3/"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-352"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2014-01-15 16:08
Modified
2024-11-21 02:00
Severity ?
Summary
Off-by-one error in the process_cgivars function in contrib/daemonchk.c in Nagios Core 3.5.1, 4.0.2, and earlier allows remote authenticated users to obtain sensitive information from process memory or cause a denial of service (crash) via a long string in the last key value in the variable list, which triggers a heap-based buffer over-read.
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:nagios:nagios:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6B3FCCE-CD72-42D2-9ED4-DE7E0F7D5770",
              "versionEndIncluding": "4.0.2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDCA77EF-1020-4068-9CDC-5CF3B0CD66A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:alpha1:*:*:*:*:*:*",
              "matchCriteriaId": "751C46D5-877F-454B-8488-BBCA10CA4930",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:alpha2:*:*:*:*:*:*",
              "matchCriteriaId": "F4754494-17BE-496E-A7B8-453B3028CC45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:alpha3:*:*:*:*:*:*",
              "matchCriteriaId": "CD15E8FA-04D3-4625-BEA5-9F5CC0337699",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:alpha4:*:*:*:*:*:*",
              "matchCriteriaId": "713C5F3E-AA57-4F52-AC0A-9B1F25C25580",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:alpha5:*:*:*:*:*:*",
              "matchCriteriaId": "690EA084-9E58-4226-B490-2969E6C6BEBC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "0AFABA9F-4A45-4150-AED1-897267076A32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "830BB564-82FD-4519-A8EA-DCDF74F2BC54",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "9A975310-9591-4EBF-B987-CA43433B4C54",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "8653D6A2-4B5B-4F1D-A898-8F81F29C6FC2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:beta5:*:*:*:*:*:*",
              "matchCriteriaId": "D18649FF-8838-432E-93B8-3F8B82B0DEA9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:beta6:*:*:*:*:*:*",
              "matchCriteriaId": "9375EA90-0763-4817-8C7D-2D7E116E043F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:beta7:*:*:*:*:*:*",
              "matchCriteriaId": "C02C2F95-2AC2-4E0C-B5D0-785CDF1EDB85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "12E7BC34-65F0-4DD6-8809-F05320955479",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "390CFA92-68AE-4DE9-A199-1B7290A82168",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "1E56F249-3E6A-4764-8CAE-D3E5B6A86AB3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "953745B7-1381-47F5-8012-E699EFA065CC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "87A8A3DA-61AF-4369-ACB0-7D54EEB1DAA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "40B7525F-EEE1-4537-BCE6-15DF3E348FEF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B831C72-C932-4B8C-8B16-C3BC2672AF98",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC5BB3C9-BBC6-43D8-830A-38020F50B148",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC9E1C24-9907-44F4-9166-5C679F05DF12",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8BE6777-6CA9-443E-A2A5-CCD3ED7EAECF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F8F3B76-7443-437E-B908-95D0EF0214C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF23E8B9-6F07-471A-8332-E6B35DFCE37A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EEFF0B7-60B4-4022-9EF5-101B707BAC6C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BC14996-78F9-4A95-9750-1229E57C19C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4C3195A-7B72-45BA-8F83-6B0FE00D3B8B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4584E0CD-A0F9-4AD1-ACC5-800E38F5DD59",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "166D983D-2D1B-45D4-8ACF-68ED11BBF5BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "68D2FFFD-9A12-4230-90F6-AC5E3676FD04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "21A1C2E3-9E5C-4F00-8393-33DAC6765332",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2C8C695-EBA7-4FD0-BBD0-F339757559EE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.4.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "B06E7504-A5C5-42F3-B325-EE9905A9783A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:3.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4594D8DC-97C7-4D8A-8CF8-56BD11C85733",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Off-by-one error in the process_cgivars function in contrib/daemonchk.c in Nagios Core 3.5.1, 4.0.2, and earlier allows remote authenticated users to obtain sensitive information from process memory or cause a denial of service (crash) via a long string in the last key value in the variable list, which triggers a heap-based buffer over-read."
    },
    {
      "lang": "es",
      "value": "Error de superaci\u00f3n de l\u00edmite (off-by-one) en la funci\u00f3n process_cgivars en contrib/daemonchk.c en Nagios Core 3.5.1, 4.0.2 y anteriores, permite a usuarios autenticados remotamente obtener informaci\u00f3n sensible desde procesos de memoria o causar denegaci\u00f3n de servicio (ca\u00edda) a trav\u00e9s de cadenas largas en el valor de la \u00faltima clave en la lista de variables, lo cual lanza una sobre-lectura de buffer basada en memoria din\u00e1mica."
    }
  ],
  "id": "CVE-2013-7205",
  "lastModified": "2024-11-21T02:00:29.730",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.4,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 4.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2014-01-15T16:08:04.063",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/55976"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://sourceforge.net/p/nagios/nagioscore/ci/d97e03f32741a7d851826b03ed73ff4c9612a866/"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:004"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.openwall.com/lists/oss-security/2013/12/24/1"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/64489"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://lists.debian.org/debian-lts-announce/2018/12/msg00014.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/55976"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://sourceforge.net/p/nagios/nagioscore/ci/d97e03f32741a7d851826b03ed73ff4c9612a866/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:004"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2013/12/24/1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/64489"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://lists.debian.org/debian-lts-announce/2018/12/msg00014.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2006-05-19 23:02
Modified
2024-11-21 00:11
Severity ?
Summary
Integer overflow in CGI scripts in Nagios 1.x before 1.4.1 and 2.x before 2.3.1 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a content length (Content-Length) HTTP header. NOTE: this is a different vulnerability than CVE-2006-2162.
Impacted products
Vendor Product Version
nagios nagios 1.0
nagios nagios 1.0b1
nagios nagios 1.0b2
nagios nagios 1.0b3
nagios nagios 1.0b4
nagios nagios 1.0b5
nagios nagios 1.0b6
nagios nagios 1.1
nagios nagios 1.2
nagios nagios 1.3
nagios nagios 1.4
nagios nagios 2.0
nagios nagios 2.0b1
nagios nagios 2.0b2
nagios nagios 2.0b3
nagios nagios 2.0b4
nagios nagios 2.0b5
nagios nagios 2.0b6
nagios nagios 2.0rc1
nagios nagios 2.0rc2
nagios nagios 2.1
nagios nagios 2.2
nagios nagios 2.3



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:nagios:nagios:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CA91B05-9578-46D8-A21C-4E3C4AB4936A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:1.0b1:*:*:*:*:*:*:*",
              "matchCriteriaId": "52432776-C9C6-4CA7-B3D9-87513CBA5716",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:1.0b2:*:*:*:*:*:*:*",
              "matchCriteriaId": "601958D5-B393-4EFA-9A6F-A5A04A95F4BB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:1.0b3:*:*:*:*:*:*:*",
              "matchCriteriaId": "99B2E88A-A611-43C5-8037-411D6B78EC03",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:1.0b4:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DCEFBFC-38BD-4F78-B068-1A90C6199CEB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:1.0b5:*:*:*:*:*:*:*",
              "matchCriteriaId": "E61ACC55-1002-4FA3-8E5A-52041CE5DCD9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:1.0b6:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C773265-0BE7-463A-8E24-84D804F14AF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A847327-D74E-460C-9F6F-E04C9B77E0C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F7425E3-F152-439B-B95F-5160E4593DBA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5911624-5BD8-4A40-B417-FCD926D352BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF45013F-A844-4726-8B2A-EF602A3BC4C1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A91E463-D239-4853-8A63-E01EE7DB319F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.0b1:*:*:*:*:*:*:*",
              "matchCriteriaId": "239CAF7F-E9BF-4D0F-BB99-EF51E1366516",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.0b2:*:*:*:*:*:*:*",
              "matchCriteriaId": "738DF14D-A716-46F0-87AC-2DB2F1E44594",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.0b3:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E8E1234-9F0D-4E6F-BF58-5DAE8E41DB85",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.0b4:*:*:*:*:*:*:*",
              "matchCriteriaId": "0073F69B-C5FA-470A-BA95-9C4E8033F5CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.0b5:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAA7C5B6-C13D-4814-AA7B-444CF12E4DEF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.0b6:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1209D1C-DD27-41FC-8DAF-BFC0B4B1D602",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.0rc1:*:*:*:*:*:*:*",
              "matchCriteriaId": "39551FFC-E1F0-4D45-ADA6-AB3E74BB576D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.0rc2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BED52AA-BE20-447C-8896-4B591C42F66A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "82DE68E3-7003-4675-96A9-6F7308E1E39C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E3F8DC3-2F34-4E11-A796-4EA7CB17FDDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "7ADCBA8C-06DB-4D85-AEED-807E64A29DFB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Integer overflow in CGI scripts in Nagios 1.x before 1.4.1 and 2.x before 2.3.1 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a content length (Content-Length) HTTP header.  NOTE: this is a different vulnerability than CVE-2006-2162."
    }
  ],
  "id": "CVE-2006-2489",
  "lastModified": "2024-11-21T00:11:25.650",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": true,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2006-05-19T23:02:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/20123"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/20247"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/20313"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2006/dsa-1072"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200605-07.xml"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.nagios.org/development/changelog.php"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/18059"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2006/1822"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26454"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://usn.ubuntu.com/287-1/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/20123"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/20247"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/20313"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2006/dsa-1072"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200605-07.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.nagios.org/development/changelog.php"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/18059"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/1822"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26454"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://usn.ubuntu.com/287-1/"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2008-03-17 17:44
Modified
2024-11-21 00:44
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in Nagios before 2.11 allows remote attackers to inject arbitrary web script or HTML via unknown vectors to unspecified CGI scripts, a different issue than CVE-2007-5624.
Impacted products
Vendor Product Version
nagios nagios 2.2
nagios nagios 2.3
nagios nagios 2.3.1
nagios nagios 2.7
nagios nagios 2.8
nagios nagios 2.9
nagios nagios 2.10



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E3F8DC3-2F34-4E11-A796-4EA7CB17FDDB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "7ADCBA8C-06DB-4D85-AEED-807E64A29DFB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D3EE2D7-BD17-4C37-ABA3-79FCE8328EFF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "1121E86B-13EB-4DE3-816A-002C6DC15A70",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C3374C3-9F57-4014-8712-DDDAB52998FF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5D4F00F-C732-477B-988A-25F8E8D32D07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:nagios:nagios:2.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7A5D5AC-9E4C-4F3B-A16A-C6DD18DD8D51",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site scripting (XSS) vulnerability in Nagios before 2.11 allows remote attackers to inject arbitrary web script or HTML via unknown vectors to unspecified CGI scripts, a different issue than CVE-2007-5624."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de secuencia de comandos en sitios cruzados (XSS) en Nagios versiones anteriores a la 2.11, permite a atacantes remotos inyectar secuencias de comandos web o HTML de su elecci\u00f3n mediante vectores desconocidos a secuencias de comandos CGI, un problema diferente al de la CVE-2007-5624."
    }
  ],
  "id": "CVE-2008-1360",
  "lastModified": "2024-11-21T00:44:21.897",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2008-03-17T17:44:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2008-05/msg00000.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/29363"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:067"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.nagios.org/development/changelog.php#2x_branch"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/28250"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2008/0900/references"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41210"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2008-05/msg00000.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/29363"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:067"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.nagios.org/development/changelog.php#2x_branch"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/28250"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/0900/references"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41210"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2007-10-23 16:46
Modified
2024-11-21 00:38
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in Nagios 2.x before 2.10 allows remote attackers to inject arbitrary web script or HTML via unknown vectors to unspecified CGI scripts.
References
cve@mitre.orghttp://lists.opensuse.org/opensuse-security-announce/2008-05/msg00000.html
cve@mitre.orghttp://secunia.com/advisories/27316Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/27980
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDVSA-2008:067
cve@mitre.orghttp://www.nagios.org/development/changelog.php#2x_branchPatch
cve@mitre.orghttp://www.securityfocus.com/bid/26152
cve@mitre.orghttp://www.vupen.com/english/advisories/2007/3567
cve@mitre.orghttps://bugzilla.redhat.com/show_bug.cgi?id=362791
cve@mitre.orghttps://bugzilla.redhat.com/show_bug.cgi?id=362801
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/37350
cve@mitre.orghttps://www.redhat.com/archives/fedora-package-announce/2007-December/msg00125.html
cve@mitre.orghttps://www.redhat.com/archives/fedora-package-announce/2007-December/msg00161.html
af854a3a-2127-422b-91ae-364da2661108http://lists.opensuse.org/opensuse-security-announce/2008-05/msg00000.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/27316Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/27980
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2008:067
af854a3a-2127-422b-91ae-364da2661108http://www.nagios.org/development/changelog.php#2x_branchPatch
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/26152
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/3567
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=362791
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=362801
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/37350
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00125.html
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00161.html
Impacted products
Vendor Product Version
nagios nagios *



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:nagios:nagios:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB7BB016-A8F9-4ABE-AF41-99816B37575C",
              "versionEndIncluding": "2.9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site scripting (XSS) vulnerability in Nagios 2.x before 2.10 allows remote attackers to inject arbitrary web script or HTML via unknown vectors to unspecified CGI scripts."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de secuencia de comandos en sitios cruzados (XSS) en Nagios 2.x anterior a 2.10 permite a atacantes remotos inyectar secuencias de comandos web o HTML a trav\u00e9s de vectores desconocidos a secuecias de comandos CGI no especificadas."
    }
  ],
  "id": "CVE-2007-5624",
  "lastModified": "2024-11-21T00:38:20.090",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2007-10-23T16:46:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2008-05/msg00000.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/27316"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/27980"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:067"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.nagios.org/development/changelog.php#2x_branch"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/26152"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2007/3567"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=362791"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=362801"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/37350"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00125.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00161.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.opensuse.org/opensuse-security-announce/2008-05/msg00000.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/27316"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/27980"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:067"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.nagios.org/development/changelog.php#2x_branch"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/26152"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2007/3567"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=362791"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=362801"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/37350"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00125.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00161.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

cve-2020-6585
Vulnerability from cvelistv5
Published
2020-03-16 15:31
Modified
2024-08-04 09:11
Severity ?
Summary
Nagios Log Server 2.1.3 has CSRF.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T09:11:04.278Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.nagios.com/products/nagios-log-server/"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://medium.com/%40fixitt6/multiple-vulnerabilities-in-nagios-log-server-2-1-3-af7c160edc60"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://assets.nagios.com/downloads/nagios-log-server/CHANGES.TXT"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Nagios Log Server 2.1.3 has CSRF."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-03-16T15:34:59",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.nagios.com/products/nagios-log-server/"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://medium.com/%40fixitt6/multiple-vulnerabilities-in-nagios-log-server-2-1-3-af7c160edc60"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://assets.nagios.com/downloads/nagios-log-server/CHANGES.TXT"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2020-6585",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Nagios Log Server 2.1.3 has CSRF."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.nagios.com/products/nagios-log-server/",
              "refsource": "MISC",
              "url": "https://www.nagios.com/products/nagios-log-server/"
            },
            {
              "name": "https://medium.com/@fixitt6/multiple-vulnerabilities-in-nagios-log-server-2-1-3-af7c160edc60",
              "refsource": "MISC",
              "url": "https://medium.com/@fixitt6/multiple-vulnerabilities-in-nagios-log-server-2-1-3-af7c160edc60"
            },
            {
              "name": "https://assets.nagios.com/downloads/nagios-log-server/CHANGES.TXT",
              "refsource": "MISC",
              "url": "https://assets.nagios.com/downloads/nagios-log-server/CHANGES.TXT"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2020-6585",
    "datePublished": "2020-03-16T15:31:53",
    "dateReserved": "2020-01-08T00:00:00",
    "dateUpdated": "2024-08-04T09:11:04.278Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2018-13441
Vulnerability from cvelistv5
Published
2018-07-12 18:00
Modified
2024-08-05 09:00
Severity ?
Summary
qh_help in Nagios Core version 4.4.1 and earlier is prone to a NULL pointer dereference vulnerability, which allows attacker to cause a local denial-of-service condition by sending a crafted payload to the listening UNIX socket.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T09:00:35.143Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://knowledge.opsview.com/v5.4/docs/whats-new"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://gist.github.com/fakhrizulkifli/8df4a174158df69ebd765f824bd736b8"
          },
          {
            "name": "45082",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "https://www.exploit-db.com/exploits/45082/"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://knowledge.opsview.com/v5.3/docs/whats-new"
          },
          {
            "name": "openSUSE-SU-2020:0500",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00014.html"
          },
          {
            "name": "openSUSE-SU-2020:0517",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00022.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2018-07-11T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "qh_help in Nagios Core version 4.4.1 and earlier is prone to a NULL pointer dereference vulnerability, which allows attacker to cause a local denial-of-service condition by sending a crafted payload to the listening UNIX socket."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-04-14T20:06:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://knowledge.opsview.com/v5.4/docs/whats-new"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://gist.github.com/fakhrizulkifli/8df4a174158df69ebd765f824bd736b8"
        },
        {
          "name": "45082",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "https://www.exploit-db.com/exploits/45082/"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://knowledge.opsview.com/v5.3/docs/whats-new"
        },
        {
          "name": "openSUSE-SU-2020:0500",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00014.html"
        },
        {
          "name": "openSUSE-SU-2020:0517",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00022.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2018-13441",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "qh_help in Nagios Core version 4.4.1 and earlier is prone to a NULL pointer dereference vulnerability, which allows attacker to cause a local denial-of-service condition by sending a crafted payload to the listening UNIX socket."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://knowledge.opsview.com/v5.4/docs/whats-new",
              "refsource": "CONFIRM",
              "url": "https://knowledge.opsview.com/v5.4/docs/whats-new"
            },
            {
              "name": "https://gist.github.com/fakhrizulkifli/8df4a174158df69ebd765f824bd736b8",
              "refsource": "MISC",
              "url": "https://gist.github.com/fakhrizulkifli/8df4a174158df69ebd765f824bd736b8"
            },
            {
              "name": "45082",
              "refsource": "EXPLOIT-DB",
              "url": "https://www.exploit-db.com/exploits/45082/"
            },
            {
              "name": "https://knowledge.opsview.com/v5.3/docs/whats-new",
              "refsource": "CONFIRM",
              "url": "https://knowledge.opsview.com/v5.3/docs/whats-new"
            },
            {
              "name": "openSUSE-SU-2020:0500",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00014.html"
            },
            {
              "name": "openSUSE-SU-2020:0517",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00022.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2018-13441",
    "datePublished": "2018-07-12T18:00:00",
    "dateReserved": "2018-07-08T00:00:00",
    "dateUpdated": "2024-08-05T09:00:35.143Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2008-1360
Vulnerability from cvelistv5
Published
2008-03-17 17:00
Modified
2024-08-07 08:17
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in Nagios before 2.11 allows remote attackers to inject arbitrary web script or HTML via unknown vectors to unspecified CGI scripts, a different issue than CVE-2007-5624.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T08:17:34.572Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "ADV-2008-0900",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/0900/references"
          },
          {
            "name": "SUSE-SR:2008:011",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2008-05/msg00000.html"
          },
          {
            "name": "MDVSA-2008:067",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:067"
          },
          {
            "name": "29363",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/29363"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.nagios.org/development/changelog.php#2x_branch"
          },
          {
            "name": "nagios-unspecified-xss(41210)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41210"
          },
          {
            "name": "28250",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/28250"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-03-14T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting (XSS) vulnerability in Nagios before 2.11 allows remote attackers to inject arbitrary web script or HTML via unknown vectors to unspecified CGI scripts, a different issue than CVE-2007-5624."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-07T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "ADV-2008-0900",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/0900/references"
        },
        {
          "name": "SUSE-SR:2008:011",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2008-05/msg00000.html"
        },
        {
          "name": "MDVSA-2008:067",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:067"
        },
        {
          "name": "29363",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/29363"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.nagios.org/development/changelog.php#2x_branch"
        },
        {
          "name": "nagios-unspecified-xss(41210)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41210"
        },
        {
          "name": "28250",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/28250"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-1360",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting (XSS) vulnerability in Nagios before 2.11 allows remote attackers to inject arbitrary web script or HTML via unknown vectors to unspecified CGI scripts, a different issue than CVE-2007-5624."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "ADV-2008-0900",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/0900/references"
            },
            {
              "name": "SUSE-SR:2008:011",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2008-05/msg00000.html"
            },
            {
              "name": "MDVSA-2008:067",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:067"
            },
            {
              "name": "29363",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/29363"
            },
            {
              "name": "http://www.nagios.org/development/changelog.php#2x_branch",
              "refsource": "CONFIRM",
              "url": "http://www.nagios.org/development/changelog.php#2x_branch"
            },
            {
              "name": "nagios-unspecified-xss(41210)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41210"
            },
            {
              "name": "28250",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/28250"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-1360",
    "datePublished": "2008-03-17T17:00:00",
    "dateReserved": "2008-03-17T00:00:00",
    "dateUpdated": "2024-08-07T08:17:34.572Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2008-6373
Vulnerability from cvelistv5
Published
2009-03-02 19:00
Modified
2024-08-07 11:27
Severity ?
Summary
Unspecified vulnerability in Nagios before 3.0.6 has unspecified impact and remote attack vectors related to CGI programs, "adaptive external commands," and "writing newlines and submitting service comments."
References
http://security.gentoo.org/glsa/glsa-200907-15.xmlvendor-advisory, x_refsource_GENTOO
http://www.nagios.org/news/#88x_refsource_CONFIRM
http://www.securitytracker.com/id?1022165vdb-entry, x_refsource_SECTRACK
http://marc.info/?l=bugtraq&m=124156641928637&w=2vendor-advisory, x_refsource_HP
http://www.nagios.org/development/history/nagios-3x.phpx_refsource_CONFIRM
http://secunia.com/advisories/32909third-party-advisory, x_refsource_SECUNIA
http://marc.info/?l=bugtraq&m=124156641928637&w=2vendor-advisory, x_refsource_HP
http://www.vupen.com/english/advisories/2009/1256vdb-entry, x_refsource_VUPEN
https://exchange.xforce.ibmcloud.com/vulnerabilities/47081vdb-entry, x_refsource_XF
http://secunia.com/advisories/35002third-party-advisory, x_refsource_SECUNIA
http://www.securityfocus.com/bid/32611vdb-entry, x_refsource_BID
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T11:27:35.625Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "GLSA-200907-15",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-200907-15.xml"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.nagios.org/news/#88"
          },
          {
            "name": "1022165",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1022165"
          },
          {
            "name": "SSRT090060",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=124156641928637\u0026w=2"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.nagios.org/development/history/nagios-3x.php"
          },
          {
            "name": "32909",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/32909"
          },
          {
            "name": "HPSBMA02419",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=124156641928637\u0026w=2"
          },
          {
            "name": "ADV-2009-1256",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/1256"
          },
          {
            "name": "nagios-cgis-unspecified(47081)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47081"
          },
          {
            "name": "35002",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/35002"
          },
          {
            "name": "32611",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/32611"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-12-01T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability in Nagios before 3.0.6 has unspecified impact and remote attack vectors related to CGI programs, \"adaptive external commands,\" and \"writing newlines and submitting service comments.\""
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-16T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "GLSA-200907-15",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-200907-15.xml"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.nagios.org/news/#88"
        },
        {
          "name": "1022165",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1022165"
        },
        {
          "name": "SSRT090060",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=124156641928637\u0026w=2"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.nagios.org/development/history/nagios-3x.php"
        },
        {
          "name": "32909",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/32909"
        },
        {
          "name": "HPSBMA02419",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=124156641928637\u0026w=2"
        },
        {
          "name": "ADV-2009-1256",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/1256"
        },
        {
          "name": "nagios-cgis-unspecified(47081)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47081"
        },
        {
          "name": "35002",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/35002"
        },
        {
          "name": "32611",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/32611"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-6373",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability in Nagios before 3.0.6 has unspecified impact and remote attack vectors related to CGI programs, \"adaptive external commands,\" and \"writing newlines and submitting service comments.\""
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "GLSA-200907-15",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-200907-15.xml"
            },
            {
              "name": "http://www.nagios.org/news/#88",
              "refsource": "CONFIRM",
              "url": "http://www.nagios.org/news/#88"
            },
            {
              "name": "1022165",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1022165"
            },
            {
              "name": "SSRT090060",
              "refsource": "HP",
              "url": "http://marc.info/?l=bugtraq\u0026m=124156641928637\u0026w=2"
            },
            {
              "name": "http://www.nagios.org/development/history/nagios-3x.php",
              "refsource": "CONFIRM",
              "url": "http://www.nagios.org/development/history/nagios-3x.php"
            },
            {
              "name": "32909",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/32909"
            },
            {
              "name": "HPSBMA02419",
              "refsource": "HP",
              "url": "http://marc.info/?l=bugtraq\u0026m=124156641928637\u0026w=2"
            },
            {
              "name": "ADV-2009-1256",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2009/1256"
            },
            {
              "name": "nagios-cgis-unspecified(47081)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47081"
            },
            {
              "name": "35002",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/35002"
            },
            {
              "name": "32611",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/32611"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-6373",
    "datePublished": "2009-03-02T19:00:00",
    "dateReserved": "2009-03-02T00:00:00",
    "dateUpdated": "2024-08-07T11:27:35.625Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2016-9565
Vulnerability from cvelistv5
Published
2016-12-15 22:00
Modified
2024-08-06 02:50
Severity ?
Summary
MagpieRSS, as used in the front-end component in Nagios Core before 4.2.2 might allow remote attackers to read or write to arbitrary files by spoofing a crafted response from the Nagios RSS feed server. NOTE: this vulnerability exists because of an incomplete fix for CVE-2008-4796.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T02:50:38.651Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "GLSA-201710-20",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "https://security.gentoo.org/glsa/201710-20"
          },
          {
            "name": "20161215 Nagios Core \u003c 4.2.2 Curl Command Injection leading to Remote Code Execution [CVE-2016-9565]",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/539925/100/0/threaded"
          },
          {
            "name": "1037488",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1037488"
          },
          {
            "name": "94922",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/94922"
          },
          {
            "name": "RHSA-2017:0258",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2017-0258.html"
          },
          {
            "name": "RHSA-2017:0212",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2017-0212.html"
          },
          {
            "name": "RHSA-2017:0213",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2017-0213.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://packetstormsecurity.com/files/140169/Nagios-Core-Curl-Command-Injection-Code-Execution.html"
          },
          {
            "name": "20161215 Nagios Core \u003c 4.2.2 Curl Command Injection leading to Remote Code Execution [CVE-2016-9565]",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2016/Dec/57"
          },
          {
            "name": "40920",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "https://www.exploit-db.com/exploits/40920/"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.nagios.org/projects/nagios-core/history/4x/"
          },
          {
            "name": "GLSA-201702-26",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "https://security.gentoo.org/glsa/201702-26"
          },
          {
            "name": "RHSA-2017:0259",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2017-0259.html"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://legalhackers.com/advisories/Nagios-Exploit-Command-Injection-CVE-2016-9565-2008-4796.html"
          },
          {
            "name": "RHSA-2017:0214",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2017-0214.html"
          },
          {
            "name": "RHSA-2017:0211",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2017-0211.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2016-10-24T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "MagpieRSS, as used in the front-end component in Nagios Core before 4.2.2 might allow remote attackers to read or write to arbitrary files by spoofing a crafted response from the Nagios RSS feed server.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2008-4796."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-09T18:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "GLSA-201710-20",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "https://security.gentoo.org/glsa/201710-20"
        },
        {
          "name": "20161215 Nagios Core \u003c 4.2.2 Curl Command Injection leading to Remote Code Execution [CVE-2016-9565]",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/539925/100/0/threaded"
        },
        {
          "name": "1037488",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1037488"
        },
        {
          "name": "94922",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/94922"
        },
        {
          "name": "RHSA-2017:0258",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2017-0258.html"
        },
        {
          "name": "RHSA-2017:0212",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2017-0212.html"
        },
        {
          "name": "RHSA-2017:0213",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2017-0213.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://packetstormsecurity.com/files/140169/Nagios-Core-Curl-Command-Injection-Code-Execution.html"
        },
        {
          "name": "20161215 Nagios Core \u003c 4.2.2 Curl Command Injection leading to Remote Code Execution [CVE-2016-9565]",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://seclists.org/fulldisclosure/2016/Dec/57"
        },
        {
          "name": "40920",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "https://www.exploit-db.com/exploits/40920/"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.nagios.org/projects/nagios-core/history/4x/"
        },
        {
          "name": "GLSA-201702-26",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "https://security.gentoo.org/glsa/201702-26"
        },
        {
          "name": "RHSA-2017:0259",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2017-0259.html"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://legalhackers.com/advisories/Nagios-Exploit-Command-Injection-CVE-2016-9565-2008-4796.html"
        },
        {
          "name": "RHSA-2017:0214",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2017-0214.html"
        },
        {
          "name": "RHSA-2017:0211",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2017-0211.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2016-9565",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "MagpieRSS, as used in the front-end component in Nagios Core before 4.2.2 might allow remote attackers to read or write to arbitrary files by spoofing a crafted response from the Nagios RSS feed server.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2008-4796."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "GLSA-201710-20",
              "refsource": "GENTOO",
              "url": "https://security.gentoo.org/glsa/201710-20"
            },
            {
              "name": "20161215 Nagios Core \u003c 4.2.2 Curl Command Injection leading to Remote Code Execution [CVE-2016-9565]",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/539925/100/0/threaded"
            },
            {
              "name": "1037488",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1037488"
            },
            {
              "name": "94922",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/94922"
            },
            {
              "name": "RHSA-2017:0258",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2017-0258.html"
            },
            {
              "name": "RHSA-2017:0212",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2017-0212.html"
            },
            {
              "name": "RHSA-2017:0213",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2017-0213.html"
            },
            {
              "name": "http://packetstormsecurity.com/files/140169/Nagios-Core-Curl-Command-Injection-Code-Execution.html",
              "refsource": "MISC",
              "url": "http://packetstormsecurity.com/files/140169/Nagios-Core-Curl-Command-Injection-Code-Execution.html"
            },
            {
              "name": "20161215 Nagios Core \u003c 4.2.2 Curl Command Injection leading to Remote Code Execution [CVE-2016-9565]",
              "refsource": "FULLDISC",
              "url": "http://seclists.org/fulldisclosure/2016/Dec/57"
            },
            {
              "name": "40920",
              "refsource": "EXPLOIT-DB",
              "url": "https://www.exploit-db.com/exploits/40920/"
            },
            {
              "name": "https://www.nagios.org/projects/nagios-core/history/4x/",
              "refsource": "CONFIRM",
              "url": "https://www.nagios.org/projects/nagios-core/history/4x/"
            },
            {
              "name": "GLSA-201702-26",
              "refsource": "GENTOO",
              "url": "https://security.gentoo.org/glsa/201702-26"
            },
            {
              "name": "RHSA-2017:0259",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2017-0259.html"
            },
            {
              "name": "https://legalhackers.com/advisories/Nagios-Exploit-Command-Injection-CVE-2016-9565-2008-4796.html",
              "refsource": "MISC",
              "url": "https://legalhackers.com/advisories/Nagios-Exploit-Command-Injection-CVE-2016-9565-2008-4796.html"
            },
            {
              "name": "RHSA-2017:0214",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2017-0214.html"
            },
            {
              "name": "RHSA-2017:0211",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2017-0211.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2016-9565",
    "datePublished": "2016-12-15T22:00:00",
    "dateReserved": "2016-11-22T00:00:00",
    "dateUpdated": "2024-08-06T02:50:38.651Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2016-6209
Vulnerability from cvelistv5
Published
2017-03-31 15:00
Modified
2024-08-06 01:22
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in Nagios.
References
https://bugzilla.redhat.com/show_bug.cgi?id=1346217x_refsource_CONFIRM
http://seclists.org/fulldisclosure/2016/Jun/20mailing-list, x_refsource_FULLDISC
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T01:22:20.650Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1346217"
          },
          {
            "name": "20160609 nagios phishing vector \u0026 xss",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2016/Jun/20"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2016-06-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting (XSS) vulnerability in Nagios."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-03-31T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1346217"
        },
        {
          "name": "20160609 nagios phishing vector \u0026 xss",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://seclists.org/fulldisclosure/2016/Jun/20"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2016-6209",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting (XSS) vulnerability in Nagios."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1346217",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1346217"
            },
            {
              "name": "20160609 nagios phishing vector \u0026 xss",
              "refsource": "FULLDISC",
              "url": "http://seclists.org/fulldisclosure/2016/Jun/20"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2016-6209",
    "datePublished": "2017-03-31T15:00:00",
    "dateReserved": "2016-07-13T00:00:00",
    "dateUpdated": "2024-08-06T01:22:20.650Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2011-2179
Vulnerability from cvelistv5
Published
2011-06-14 17:00
Modified
2024-08-06 22:53
Severity ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in config.c in config.cgi in (1) Nagios 3.2.3 and (2) Icinga before 1.4.1 allow remote attackers to inject arbitrary web script or HTML via the expand parameter, as demonstrated by an (a) command action or a (b) hosts action.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T22:53:17.162Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20110601 Cross-Site Scripting vulnerability in Nagios",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://archives.neohapsis.com/archives/bugtraq/2011-06/0018.html"
          },
          {
            "name": "icinga-expand-xss(67797)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67797"
          },
          {
            "name": "8274",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/8274"
          },
          {
            "name": "48087",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/48087"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=709871"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://tracker.nagios.org/view.php?id=224"
          },
          {
            "name": "[oss-security] 20110601 CVE request: XSS in nagios",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2011/06/01/10"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.rul3z.de/advisories/SSCHADV2011-006.txt"
          },
          {
            "name": "[oss-security] 20110602 Re: CVE request: XSS in nagios",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2011/06/02/6"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://dev.icinga.org/issues/1605"
          },
          {
            "name": "44974",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/44974"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.rul3z.de/advisories/SSCHADV2011-005.txt"
          },
          {
            "name": "USN-1151-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-1151-1"
          },
          {
            "name": "20110601 Cross-Site Scripting vulnerability in Icinga",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://archives.neohapsis.com/archives/bugtraq/2011-06/0017.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-06-01T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple cross-site scripting (XSS) vulnerabilities in config.c in config.cgi in (1) Nagios 3.2.3 and (2) Icinga before 1.4.1 allow remote attackers to inject arbitrary web script or HTML via the expand parameter, as demonstrated by an (a) command action or a (b) hosts action."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-28T12:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "20110601 Cross-Site Scripting vulnerability in Nagios",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://archives.neohapsis.com/archives/bugtraq/2011-06/0018.html"
        },
        {
          "name": "icinga-expand-xss(67797)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67797"
        },
        {
          "name": "8274",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/8274"
        },
        {
          "name": "48087",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/48087"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=709871"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://tracker.nagios.org/view.php?id=224"
        },
        {
          "name": "[oss-security] 20110601 CVE request: XSS in nagios",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2011/06/01/10"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.rul3z.de/advisories/SSCHADV2011-006.txt"
        },
        {
          "name": "[oss-security] 20110602 Re: CVE request: XSS in nagios",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2011/06/02/6"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://dev.icinga.org/issues/1605"
        },
        {
          "name": "44974",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/44974"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.rul3z.de/advisories/SSCHADV2011-005.txt"
        },
        {
          "name": "USN-1151-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-1151-1"
        },
        {
          "name": "20110601 Cross-Site Scripting vulnerability in Icinga",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://archives.neohapsis.com/archives/bugtraq/2011-06/0017.html"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2011-2179",
    "datePublished": "2011-06-14T17:00:00",
    "dateReserved": "2011-05-31T00:00:00",
    "dateUpdated": "2024-08-06T22:53:17.162Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2014-1878
Vulnerability from cvelistv5
Published
2014-02-28 15:00
Modified
2024-08-06 09:58
Severity ?
Summary
Stack-based buffer overflow in the cmd_submitf function in cgi/cmd.c in Nagios Core, possibly 4.0.3rc1 and earlier, and Icinga before 1.8.6, 1.9 before 1.9.5, and 1.10 before 1.10.3 allows remote attackers to cause a denial of service (segmentation fault) via a long message to cmd.cgi.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T09:58:16.149Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "openSUSE-SU-2014:0516",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2014-04/msg00033.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://dev.icinga.org/issues/5434"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.icinga.org/2014/02/11/bugfix-releases-1-10-3-1-9-5-1-8-6"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1066578"
          },
          {
            "name": "65605",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/65605"
          },
          {
            "name": "[debian-lts-announce] 20181224 [SECURITY] [DLA 1615-1] nagios3 security update",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2018/12/msg00014.html"
          },
          {
            "name": "57024",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/57024"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-02-17T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Stack-based buffer overflow in the cmd_submitf function in cgi/cmd.c in Nagios Core, possibly 4.0.3rc1 and earlier, and Icinga before 1.8.6, 1.9 before 1.9.5, and 1.10 before 1.10.3 allows remote attackers to cause a denial of service (segmentation fault) via a long message to cmd.cgi."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-12-25T10:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "openSUSE-SU-2014:0516",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2014-04/msg00033.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://dev.icinga.org/issues/5434"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.icinga.org/2014/02/11/bugfix-releases-1-10-3-1-9-5-1-8-6"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1066578"
        },
        {
          "name": "65605",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/65605"
        },
        {
          "name": "[debian-lts-announce] 20181224 [SECURITY] [DLA 1615-1] nagios3 security update",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2018/12/msg00014.html"
        },
        {
          "name": "57024",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/57024"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2014-1878",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Stack-based buffer overflow in the cmd_submitf function in cgi/cmd.c in Nagios Core, possibly 4.0.3rc1 and earlier, and Icinga before 1.8.6, 1.9 before 1.9.5, and 1.10 before 1.10.3 allows remote attackers to cause a denial of service (segmentation fault) via a long message to cmd.cgi."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "openSUSE-SU-2014:0516",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2014-04/msg00033.html"
            },
            {
              "name": "https://dev.icinga.org/issues/5434",
              "refsource": "CONFIRM",
              "url": "https://dev.icinga.org/issues/5434"
            },
            {
              "name": "https://www.icinga.org/2014/02/11/bugfix-releases-1-10-3-1-9-5-1-8-6",
              "refsource": "CONFIRM",
              "url": "https://www.icinga.org/2014/02/11/bugfix-releases-1-10-3-1-9-5-1-8-6"
            },
            {
              "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1066578",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1066578"
            },
            {
              "name": "65605",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/65605"
            },
            {
              "name": "[debian-lts-announce] 20181224 [SECURITY] [DLA 1615-1] nagios3 security update",
              "refsource": "MLIST",
              "url": "https://lists.debian.org/debian-lts-announce/2018/12/msg00014.html"
            },
            {
              "name": "57024",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/57024"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2014-1878",
    "datePublished": "2014-02-28T15:00:00",
    "dateReserved": "2014-02-06T00:00:00",
    "dateUpdated": "2024-08-06T09:58:16.149Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-6586
Vulnerability from cvelistv5
Published
2020-03-16 15:30
Modified
2024-08-04 09:11
Severity ?
Summary
Nagios Log Server 2.1.3 allows XSS by visiting /profile and entering a crafted name field that is mishandled on the /admin/users page. Any malicious user with limited access can store an XSS payload in his Name. When any admin views this, the XSS is triggered.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T09:11:04.623Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.nagios.com/products/nagios-log-server/"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://medium.com/%40fixitt6/multiple-vulnerabilities-in-nagios-log-server-2-1-3-af7c160edc60"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://assets.nagios.com/downloads/nagios-log-server/CHANGES.TXT"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Nagios Log Server 2.1.3 allows XSS by visiting /profile and entering a crafted name field that is mishandled on the /admin/users page. Any malicious user with limited access can store an XSS payload in his Name. When any admin views this, the XSS is triggered."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-03-16T15:34:29",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.nagios.com/products/nagios-log-server/"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://medium.com/%40fixitt6/multiple-vulnerabilities-in-nagios-log-server-2-1-3-af7c160edc60"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://assets.nagios.com/downloads/nagios-log-server/CHANGES.TXT"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2020-6586",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Nagios Log Server 2.1.3 allows XSS by visiting /profile and entering a crafted name field that is mishandled on the /admin/users page. Any malicious user with limited access can store an XSS payload in his Name. When any admin views this, the XSS is triggered."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.nagios.com/products/nagios-log-server/",
              "refsource": "MISC",
              "url": "https://www.nagios.com/products/nagios-log-server/"
            },
            {
              "name": "https://medium.com/@fixitt6/multiple-vulnerabilities-in-nagios-log-server-2-1-3-af7c160edc60",
              "refsource": "MISC",
              "url": "https://medium.com/@fixitt6/multiple-vulnerabilities-in-nagios-log-server-2-1-3-af7c160edc60"
            },
            {
              "name": "https://assets.nagios.com/downloads/nagios-log-server/CHANGES.TXT",
              "refsource": "MISC",
              "url": "https://assets.nagios.com/downloads/nagios-log-server/CHANGES.TXT"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2020-6586",
    "datePublished": "2020-03-16T15:30:57",
    "dateReserved": "2020-01-08T00:00:00",
    "dateUpdated": "2024-08-04T09:11:04.623Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2017-12847
Vulnerability from cvelistv5
Published
2017-08-23 21:00
Modified
2024-08-05 18:51
Severity ?
Summary
Nagios Core before 4.3.3 creates a nagios.lock PID file after dropping privileges to a non-root account, which might allow local users to kill arbitrary processes by leveraging access to this non-root account for nagios.lock modification before a root script executes a "kill `cat /pathname/nagios.lock`" command.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T18:51:06.962Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "GLSA-201710-20",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "https://security.gentoo.org/glsa/201710-20"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://github.com/NagiosEnterprises/nagioscore/commit/3baffa78bafebbbdf9f448890ba5a952ea2d73cb"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://github.com/NagiosEnterprises/nagioscore/commit/1b197346d490df2e2d3b1dcce5ac6134ad0c8752"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://github.com/NagiosEnterprises/nagioscore/blob/master/Changelog"
          },
          {
            "name": "100403",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/100403"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://github.com/NagiosEnterprises/nagioscore/issues/404"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2017-08-23T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Nagios Core before 4.3.3 creates a nagios.lock PID file after dropping privileges to a non-root account, which might allow local users to kill arbitrary processes by leveraging access to this non-root account for nagios.lock modification before a root script executes a \"kill `cat /pathname/nagios.lock`\" command."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-10-18T09:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "GLSA-201710-20",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "https://security.gentoo.org/glsa/201710-20"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/NagiosEnterprises/nagioscore/commit/3baffa78bafebbbdf9f448890ba5a952ea2d73cb"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/NagiosEnterprises/nagioscore/commit/1b197346d490df2e2d3b1dcce5ac6134ad0c8752"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/NagiosEnterprises/nagioscore/blob/master/Changelog"
        },
        {
          "name": "100403",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/100403"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/NagiosEnterprises/nagioscore/issues/404"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2017-12847",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Nagios Core before 4.3.3 creates a nagios.lock PID file after dropping privileges to a non-root account, which might allow local users to kill arbitrary processes by leveraging access to this non-root account for nagios.lock modification before a root script executes a \"kill `cat /pathname/nagios.lock`\" command."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "GLSA-201710-20",
              "refsource": "GENTOO",
              "url": "https://security.gentoo.org/glsa/201710-20"
            },
            {
              "name": "https://github.com/NagiosEnterprises/nagioscore/commit/3baffa78bafebbbdf9f448890ba5a952ea2d73cb",
              "refsource": "CONFIRM",
              "url": "https://github.com/NagiosEnterprises/nagioscore/commit/3baffa78bafebbbdf9f448890ba5a952ea2d73cb"
            },
            {
              "name": "https://github.com/NagiosEnterprises/nagioscore/commit/1b197346d490df2e2d3b1dcce5ac6134ad0c8752",
              "refsource": "CONFIRM",
              "url": "https://github.com/NagiosEnterprises/nagioscore/commit/1b197346d490df2e2d3b1dcce5ac6134ad0c8752"
            },
            {
              "name": "https://github.com/NagiosEnterprises/nagioscore/blob/master/Changelog",
              "refsource": "CONFIRM",
              "url": "https://github.com/NagiosEnterprises/nagioscore/blob/master/Changelog"
            },
            {
              "name": "100403",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/100403"
            },
            {
              "name": "https://github.com/NagiosEnterprises/nagioscore/issues/404",
              "refsource": "CONFIRM",
              "url": "https://github.com/NagiosEnterprises/nagioscore/issues/404"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2017-12847",
    "datePublished": "2017-08-23T21:00:00",
    "dateReserved": "2017-08-14T00:00:00",
    "dateUpdated": "2024-08-05T18:51:06.962Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2016-10089
Vulnerability from cvelistv5
Published
2017-02-15 15:00
Modified
2024-08-06 03:07
Severity ?
Summary
Nagios 4.3.2 and earlier allows local users to gain root privileges via a hard link attack on the Nagios init script file, related to CVE-2016-8641.
References
http://www.securityfocus.com/bid/95171vdb-entry, x_refsource_BID
http://www.openwall.com/lists/oss-security/2016/12/30/6mailing-list, x_refsource_MLIST
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T03:07:32.240Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "95171",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/95171"
          },
          {
            "name": "[oss-security] 20161230 Re: CVE request: Nagios: Incomplete fix for CVE-2016-8641",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2016/12/30/6"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2016-12-30T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Nagios 4.3.2 and earlier allows local users to gain root privileges via a hard link attack on the Nagios init script file, related to CVE-2016-8641."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-11-22T15:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "95171",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/95171"
        },
        {
          "name": "[oss-security] 20161230 Re: CVE request: Nagios: Incomplete fix for CVE-2016-8641",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2016/12/30/6"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2016-10089",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Nagios 4.3.2 and earlier allows local users to gain root privileges via a hard link attack on the Nagios init script file, related to CVE-2016-8641."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "95171",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/95171"
            },
            {
              "name": "[oss-security] 20161230 Re: CVE request: Nagios: Incomplete fix for CVE-2016-8641",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2016/12/30/6"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2016-10089",
    "datePublished": "2017-02-15T15:00:00",
    "dateReserved": "2016-12-30T00:00:00",
    "dateUpdated": "2024-08-06T03:07:32.240Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2008-5028
Vulnerability from cvelistv5
Published
2008-11-10 15:00
Modified
2024-08-07 10:40
Severity ?
Summary
Cross-site request forgery (CSRF) vulnerability in cmd.cgi in (1) Nagios 3.0.5 and (2) op5 Monitor before 4.0.1 allows remote attackers to send commands to the Nagios process, and trigger execution of arbitrary programs by this process, via unspecified HTTP requests.
References
https://exchange.xforce.ibmcloud.com/vulnerabilities/46426vdb-entry, x_refsource_XF
http://sourceforge.net/mailarchive/forum.php?thread_name=4914396D.5010009%40op5.se&forum_name=nagios-develmailing-list, x_refsource_MLIST
https://exchange.xforce.ibmcloud.com/vulnerabilities/46521vdb-entry, x_refsource_XF
http://security.gentoo.org/glsa/glsa-200907-15.xmlvendor-advisory, x_refsource_GENTOO
http://secunia.com/advisories/33320third-party-advisory, x_refsource_SECUNIA
http://git.op5.org/git/?p=nagios.git%3Ba=commit%3Bh=814d8d4d1a73f7151eeed187c0667585d79fea18x_refsource_CONFIRM
http://www.openwall.com/lists/oss-security/2008/11/06/2mailing-list, x_refsource_MLIST
http://www.securitytracker.com/id?1022165vdb-entry, x_refsource_SECTRACK
https://www.ubuntu.com/usn/USN-698-3/vendor-advisory, x_refsource_UBUNTU
http://www.op5.com/support/news/389-important-security-fix-available-for-op5-monitorx_refsource_CONFIRM
http://www.vupen.com/english/advisories/2008/3029vdb-entry, x_refsource_VUPEN
http://marc.info/?l=bugtraq&m=124156641928637&w=2vendor-advisory, x_refsource_HP
http://marc.info/?l=bugtraq&m=124156641928637&w=2vendor-advisory, x_refsource_HP
http://www.vupen.com/english/advisories/2009/1256vdb-entry, x_refsource_VUPEN
http://secunia.com/advisories/32610third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/32630third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/35002third-party-advisory, x_refsource_SECUNIA
http://osvdb.org/49678vdb-entry, x_refsource_OSVDB
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T10:40:16.763Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "nagios-cmd-csrf(46426)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46426"
          },
          {
            "name": "[nagios-devel] 20081107 Security fixes completed",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://sourceforge.net/mailarchive/forum.php?thread_name=4914396D.5010009%40op5.se\u0026forum_name=nagios-devel"
          },
          {
            "name": "op5monitor-unspecified-csrf(46521)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46521"
          },
          {
            "name": "GLSA-200907-15",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-200907-15.xml"
          },
          {
            "name": "33320",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/33320"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://git.op5.org/git/?p=nagios.git%3Ba=commit%3Bh=814d8d4d1a73f7151eeed187c0667585d79fea18"
          },
          {
            "name": "[oss-security] 20081106 CVE request: Nagios (two issues)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2008/11/06/2"
          },
          {
            "name": "1022165",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1022165"
          },
          {
            "name": "USN-698-3",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "https://www.ubuntu.com/usn/USN-698-3/"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.op5.com/support/news/389-important-security-fix-available-for-op5-monitor"
          },
          {
            "name": "ADV-2008-3029",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/3029"
          },
          {
            "name": "SSRT090060",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=124156641928637\u0026w=2"
          },
          {
            "name": "HPSBMA02419",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=124156641928637\u0026w=2"
          },
          {
            "name": "ADV-2009-1256",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/1256"
          },
          {
            "name": "32610",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/32610"
          },
          {
            "name": "32630",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/32630"
          },
          {
            "name": "35002",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/35002"
          },
          {
            "name": "49678",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/49678"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-11-06T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site request forgery (CSRF) vulnerability in cmd.cgi in (1) Nagios 3.0.5 and (2) op5 Monitor before 4.0.1 allows remote attackers to send commands to the Nagios process, and trigger execution of arbitrary programs by this process, via unspecified HTTP requests."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-07T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "nagios-cmd-csrf(46426)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46426"
        },
        {
          "name": "[nagios-devel] 20081107 Security fixes completed",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://sourceforge.net/mailarchive/forum.php?thread_name=4914396D.5010009%40op5.se\u0026forum_name=nagios-devel"
        },
        {
          "name": "op5monitor-unspecified-csrf(46521)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46521"
        },
        {
          "name": "GLSA-200907-15",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-200907-15.xml"
        },
        {
          "name": "33320",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/33320"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://git.op5.org/git/?p=nagios.git%3Ba=commit%3Bh=814d8d4d1a73f7151eeed187c0667585d79fea18"
        },
        {
          "name": "[oss-security] 20081106 CVE request: Nagios (two issues)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2008/11/06/2"
        },
        {
          "name": "1022165",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1022165"
        },
        {
          "name": "USN-698-3",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "https://www.ubuntu.com/usn/USN-698-3/"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.op5.com/support/news/389-important-security-fix-available-for-op5-monitor"
        },
        {
          "name": "ADV-2008-3029",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/3029"
        },
        {
          "name": "SSRT090060",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=124156641928637\u0026w=2"
        },
        {
          "name": "HPSBMA02419",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=124156641928637\u0026w=2"
        },
        {
          "name": "ADV-2009-1256",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/1256"
        },
        {
          "name": "32610",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/32610"
        },
        {
          "name": "32630",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/32630"
        },
        {
          "name": "35002",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/35002"
        },
        {
          "name": "49678",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/49678"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-5028",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site request forgery (CSRF) vulnerability in cmd.cgi in (1) Nagios 3.0.5 and (2) op5 Monitor before 4.0.1 allows remote attackers to send commands to the Nagios process, and trigger execution of arbitrary programs by this process, via unspecified HTTP requests."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "nagios-cmd-csrf(46426)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46426"
            },
            {
              "name": "[nagios-devel] 20081107 Security fixes completed",
              "refsource": "MLIST",
              "url": "http://sourceforge.net/mailarchive/forum.php?thread_name=4914396D.5010009%40op5.se\u0026forum_name=nagios-devel"
            },
            {
              "name": "op5monitor-unspecified-csrf(46521)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46521"
            },
            {
              "name": "GLSA-200907-15",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-200907-15.xml"
            },
            {
              "name": "33320",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/33320"
            },
            {
              "name": "http://git.op5.org/git/?p=nagios.git;a=commit;h=814d8d4d1a73f7151eeed187c0667585d79fea18",
              "refsource": "CONFIRM",
              "url": "http://git.op5.org/git/?p=nagios.git;a=commit;h=814d8d4d1a73f7151eeed187c0667585d79fea18"
            },
            {
              "name": "[oss-security] 20081106 CVE request: Nagios (two issues)",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2008/11/06/2"
            },
            {
              "name": "1022165",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1022165"
            },
            {
              "name": "USN-698-3",
              "refsource": "UBUNTU",
              "url": "https://www.ubuntu.com/usn/USN-698-3/"
            },
            {
              "name": "http://www.op5.com/support/news/389-important-security-fix-available-for-op5-monitor",
              "refsource": "CONFIRM",
              "url": "http://www.op5.com/support/news/389-important-security-fix-available-for-op5-monitor"
            },
            {
              "name": "ADV-2008-3029",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/3029"
            },
            {
              "name": "SSRT090060",
              "refsource": "HP",
              "url": "http://marc.info/?l=bugtraq\u0026m=124156641928637\u0026w=2"
            },
            {
              "name": "HPSBMA02419",
              "refsource": "HP",
              "url": "http://marc.info/?l=bugtraq\u0026m=124156641928637\u0026w=2"
            },
            {
              "name": "ADV-2009-1256",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2009/1256"
            },
            {
              "name": "32610",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/32610"
            },
            {
              "name": "32630",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/32630"
            },
            {
              "name": "35002",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/35002"
            },
            {
              "name": "49678",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/49678"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-5028",
    "datePublished": "2008-11-10T15:00:00",
    "dateReserved": "2008-11-10T00:00:00",
    "dateUpdated": "2024-08-07T10:40:16.763Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2016-8641
Vulnerability from cvelistv5
Published
2018-08-01 14:00
Modified
2024-08-06 02:27
Summary
A privilege escalation vulnerability was found in nagios 4.2.x that occurs in daemon-init.in when creating necessary files and insecurely changing the ownership afterwards. It's possible for the local attacker to create symbolic links before the files are to be created and possibly escalating the privileges with the ownership change.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T02:27:41.284Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "40774",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "https://www.exploit-db.com/exploits/40774/"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://github.com/NagiosEnterprises/nagioscore/commit/f2ed227673d3b2da643eb5cad26b2d87674f28c1.patch"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8641"
          },
          {
            "name": "95121",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/95121"
          },
          {
            "name": "GLSA-201702-26",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "https://security.gentoo.org/glsa/201702-26"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "nagios",
          "vendor": "Nagios Enterprises",
          "versions": [
            {
              "status": "affected",
              "version": "4.2.x"
            }
          ]
        }
      ],
      "datePublic": "2016-11-22T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "A privilege escalation vulnerability was found in nagios 4.2.x that occurs in daemon-init.in when creating necessary files and insecurely changing the ownership afterwards. It\u0027s possible for the local attacker to create symbolic links before the files are to be created and possibly escalating the privileges with the ownership change."
        }
      ],
      "metrics": [
        {
          "cvssV3_0": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.0"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-59",
              "description": "CWE-59",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-08-02T09:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "40774",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "https://www.exploit-db.com/exploits/40774/"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/NagiosEnterprises/nagioscore/commit/f2ed227673d3b2da643eb5cad26b2d87674f28c1.patch"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8641"
        },
        {
          "name": "95121",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/95121"
        },
        {
          "name": "GLSA-201702-26",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "https://security.gentoo.org/glsa/201702-26"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2016-8641",
    "datePublished": "2018-08-01T14:00:00",
    "dateReserved": "2016-10-12T00:00:00",
    "dateUpdated": "2024-08-06T02:27:41.284Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2019-3698
Vulnerability from cvelistv5
Published
2020-02-28 13:20
Modified
2024-09-16 16:33
Summary
UNIX Symbolic Link (Symlink) Following vulnerability in the cronjob shipped with nagios of SUSE Linux Enterprise Server 12, SUSE Linux Enterprise Server 11; openSUSE Factory allows local attackers to cause cause DoS or potentially escalate privileges by winning a race. This issue affects: SUSE Linux Enterprise Server 12 nagios version 3.5.1-5.27 and prior versions. SUSE Linux Enterprise Server 11 nagios version 3.0.6-1.25.36.3.1 and prior versions. openSUSE Factory nagios version 4.4.5-2.1 and prior versions.
Impacted products
Vendor Product Version
SUSE SUSE Linux Enterprise Server 11 Version: nagios   <
openSUSE Factory Version: nagios   <
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T19:19:17.452Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "openSUSE-SU-2020:0500",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00014.html"
          },
          {
            "name": "openSUSE-SU-2020:0517",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00022.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.suse.com/show_bug.cgi?id=1156309"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "SUSE Linux Enterprise Server 12",
          "vendor": "SUSE",
          "versions": [
            {
              "lessThanOrEqual": "3.5.1-5.27",
              "status": "affected",
              "version": "nagios",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "SUSE Linux Enterprise Server 11",
          "vendor": "SUSE",
          "versions": [
            {
              "lessThanOrEqual": "3.0.6-1.25.36.3.1",
              "status": "affected",
              "version": "nagios",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "Factory",
          "vendor": "openSUSE",
          "versions": [
            {
              "lessThanOrEqual": "4.4.5-2.1",
              "status": "affected",
              "version": "nagios",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "Matthias Gerstner"
        }
      ],
      "datePublic": "2020-02-28T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "UNIX Symbolic Link (Symlink) Following vulnerability in the cronjob shipped with nagios of SUSE Linux Enterprise Server 12, SUSE Linux Enterprise Server 11; openSUSE Factory allows local attackers to cause cause DoS or potentially escalate privileges by winning a race. This issue affects: SUSE Linux Enterprise Server 12 nagios version 3.5.1-5.27 and prior versions. SUSE Linux Enterprise Server 11 nagios version 3.0.6-1.25.36.3.1 and prior versions. openSUSE Factory nagios version 4.4.5-2.1 and prior versions."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "LOW",
            "baseScore": 5.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:L",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-59",
              "description": "CWE-59: Improper Link Resolution Before File Access (\u0027Link Following\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-11-20T15:45:08",
        "orgId": "404e59f5-483d-4b8a-8e7a-e67604dd8afb",
        "shortName": "suse"
      },
      "references": [
        {
          "name": "openSUSE-SU-2020:0500",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00014.html"
        },
        {
          "name": "openSUSE-SU-2020:0517",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00022.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.suse.com/show_bug.cgi?id=1156309"
        }
      ],
      "source": {
        "advisory": "https://bugzilla.suse.com/show_bug.cgi?id=1156309",
        "defect": [
          "1156309"
        ],
        "discovery": "INTERNAL"
      },
      "title": "nagios cron job allows privilege escalation from user nagios to root",
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@suse.com",
          "DATE_PUBLIC": "2020-02-28T00:00:00.000Z",
          "ID": "CVE-2019-3698",
          "STATE": "PUBLIC",
          "TITLE": "nagios cron job allows privilege escalation from user nagios to root"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "SUSE Linux Enterprise Server 12",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c=",
                            "version_name": "nagios",
                            "version_value": "3.5.1-5.27"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "SUSE Linux Enterprise Server 11",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c=",
                            "version_name": "nagios",
                            "version_value": "3.0.6-1.25.36.3.1"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "SUSE"
              },
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Factory",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c=",
                            "version_name": "nagios",
                            "version_value": "4.4.5-2.1"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "openSUSE"
              }
            ]
          }
        },
        "credit": [
          {
            "lang": "eng",
            "value": "Matthias Gerstner"
          }
        ],
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "UNIX Symbolic Link (Symlink) Following vulnerability in the cronjob shipped with nagios of SUSE Linux Enterprise Server 12, SUSE Linux Enterprise Server 11; openSUSE Factory allows local attackers to cause cause DoS or potentially escalate privileges by winning a race. This issue affects: SUSE Linux Enterprise Server 12 nagios version 3.5.1-5.27 and prior versions. SUSE Linux Enterprise Server 11 nagios version 3.0.6-1.25.36.3.1 and prior versions. openSUSE Factory nagios version 4.4.5-2.1 and prior versions."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "impact": {
          "cvss": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "LOW",
            "baseScore": 5.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:L",
            "version": "3.1"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-59: Improper Link Resolution Before File Access (\u0027Link Following\u0027)"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "openSUSE-SU-2020:0500",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00014.html"
            },
            {
              "name": "openSUSE-SU-2020:0517",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00022.html"
            },
            {
              "name": "https://bugzilla.suse.com/show_bug.cgi?id=1156309",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.suse.com/show_bug.cgi?id=1156309"
            }
          ]
        },
        "source": {
          "advisory": "https://bugzilla.suse.com/show_bug.cgi?id=1156309",
          "defect": [
            "1156309"
          ],
          "discovery": "INTERNAL"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "404e59f5-483d-4b8a-8e7a-e67604dd8afb",
    "assignerShortName": "suse",
    "cveId": "CVE-2019-3698",
    "datePublished": "2020-02-28T13:20:14.152354Z",
    "dateReserved": "2019-01-03T00:00:00",
    "dateUpdated": "2024-09-16T16:33:41.138Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2008-7313
Vulnerability from cvelistv5
Published
2017-03-31 15:00
Modified
2024-08-07 12:03
Severity ?
Summary
The _httpsrequest function in Snoopy allows remote attackers to execute arbitrary commands. NOTE: this issue exists dues to an incomplete fix for CVE-2008-4796.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T12:03:37.083Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "[oss-security] 20140709 CVE request - Snoopy incomplete fix for CVE-2008-4796",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2014/07/09/11"
          },
          {
            "name": "[oss-security] 20140718 Re: CVE request - Snoopy incomplete fix for CVE-2008-4796",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2014/07/18/2"
          },
          {
            "name": "68776",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/68776"
          },
          {
            "name": "[oss-security] 20140716 Re: Re: CVE request - Snoopy incomplete fix for CVE-2008-4796",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2014/07/16/10"
          },
          {
            "name": "snoopy-cve20087313-command-exec(94737)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94737"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www-01.ibm.com/support/docview.wss?uid=isg3T1024264"
          },
          {
            "name": "RHSA-2017:0213",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://rhn.redhat.com/errata/RHSA-2017-0213.html"
          },
          {
            "name": "RHSA-2017:0211",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://rhn.redhat.com/errata/RHSA-2017-0211.html"
          },
          {
            "name": "RHSA-2017:0212",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://rhn.redhat.com/errata/RHSA-2017-0212.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://snoopy.cvs.sourceforge.net/viewvc/snoopy/Snoopy/Snoopy.class.php?view=log#rev1.27"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1121497"
          },
          {
            "name": "GLSA-201702-26",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "https://security.gentoo.org/glsa/201702-26"
          },
          {
            "name": "RHSA-2017:0214",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "https://rhn.redhat.com/errata/RHSA-2017-0214.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-11-21T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The _httpsrequest function in Snoopy allows remote attackers to execute arbitrary commands.  NOTE: this issue exists dues to an incomplete fix for CVE-2008-4796."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-03-31T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "[oss-security] 20140709 CVE request - Snoopy incomplete fix for CVE-2008-4796",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2014/07/09/11"
        },
        {
          "name": "[oss-security] 20140718 Re: CVE request - Snoopy incomplete fix for CVE-2008-4796",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2014/07/18/2"
        },
        {
          "name": "68776",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/68776"
        },
        {
          "name": "[oss-security] 20140716 Re: Re: CVE request - Snoopy incomplete fix for CVE-2008-4796",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2014/07/16/10"
        },
        {
          "name": "snoopy-cve20087313-command-exec(94737)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94737"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www-01.ibm.com/support/docview.wss?uid=isg3T1024264"
        },
        {
          "name": "RHSA-2017:0213",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://rhn.redhat.com/errata/RHSA-2017-0213.html"
        },
        {
          "name": "RHSA-2017:0211",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://rhn.redhat.com/errata/RHSA-2017-0211.html"
        },
        {
          "name": "RHSA-2017:0212",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://rhn.redhat.com/errata/RHSA-2017-0212.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://snoopy.cvs.sourceforge.net/viewvc/snoopy/Snoopy/Snoopy.class.php?view=log#rev1.27"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1121497"
        },
        {
          "name": "GLSA-201702-26",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "https://security.gentoo.org/glsa/201702-26"
        },
        {
          "name": "RHSA-2017:0214",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "https://rhn.redhat.com/errata/RHSA-2017-0214.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-7313",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The _httpsrequest function in Snoopy allows remote attackers to execute arbitrary commands.  NOTE: this issue exists dues to an incomplete fix for CVE-2008-4796."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "[oss-security] 20140709 CVE request - Snoopy incomplete fix for CVE-2008-4796",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2014/07/09/11"
            },
            {
              "name": "[oss-security] 20140718 Re: CVE request - Snoopy incomplete fix for CVE-2008-4796",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2014/07/18/2"
            },
            {
              "name": "68776",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/68776"
            },
            {
              "name": "[oss-security] 20140716 Re: Re: CVE request - Snoopy incomplete fix for CVE-2008-4796",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2014/07/16/10"
            },
            {
              "name": "snoopy-cve20087313-command-exec(94737)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94737"
            },
            {
              "name": "https://www-01.ibm.com/support/docview.wss?uid=isg3T1024264",
              "refsource": "MISC",
              "url": "https://www-01.ibm.com/support/docview.wss?uid=isg3T1024264"
            },
            {
              "name": "RHSA-2017:0213",
              "refsource": "REDHAT",
              "url": "https://rhn.redhat.com/errata/RHSA-2017-0213.html"
            },
            {
              "name": "RHSA-2017:0211",
              "refsource": "REDHAT",
              "url": "https://rhn.redhat.com/errata/RHSA-2017-0211.html"
            },
            {
              "name": "RHSA-2017:0212",
              "refsource": "REDHAT",
              "url": "https://rhn.redhat.com/errata/RHSA-2017-0212.html"
            },
            {
              "name": "http://snoopy.cvs.sourceforge.net/viewvc/snoopy/Snoopy/Snoopy.class.php?view=log#rev1.27",
              "refsource": "CONFIRM",
              "url": "http://snoopy.cvs.sourceforge.net/viewvc/snoopy/Snoopy/Snoopy.class.php?view=log#rev1.27"
            },
            {
              "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1121497",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1121497"
            },
            {
              "name": "GLSA-201702-26",
              "refsource": "GENTOO",
              "url": "https://security.gentoo.org/glsa/201702-26"
            },
            {
              "name": "RHSA-2017:0214",
              "refsource": "REDHAT",
              "url": "https://rhn.redhat.com/errata/RHSA-2017-0214.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-7313",
    "datePublished": "2017-03-31T15:00:00",
    "dateReserved": "2014-07-18T00:00:00",
    "dateUpdated": "2024-08-07T12:03:37.083Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2014-4701
Vulnerability from cvelistv5
Published
2014-12-05 16:00
Modified
2024-08-06 11:27
Severity ?
Summary
The check_dhcp plugin in Nagios Plugins before 2.0.2 allows local users to obtain sensitive information from INI configuration files via the extra-opts flag, a different vulnerability than CVE-2014-4702.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T11:27:36.112Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "33387",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "http://www.exploit-db.com/exploits/33387"
          },
          {
            "name": "61319",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/61319"
          },
          {
            "name": "20140516 check_dhcp - Nagios Plugins \u003c= 2.0.1 Arbitrary Option File Read",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2014/May/74"
          },
          {
            "name": "67433",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/67433"
          },
          {
            "name": "58751",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/58751"
          },
          {
            "name": "[oss-security] 20140630 Re: CVE requests: nagios check_dhcp plug-in: read parts of INI config files belonging to root",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2014/06/30/6"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://nagios-plugins.org/nagios-plugins-2-0-2-released/?utm_source=Nagios.org\u0026utm_medium=News+Post\u0026utm_content=Nagios%20Plugins%202.0.2%20Released\u0026utm_campaign=Nagios%20Plugins"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://legalhackers.com/advisories/nagios-check_dhcp.txt"
          },
          {
            "name": "SUSE-SU-2014:1352",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "https://www.suse.com/support/update/announcement/2014/suse-su-20141352-1.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-05-15T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The check_dhcp plugin in Nagios Plugins before 2.0.2 allows local users to obtain sensitive information from INI configuration files via the extra-opts flag, a different vulnerability than CVE-2014-4702."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-11-25T19:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "33387",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "http://www.exploit-db.com/exploits/33387"
        },
        {
          "name": "61319",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/61319"
        },
        {
          "name": "20140516 check_dhcp - Nagios Plugins \u003c= 2.0.1 Arbitrary Option File Read",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://seclists.org/fulldisclosure/2014/May/74"
        },
        {
          "name": "67433",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/67433"
        },
        {
          "name": "58751",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/58751"
        },
        {
          "name": "[oss-security] 20140630 Re: CVE requests: nagios check_dhcp plug-in: read parts of INI config files belonging to root",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2014/06/30/6"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://nagios-plugins.org/nagios-plugins-2-0-2-released/?utm_source=Nagios.org\u0026utm_medium=News+Post\u0026utm_content=Nagios%20Plugins%202.0.2%20Released\u0026utm_campaign=Nagios%20Plugins"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://legalhackers.com/advisories/nagios-check_dhcp.txt"
        },
        {
          "name": "SUSE-SU-2014:1352",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "https://www.suse.com/support/update/announcement/2014/suse-su-20141352-1.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2014-4701",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The check_dhcp plugin in Nagios Plugins before 2.0.2 allows local users to obtain sensitive information from INI configuration files via the extra-opts flag, a different vulnerability than CVE-2014-4702."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "33387",
              "refsource": "EXPLOIT-DB",
              "url": "http://www.exploit-db.com/exploits/33387"
            },
            {
              "name": "61319",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/61319"
            },
            {
              "name": "20140516 check_dhcp - Nagios Plugins \u003c= 2.0.1 Arbitrary Option File Read",
              "refsource": "FULLDISC",
              "url": "http://seclists.org/fulldisclosure/2014/May/74"
            },
            {
              "name": "67433",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/67433"
            },
            {
              "name": "58751",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/58751"
            },
            {
              "name": "[oss-security] 20140630 Re: CVE requests: nagios check_dhcp plug-in: read parts of INI config files belonging to root",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2014/06/30/6"
            },
            {
              "name": "http://nagios-plugins.org/nagios-plugins-2-0-2-released/?utm_source=Nagios.org\u0026utm_medium=News+Post\u0026utm_content=Nagios%20Plugins%202.0.2%20Released\u0026utm_campaign=Nagios%20Plugins",
              "refsource": "CONFIRM",
              "url": "http://nagios-plugins.org/nagios-plugins-2-0-2-released/?utm_source=Nagios.org\u0026utm_medium=News+Post\u0026utm_content=Nagios%20Plugins%202.0.2%20Released\u0026utm_campaign=Nagios%20Plugins"
            },
            {
              "name": "http://legalhackers.com/advisories/nagios-check_dhcp.txt",
              "refsource": "MISC",
              "url": "http://legalhackers.com/advisories/nagios-check_dhcp.txt"
            },
            {
              "name": "SUSE-SU-2014:1352",
              "refsource": "SUSE",
              "url": "https://www.suse.com/support/update/announcement/2014/suse-su-20141352-1.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2014-4701",
    "datePublished": "2014-12-05T16:00:00",
    "dateReserved": "2014-06-30T00:00:00",
    "dateUpdated": "2024-08-06T11:27:36.112Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2008-5027
Vulnerability from cvelistv5
Published
2008-11-10 15:00
Modified
2024-08-07 10:40
Severity ?
Summary
The Nagios process in (1) Nagios before 3.0.5 and (2) op5 Monitor before 4.0.1 allows remote authenticated users to bypass authorization checks, and trigger execution of arbitrary programs by this process, via an (a) custom form or a (b) browser addon.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T10:40:17.262Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "[nagios-devel] 20081107 Security fixes completed",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://sourceforge.net/mailarchive/forum.php?thread_name=4914396D.5010009%40op5.se\u0026forum_name=nagios-devel"
          },
          {
            "name": "ADV-2008-3364",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/3364"
          },
          {
            "name": "GLSA-200907-15",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-200907-15.xml"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.nagios.org/development/history/nagios-3x.php"
          },
          {
            "name": "33320",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/33320"
          },
          {
            "name": "[oss-security] 20081106 CVE request: Nagios (two issues)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2008/11/06/2"
          },
          {
            "name": "32156",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/32156"
          },
          {
            "name": "1022165",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1022165"
          },
          {
            "name": "USN-698-3",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "https://www.ubuntu.com/usn/USN-698-3/"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.op5.com/support/news/389-important-security-fix-available-for-op5-monitor"
          },
          {
            "name": "ADV-2008-3029",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/3029"
          },
          {
            "name": "SSRT090060",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=124156641928637\u0026w=2"
          },
          {
            "name": "HPSBMA02419",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=124156641928637\u0026w=2"
          },
          {
            "name": "ADV-2009-1256",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/1256"
          },
          {
            "name": "USN-698-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-698-1"
          },
          {
            "name": "35002",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/35002"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-11-06T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The Nagios process in (1) Nagios before 3.0.5 and (2) op5 Monitor before 4.0.1 allows remote authenticated users to bypass authorization checks, and trigger execution of arbitrary programs by this process, via an (a) custom form or a (b) browser addon."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-12-06T21:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "[nagios-devel] 20081107 Security fixes completed",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://sourceforge.net/mailarchive/forum.php?thread_name=4914396D.5010009%40op5.se\u0026forum_name=nagios-devel"
        },
        {
          "name": "ADV-2008-3364",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/3364"
        },
        {
          "name": "GLSA-200907-15",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-200907-15.xml"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.nagios.org/development/history/nagios-3x.php"
        },
        {
          "name": "33320",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/33320"
        },
        {
          "name": "[oss-security] 20081106 CVE request: Nagios (two issues)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2008/11/06/2"
        },
        {
          "name": "32156",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/32156"
        },
        {
          "name": "1022165",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1022165"
        },
        {
          "name": "USN-698-3",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "https://www.ubuntu.com/usn/USN-698-3/"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.op5.com/support/news/389-important-security-fix-available-for-op5-monitor"
        },
        {
          "name": "ADV-2008-3029",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/3029"
        },
        {
          "name": "SSRT090060",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=124156641928637\u0026w=2"
        },
        {
          "name": "HPSBMA02419",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=124156641928637\u0026w=2"
        },
        {
          "name": "ADV-2009-1256",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/1256"
        },
        {
          "name": "USN-698-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-698-1"
        },
        {
          "name": "35002",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/35002"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-5027",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The Nagios process in (1) Nagios before 3.0.5 and (2) op5 Monitor before 4.0.1 allows remote authenticated users to bypass authorization checks, and trigger execution of arbitrary programs by this process, via an (a) custom form or a (b) browser addon."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "[nagios-devel] 20081107 Security fixes completed",
              "refsource": "MLIST",
              "url": "http://sourceforge.net/mailarchive/forum.php?thread_name=4914396D.5010009%40op5.se\u0026forum_name=nagios-devel"
            },
            {
              "name": "ADV-2008-3364",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/3364"
            },
            {
              "name": "GLSA-200907-15",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-200907-15.xml"
            },
            {
              "name": "http://www.nagios.org/development/history/nagios-3x.php",
              "refsource": "MISC",
              "url": "http://www.nagios.org/development/history/nagios-3x.php"
            },
            {
              "name": "33320",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/33320"
            },
            {
              "name": "[oss-security] 20081106 CVE request: Nagios (two issues)",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2008/11/06/2"
            },
            {
              "name": "32156",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/32156"
            },
            {
              "name": "1022165",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1022165"
            },
            {
              "name": "USN-698-3",
              "refsource": "UBUNTU",
              "url": "https://www.ubuntu.com/usn/USN-698-3/"
            },
            {
              "name": "http://www.op5.com/support/news/389-important-security-fix-available-for-op5-monitor",
              "refsource": "CONFIRM",
              "url": "http://www.op5.com/support/news/389-important-security-fix-available-for-op5-monitor"
            },
            {
              "name": "ADV-2008-3029",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/3029"
            },
            {
              "name": "SSRT090060",
              "refsource": "HP",
              "url": "http://marc.info/?l=bugtraq\u0026m=124156641928637\u0026w=2"
            },
            {
              "name": "HPSBMA02419",
              "refsource": "HP",
              "url": "http://marc.info/?l=bugtraq\u0026m=124156641928637\u0026w=2"
            },
            {
              "name": "ADV-2009-1256",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2009/1256"
            },
            {
              "name": "USN-698-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-698-1"
            },
            {
              "name": "35002",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/35002"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-5027",
    "datePublished": "2008-11-10T15:00:00",
    "dateReserved": "2008-11-10T00:00:00",
    "dateUpdated": "2024-08-07T10:40:17.262Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2014-5009
Vulnerability from cvelistv5
Published
2017-03-31 15:00
Modified
2024-08-06 11:34
Severity ?
Summary
Snoopy allows remote attackers to execute arbitrary commands. NOTE: this vulnerability exists due to an incomplete fix for CVE-2014-5008.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T11:34:37.165Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "[oss-security] 20140709 CVE request - Snoopy incomplete fix for CVE-2008-4796",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2014/07/09/11"
          },
          {
            "name": "68783",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/68783"
          },
          {
            "name": "[oss-security] 20140718 Re: CVE request - Snoopy incomplete fix for CVE-2008-4796",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2014/07/18/2"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://snoopy.cvs.sourceforge.net/viewvc/snoopy/Snoopy/Snoopy.class.php?r1=1.28\u0026r2=1.29"
          },
          {
            "name": "[oss-security] 20140716 Re: Re: CVE request - Snoopy incomplete fix for CVE-2008-4796",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2014/07/16/10"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www-01.ibm.com/support/docview.wss?uid=isg3T1024264"
          },
          {
            "name": "RHSA-2017:0212",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2017-0212.html"
          },
          {
            "name": "RHSA-2017:0213",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2017-0213.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1121497"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://github.com/cogdog/feed2js/pull/12#issuecomment-48283706"
          },
          {
            "name": "snoopy-cve20145009-command-exec(94738)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94738"
          },
          {
            "name": "RHSA-2017:0214",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2017-0214.html"
          },
          {
            "name": "RHSA-2017:0211",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2017-0211.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-07-08T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Snoopy allows remote attackers to execute arbitrary commands.  NOTE: this vulnerability exists due to an incomplete fix for CVE-2014-5008."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-28T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "[oss-security] 20140709 CVE request - Snoopy incomplete fix for CVE-2008-4796",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2014/07/09/11"
        },
        {
          "name": "68783",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/68783"
        },
        {
          "name": "[oss-security] 20140718 Re: CVE request - Snoopy incomplete fix for CVE-2008-4796",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2014/07/18/2"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://snoopy.cvs.sourceforge.net/viewvc/snoopy/Snoopy/Snoopy.class.php?r1=1.28\u0026r2=1.29"
        },
        {
          "name": "[oss-security] 20140716 Re: Re: CVE request - Snoopy incomplete fix for CVE-2008-4796",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2014/07/16/10"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www-01.ibm.com/support/docview.wss?uid=isg3T1024264"
        },
        {
          "name": "RHSA-2017:0212",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2017-0212.html"
        },
        {
          "name": "RHSA-2017:0213",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2017-0213.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1121497"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/cogdog/feed2js/pull/12#issuecomment-48283706"
        },
        {
          "name": "snoopy-cve20145009-command-exec(94738)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94738"
        },
        {
          "name": "RHSA-2017:0214",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2017-0214.html"
        },
        {
          "name": "RHSA-2017:0211",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2017-0211.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2014-5009",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Snoopy allows remote attackers to execute arbitrary commands.  NOTE: this vulnerability exists due to an incomplete fix for CVE-2014-5008."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "[oss-security] 20140709 CVE request - Snoopy incomplete fix for CVE-2008-4796",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2014/07/09/11"
            },
            {
              "name": "68783",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/68783"
            },
            {
              "name": "[oss-security] 20140718 Re: CVE request - Snoopy incomplete fix for CVE-2008-4796",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2014/07/18/2"
            },
            {
              "name": "http://snoopy.cvs.sourceforge.net/viewvc/snoopy/Snoopy/Snoopy.class.php?r1=1.28\u0026r2=1.29",
              "refsource": "CONFIRM",
              "url": "http://snoopy.cvs.sourceforge.net/viewvc/snoopy/Snoopy/Snoopy.class.php?r1=1.28\u0026r2=1.29"
            },
            {
              "name": "[oss-security] 20140716 Re: Re: CVE request - Snoopy incomplete fix for CVE-2008-4796",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2014/07/16/10"
            },
            {
              "name": "https://www-01.ibm.com/support/docview.wss?uid=isg3T1024264",
              "refsource": "MISC",
              "url": "https://www-01.ibm.com/support/docview.wss?uid=isg3T1024264"
            },
            {
              "name": "RHSA-2017:0212",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2017-0212.html"
            },
            {
              "name": "RHSA-2017:0213",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2017-0213.html"
            },
            {
              "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1121497",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1121497"
            },
            {
              "name": "https://github.com/cogdog/feed2js/pull/12#issuecomment-48283706",
              "refsource": "MISC",
              "url": "https://github.com/cogdog/feed2js/pull/12#issuecomment-48283706"
            },
            {
              "name": "snoopy-cve20145009-command-exec(94738)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/94738"
            },
            {
              "name": "RHSA-2017:0214",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2017-0214.html"
            },
            {
              "name": "RHSA-2017:0211",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2017-0211.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2014-5009",
    "datePublished": "2017-03-31T15:00:00",
    "dateReserved": "2014-07-18T00:00:00",
    "dateUpdated": "2024-08-06T11:34:37.165Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2016-9566
Vulnerability from cvelistv5
Published
2016-12-15 22:00
Modified
2024-08-06 02:50
Severity ?
Summary
base/logging.c in Nagios Core before 4.2.4 allows local users with access to an account in the nagios group to gain root privileges via a symlink attack on the log file. NOTE: this can be leveraged by remote attackers using CVE-2016-9565.
References
https://security.gentoo.org/glsa/201710-20vendor-advisory, x_refsource_GENTOO
https://www.exploit-db.com/exploits/40921/exploit, x_refsource_EXPLOIT-DB
http://www.securityfocus.com/bid/94919vdb-entry, x_refsource_BID
https://github.com/NagiosEnterprises/nagioscore/commit/c29557dec91eba2306f5fb11b8da4474ba63f8c4x_refsource_CONFIRM
http://rhn.redhat.com/errata/RHSA-2017-0258.htmlvendor-advisory, x_refsource_REDHAT
https://security.gentoo.org/glsa/201612-51vendor-advisory, x_refsource_GENTOO
http://rhn.redhat.com/errata/RHSA-2017-0212.htmlvendor-advisory, x_refsource_REDHAT
http://rhn.redhat.com/errata/RHSA-2017-0213.htmlvendor-advisory, x_refsource_REDHAT
https://www.nagios.org/projects/nagios-core/history/4x/x_refsource_CONFIRM
https://security.gentoo.org/glsa/201702-26vendor-advisory, x_refsource_GENTOO
https://lists.debian.org/debian-lts-announce/2018/12/msg00014.htmlmailing-list, x_refsource_MLIST
http://rhn.redhat.com/errata/RHSA-2017-0259.htmlvendor-advisory, x_refsource_REDHAT
http://www.securitytracker.com/id/1037487vdb-entry, x_refsource_SECTRACK
http://seclists.org/fulldisclosure/2016/Dec/58mailing-list, x_refsource_FULLDISC
https://bugzilla.redhat.com/show_bug.cgi?id=1402869x_refsource_CONFIRM
https://legalhackers.com/advisories/Nagios-Exploit-Root-PrivEsc-CVE-2016-9566.htmlx_refsource_MISC
http://rhn.redhat.com/errata/RHSA-2017-0214.htmlvendor-advisory, x_refsource_REDHAT
http://rhn.redhat.com/errata/RHSA-2017-0211.htmlvendor-advisory, x_refsource_REDHAT
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T02:50:38.682Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "GLSA-201710-20",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "https://security.gentoo.org/glsa/201710-20"
          },
          {
            "name": "40921",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "https://www.exploit-db.com/exploits/40921/"
          },
          {
            "name": "94919",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/94919"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://github.com/NagiosEnterprises/nagioscore/commit/c29557dec91eba2306f5fb11b8da4474ba63f8c4"
          },
          {
            "name": "RHSA-2017:0258",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2017-0258.html"
          },
          {
            "name": "GLSA-201612-51",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "https://security.gentoo.org/glsa/201612-51"
          },
          {
            "name": "RHSA-2017:0212",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2017-0212.html"
          },
          {
            "name": "RHSA-2017:0213",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2017-0213.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.nagios.org/projects/nagios-core/history/4x/"
          },
          {
            "name": "GLSA-201702-26",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "https://security.gentoo.org/glsa/201702-26"
          },
          {
            "name": "[debian-lts-announce] 20181224 [SECURITY] [DLA 1615-1] nagios3 security update",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2018/12/msg00014.html"
          },
          {
            "name": "RHSA-2017:0259",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2017-0259.html"
          },
          {
            "name": "1037487",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1037487"
          },
          {
            "name": "20161215 Nagios Core \u003c 4.2.4 Root Privilege Escalation [CVE-2016-9566]",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2016/Dec/58"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1402869"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://legalhackers.com/advisories/Nagios-Exploit-Root-PrivEsc-CVE-2016-9566.html"
          },
          {
            "name": "RHSA-2017:0214",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2017-0214.html"
          },
          {
            "name": "RHSA-2017:0211",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2017-0211.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2016-12-07T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "base/logging.c in Nagios Core before 4.2.4 allows local users with access to an account in the nagios group to gain root privileges via a symlink attack on the log file.  NOTE: this can be leveraged by remote attackers using CVE-2016-9565."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-12-25T10:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "GLSA-201710-20",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "https://security.gentoo.org/glsa/201710-20"
        },
        {
          "name": "40921",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "https://www.exploit-db.com/exploits/40921/"
        },
        {
          "name": "94919",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/94919"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://github.com/NagiosEnterprises/nagioscore/commit/c29557dec91eba2306f5fb11b8da4474ba63f8c4"
        },
        {
          "name": "RHSA-2017:0258",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2017-0258.html"
        },
        {
          "name": "GLSA-201612-51",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "https://security.gentoo.org/glsa/201612-51"
        },
        {
          "name": "RHSA-2017:0212",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2017-0212.html"
        },
        {
          "name": "RHSA-2017:0213",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2017-0213.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.nagios.org/projects/nagios-core/history/4x/"
        },
        {
          "name": "GLSA-201702-26",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "https://security.gentoo.org/glsa/201702-26"
        },
        {
          "name": "[debian-lts-announce] 20181224 [SECURITY] [DLA 1615-1] nagios3 security update",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2018/12/msg00014.html"
        },
        {
          "name": "RHSA-2017:0259",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2017-0259.html"
        },
        {
          "name": "1037487",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1037487"
        },
        {
          "name": "20161215 Nagios Core \u003c 4.2.4 Root Privilege Escalation [CVE-2016-9566]",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://seclists.org/fulldisclosure/2016/Dec/58"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1402869"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://legalhackers.com/advisories/Nagios-Exploit-Root-PrivEsc-CVE-2016-9566.html"
        },
        {
          "name": "RHSA-2017:0214",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2017-0214.html"
        },
        {
          "name": "RHSA-2017:0211",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2017-0211.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2016-9566",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "base/logging.c in Nagios Core before 4.2.4 allows local users with access to an account in the nagios group to gain root privileges via a symlink attack on the log file.  NOTE: this can be leveraged by remote attackers using CVE-2016-9565."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "GLSA-201710-20",
              "refsource": "GENTOO",
              "url": "https://security.gentoo.org/glsa/201710-20"
            },
            {
              "name": "40921",
              "refsource": "EXPLOIT-DB",
              "url": "https://www.exploit-db.com/exploits/40921/"
            },
            {
              "name": "94919",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/94919"
            },
            {
              "name": "https://github.com/NagiosEnterprises/nagioscore/commit/c29557dec91eba2306f5fb11b8da4474ba63f8c4",
              "refsource": "CONFIRM",
              "url": "https://github.com/NagiosEnterprises/nagioscore/commit/c29557dec91eba2306f5fb11b8da4474ba63f8c4"
            },
            {
              "name": "RHSA-2017:0258",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2017-0258.html"
            },
            {
              "name": "GLSA-201612-51",
              "refsource": "GENTOO",
              "url": "https://security.gentoo.org/glsa/201612-51"
            },
            {
              "name": "RHSA-2017:0212",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2017-0212.html"
            },
            {
              "name": "RHSA-2017:0213",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2017-0213.html"
            },
            {
              "name": "https://www.nagios.org/projects/nagios-core/history/4x/",
              "refsource": "CONFIRM",
              "url": "https://www.nagios.org/projects/nagios-core/history/4x/"
            },
            {
              "name": "GLSA-201702-26",
              "refsource": "GENTOO",
              "url": "https://security.gentoo.org/glsa/201702-26"
            },
            {
              "name": "[debian-lts-announce] 20181224 [SECURITY] [DLA 1615-1] nagios3 security update",
              "refsource": "MLIST",
              "url": "https://lists.debian.org/debian-lts-announce/2018/12/msg00014.html"
            },
            {
              "name": "RHSA-2017:0259",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2017-0259.html"
            },
            {
              "name": "1037487",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1037487"
            },
            {
              "name": "20161215 Nagios Core \u003c 4.2.4 Root Privilege Escalation [CVE-2016-9566]",
              "refsource": "FULLDISC",
              "url": "http://seclists.org/fulldisclosure/2016/Dec/58"
            },
            {
              "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1402869",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1402869"
            },
            {
              "name": "https://legalhackers.com/advisories/Nagios-Exploit-Root-PrivEsc-CVE-2016-9566.html",
              "refsource": "MISC",
              "url": "https://legalhackers.com/advisories/Nagios-Exploit-Root-PrivEsc-CVE-2016-9566.html"
            },
            {
              "name": "RHSA-2017:0214",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2017-0214.html"
            },
            {
              "name": "RHSA-2017:0211",
              "refsource": "REDHAT",
              "url": "http://rhn.redhat.com/errata/RHSA-2017-0211.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2016-9566",
    "datePublished": "2016-12-15T22:00:00",
    "dateReserved": "2016-11-22T00:00:00",
    "dateUpdated": "2024-08-06T02:50:38.682Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2013-7108
Vulnerability from cvelistv5
Published
2014-01-14 18:00
Modified
2024-08-06 18:01
Severity ?
Summary
Multiple off-by-one errors in Nagios Core 3.5.1, 4.0.2, and earlier, and Icinga before 1.8.5, 1.9 before 1.9.4, and 1.10 before 1.10.2 allow remote authenticated users to obtain sensitive information from process memory or cause a denial of service (crash) via a long string in the last key value in the variable list to the process_cgivars function in (1) avail.c, (2) cmd.c, (3) config.c, (4) extinfo.c, (5) histogram.c, (6) notifications.c, (7) outages.c, (8) status.c, (9) statusmap.c, (10) summary.c, and (11) trends.c in cgi/, which triggers a heap-based buffer over-read.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T18:01:19.334Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "MDVSA-2014:004",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:004"
          },
          {
            "name": "openSUSE-SU-2014:0069",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00046.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://sourceforge.net/p/nagios/nagioscore/ci/d97e03f32741a7d851826b03ed73ff4c9612a866/"
          },
          {
            "name": "56316",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/56316"
          },
          {
            "name": "openSUSE-SU-2014:0097",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00068.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://dev.icinga.org/issues/5251"
          },
          {
            "name": "[debian-lts-announce] 20181224 [SECURITY] [DLA 1615-1] nagios3 security update",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2018/12/msg00014.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.icinga.org/2013/12/17/icinga-security-releases-1-10-2-1-9-4-1-8-5/"
          },
          {
            "name": "[oss-security] 20131224 Re: CVE request: denial of service in Nagios (process_cgivars())",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2013/12/24/1"
          },
          {
            "name": "55976",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/55976"
          },
          {
            "name": "64363",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/64363"
          },
          {
            "name": "openSUSE-SU-2014:0016",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00010.html"
          },
          {
            "name": "openSUSE-SU-2014:0039",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00028.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2013-12-02T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple off-by-one errors in Nagios Core 3.5.1, 4.0.2, and earlier, and Icinga before 1.8.5, 1.9 before 1.9.4, and 1.10 before 1.10.2 allow remote authenticated users to obtain sensitive information from process memory or cause a denial of service (crash) via a long string in the last key value in the variable list to the process_cgivars function in (1) avail.c, (2) cmd.c, (3) config.c, (4) extinfo.c, (5) histogram.c, (6) notifications.c, (7) outages.c, (8) status.c, (9) statusmap.c, (10) summary.c, and (11) trends.c in cgi/, which triggers a heap-based buffer over-read."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-12-25T10:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "MDVSA-2014:004",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:004"
        },
        {
          "name": "openSUSE-SU-2014:0069",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00046.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://sourceforge.net/p/nagios/nagioscore/ci/d97e03f32741a7d851826b03ed73ff4c9612a866/"
        },
        {
          "name": "56316",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/56316"
        },
        {
          "name": "openSUSE-SU-2014:0097",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00068.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://dev.icinga.org/issues/5251"
        },
        {
          "name": "[debian-lts-announce] 20181224 [SECURITY] [DLA 1615-1] nagios3 security update",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2018/12/msg00014.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.icinga.org/2013/12/17/icinga-security-releases-1-10-2-1-9-4-1-8-5/"
        },
        {
          "name": "[oss-security] 20131224 Re: CVE request: denial of service in Nagios (process_cgivars())",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2013/12/24/1"
        },
        {
          "name": "55976",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/55976"
        },
        {
          "name": "64363",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/64363"
        },
        {
          "name": "openSUSE-SU-2014:0016",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00010.html"
        },
        {
          "name": "openSUSE-SU-2014:0039",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00028.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2013-7108",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple off-by-one errors in Nagios Core 3.5.1, 4.0.2, and earlier, and Icinga before 1.8.5, 1.9 before 1.9.4, and 1.10 before 1.10.2 allow remote authenticated users to obtain sensitive information from process memory or cause a denial of service (crash) via a long string in the last key value in the variable list to the process_cgivars function in (1) avail.c, (2) cmd.c, (3) config.c, (4) extinfo.c, (5) histogram.c, (6) notifications.c, (7) outages.c, (8) status.c, (9) statusmap.c, (10) summary.c, and (11) trends.c in cgi/, which triggers a heap-based buffer over-read."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "MDVSA-2014:004",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:004"
            },
            {
              "name": "openSUSE-SU-2014:0069",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00046.html"
            },
            {
              "name": "http://sourceforge.net/p/nagios/nagioscore/ci/d97e03f32741a7d851826b03ed73ff4c9612a866/",
              "refsource": "CONFIRM",
              "url": "http://sourceforge.net/p/nagios/nagioscore/ci/d97e03f32741a7d851826b03ed73ff4c9612a866/"
            },
            {
              "name": "56316",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/56316"
            },
            {
              "name": "openSUSE-SU-2014:0097",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00068.html"
            },
            {
              "name": "https://dev.icinga.org/issues/5251",
              "refsource": "CONFIRM",
              "url": "https://dev.icinga.org/issues/5251"
            },
            {
              "name": "[debian-lts-announce] 20181224 [SECURITY] [DLA 1615-1] nagios3 security update",
              "refsource": "MLIST",
              "url": "https://lists.debian.org/debian-lts-announce/2018/12/msg00014.html"
            },
            {
              "name": "https://www.icinga.org/2013/12/17/icinga-security-releases-1-10-2-1-9-4-1-8-5/",
              "refsource": "CONFIRM",
              "url": "https://www.icinga.org/2013/12/17/icinga-security-releases-1-10-2-1-9-4-1-8-5/"
            },
            {
              "name": "[oss-security] 20131224 Re: CVE request: denial of service in Nagios (process_cgivars())",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2013/12/24/1"
            },
            {
              "name": "55976",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/55976"
            },
            {
              "name": "64363",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/64363"
            },
            {
              "name": "openSUSE-SU-2014:0016",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00010.html"
            },
            {
              "name": "openSUSE-SU-2014:0039",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00028.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2013-7108",
    "datePublished": "2014-01-14T18:00:00",
    "dateReserved": "2013-12-15T00:00:00",
    "dateUpdated": "2024-08-06T18:01:19.334Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2013-2214
Vulnerability from cvelistv5
Published
2014-02-10 23:00
Modified
2024-08-06 15:27
Severity ?
Summary
status.cgi in Nagios 4.0 before 4.0 beta4 and 3.x before 3.5.1 does not properly restrict access to certain users that are a contact for a service, which allows remote authenticated users to obtain sensitive information about hostnames via the servicegroup (1) overview, (2) summary, or (3) grid style in status.cgi. NOTE: this behavior is by design in most 3.x versions, but the upstream vendor "decided to change it for Nagios 4" and 3.5.1.
References
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T15:27:41.093Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "[oss-security] 20130626 Re: CVE request: unauthorized host/service views displayed in servicegroup view",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://seclists.org/oss-sec/2013/q2/622"
          },
          {
            "name": "openSUSE-SU-2013:1158",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2013-07/msg00029.html"
          },
          {
            "name": "[oss-security] 20130626 CVE request: unauthorized host/service views displayed in servicegroup view",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://seclists.org/oss-sec/2013/q2/619"
          },
          {
            "name": "openSUSE-SU-2013:1160",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2013-07/msg00031.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://tracker.nagios.org/view.php?id=456"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2013-06-26T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "status.cgi in Nagios 4.0 before 4.0 beta4 and 3.x before 3.5.1 does not properly restrict access to certain users that are a contact for a service, which allows remote authenticated users to obtain sensitive information about hostnames via the servicegroup (1) overview, (2) summary, or (3) grid style in status.cgi.  NOTE: this behavior is by design in most 3.x versions, but the upstream vendor \"decided to change it for Nagios 4\" and 3.5.1."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2014-02-10T22:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "[oss-security] 20130626 Re: CVE request: unauthorized host/service views displayed in servicegroup view",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://seclists.org/oss-sec/2013/q2/622"
        },
        {
          "name": "openSUSE-SU-2013:1158",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2013-07/msg00029.html"
        },
        {
          "name": "[oss-security] 20130626 CVE request: unauthorized host/service views displayed in servicegroup view",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://seclists.org/oss-sec/2013/q2/619"
        },
        {
          "name": "openSUSE-SU-2013:1160",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2013-07/msg00031.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://tracker.nagios.org/view.php?id=456"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2013-2214",
    "datePublished": "2014-02-10T23:00:00",
    "dateReserved": "2013-02-19T00:00:00",
    "dateUpdated": "2024-08-06T15:27:41.093Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2007-5803
Vulnerability from cvelistv5
Published
2008-05-13 23:00
Modified
2024-08-07 15:47
Severity ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in CGI programs in Nagios before 2.12 might allow remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different issue than CVE-2007-5624 and CVE-2008-1360.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T15:47:00.589Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "SUSE-SR:2008:011",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2008-05/msg00000.html"
          },
          {
            "name": "nagios-cgi-unspecified-xss(42522)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42522"
          },
          {
            "name": "30202",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30202"
          },
          {
            "name": "ADV-2008-1567",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/1567/references"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://sourceforge.net/project/shownotes.php?release_id=600377\u0026group_id=26589"
          },
          {
            "name": "30283",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/30283"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://sourceforge.net/project/shownotes.php?release_id=600377"
          },
          {
            "name": "29140",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/29140"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-05-12T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple cross-site scripting (XSS) vulnerabilities in CGI programs in Nagios before 2.12 might allow remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different issue than CVE-2007-5624 and CVE-2008-1360."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-28T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "SUSE-SR:2008:011",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2008-05/msg00000.html"
        },
        {
          "name": "nagios-cgi-unspecified-xss(42522)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42522"
        },
        {
          "name": "30202",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30202"
        },
        {
          "name": "ADV-2008-1567",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/1567/references"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://sourceforge.net/project/shownotes.php?release_id=600377\u0026group_id=26589"
        },
        {
          "name": "30283",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/30283"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://sourceforge.net/project/shownotes.php?release_id=600377"
        },
        {
          "name": "29140",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/29140"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-5803",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple cross-site scripting (XSS) vulnerabilities in CGI programs in Nagios before 2.12 might allow remote attackers to inject arbitrary web script or HTML via unspecified vectors, a different issue than CVE-2007-5624 and CVE-2008-1360."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "SUSE-SR:2008:011",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2008-05/msg00000.html"
            },
            {
              "name": "nagios-cgi-unspecified-xss(42522)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/42522"
            },
            {
              "name": "30202",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30202"
            },
            {
              "name": "ADV-2008-1567",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/1567/references"
            },
            {
              "name": "http://sourceforge.net/project/shownotes.php?release_id=600377\u0026group_id=26589",
              "refsource": "CONFIRM",
              "url": "http://sourceforge.net/project/shownotes.php?release_id=600377\u0026group_id=26589"
            },
            {
              "name": "30283",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/30283"
            },
            {
              "name": "http://sourceforge.net/project/shownotes.php?release_id=600377",
              "refsource": "CONFIRM",
              "url": "http://sourceforge.net/project/shownotes.php?release_id=600377"
            },
            {
              "name": "29140",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/29140"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-5803",
    "datePublished": "2008-05-13T23:00:00",
    "dateReserved": "2007-11-05T00:00:00",
    "dateUpdated": "2024-08-07T15:47:00.589Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2011-1523
Vulnerability from cvelistv5
Published
2011-05-03 19:00
Modified
2024-08-06 22:28
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in statusmap.c in statusmap.cgi in Nagios 3.2.3 and earlier allows remote attackers to inject arbitrary web script or HTML via the layer parameter.
References
http://securityreason.com/securityalert/8241third-party-advisory, x_refsource_SREASON
http://secunia.com/advisories/43287third-party-advisory, x_refsource_SECUNIA
https://bugzilla.redhat.com/show_bug.cgi?id=690877x_refsource_CONFIRM
http://tracker.nagios.org/view.php?id=207x_refsource_MISC
http://www.rul3z.de/advisories/SSCHADV2011-002.txtx_refsource_MISC
http://secunia.com/advisories/44974third-party-advisory, x_refsource_SECUNIA
http://openwall.com/lists/oss-security/2011/03/25/3mailing-list, x_refsource_MLIST
http://www.ubuntu.com/usn/USN-1151-1vendor-advisory, x_refsource_UBUNTU
http://openwall.com/lists/oss-security/2011/03/28/4mailing-list, x_refsource_MLIST
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T22:28:41.906Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "8241",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/8241"
          },
          {
            "name": "43287",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/43287"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=690877"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://tracker.nagios.org/view.php?id=207"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.rul3z.de/advisories/SSCHADV2011-002.txt"
          },
          {
            "name": "44974",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/44974"
          },
          {
            "name": "[oss-security] 20110325 CVE Request -- Nagios -- XSS in the network status map CGI script",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://openwall.com/lists/oss-security/2011/03/25/3"
          },
          {
            "name": "USN-1151-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-1151-1"
          },
          {
            "name": "[oss-security] 20110328 Re: CVE Request -- Nagios -- XSS in the network status map CGI script",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://openwall.com/lists/oss-security/2011/03/28/4"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-03-25T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting (XSS) vulnerability in statusmap.c in statusmap.cgi in Nagios 3.2.3 and earlier allows remote attackers to inject arbitrary web script or HTML via the layer parameter."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2011-09-07T09:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "8241",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/8241"
        },
        {
          "name": "43287",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/43287"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=690877"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://tracker.nagios.org/view.php?id=207"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.rul3z.de/advisories/SSCHADV2011-002.txt"
        },
        {
          "name": "44974",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/44974"
        },
        {
          "name": "[oss-security] 20110325 CVE Request -- Nagios -- XSS in the network status map CGI script",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://openwall.com/lists/oss-security/2011/03/25/3"
        },
        {
          "name": "USN-1151-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-1151-1"
        },
        {
          "name": "[oss-security] 20110328 Re: CVE Request -- Nagios -- XSS in the network status map CGI script",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://openwall.com/lists/oss-security/2011/03/28/4"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2011-1523",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting (XSS) vulnerability in statusmap.c in statusmap.cgi in Nagios 3.2.3 and earlier allows remote attackers to inject arbitrary web script or HTML via the layer parameter."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "8241",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/8241"
            },
            {
              "name": "43287",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/43287"
            },
            {
              "name": "https://bugzilla.redhat.com/show_bug.cgi?id=690877",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.redhat.com/show_bug.cgi?id=690877"
            },
            {
              "name": "http://tracker.nagios.org/view.php?id=207",
              "refsource": "MISC",
              "url": "http://tracker.nagios.org/view.php?id=207"
            },
            {
              "name": "http://www.rul3z.de/advisories/SSCHADV2011-002.txt",
              "refsource": "MISC",
              "url": "http://www.rul3z.de/advisories/SSCHADV2011-002.txt"
            },
            {
              "name": "44974",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/44974"
            },
            {
              "name": "[oss-security] 20110325 CVE Request -- Nagios -- XSS in the network status map CGI script",
              "refsource": "MLIST",
              "url": "http://openwall.com/lists/oss-security/2011/03/25/3"
            },
            {
              "name": "USN-1151-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-1151-1"
            },
            {
              "name": "[oss-security] 20110328 Re: CVE Request -- Nagios -- XSS in the network status map CGI script",
              "refsource": "MLIST",
              "url": "http://openwall.com/lists/oss-security/2011/03/28/4"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2011-1523",
    "datePublished": "2011-05-03T19:00:00",
    "dateReserved": "2011-03-28T00:00:00",
    "dateUpdated": "2024-08-06T22:28:41.906Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-6584
Vulnerability from cvelistv5
Published
2020-03-16 15:33
Modified
2024-08-04 09:11
Severity ?
Summary
Nagios Log Server 2.1.3 has Incorrect Access Control.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T09:11:04.664Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.nagios.com/products/nagios-log-server/"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://medium.com/%40fixitt6/multiple-vulnerabilities-in-nagios-log-server-2-1-3-af7c160edc60"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://assets.nagios.com/downloads/nagios-log-server/CHANGES.TXT"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Nagios Log Server 2.1.3 has Incorrect Access Control."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-03-16T15:35:27",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.nagios.com/products/nagios-log-server/"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://medium.com/%40fixitt6/multiple-vulnerabilities-in-nagios-log-server-2-1-3-af7c160edc60"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://assets.nagios.com/downloads/nagios-log-server/CHANGES.TXT"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2020-6584",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Nagios Log Server 2.1.3 has Incorrect Access Control."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.nagios.com/products/nagios-log-server/",
              "refsource": "MISC",
              "url": "https://www.nagios.com/products/nagios-log-server/"
            },
            {
              "name": "https://medium.com/@fixitt6/multiple-vulnerabilities-in-nagios-log-server-2-1-3-af7c160edc60",
              "refsource": "MISC",
              "url": "https://medium.com/@fixitt6/multiple-vulnerabilities-in-nagios-log-server-2-1-3-af7c160edc60"
            },
            {
              "name": "https://assets.nagios.com/downloads/nagios-log-server/CHANGES.TXT",
              "refsource": "MISC",
              "url": "https://assets.nagios.com/downloads/nagios-log-server/CHANGES.TXT"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2020-6584",
    "datePublished": "2020-03-16T15:33:06",
    "dateReserved": "2020-01-08T00:00:00",
    "dateUpdated": "2024-08-04T09:11:04.664Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2012-6096
Vulnerability from cvelistv5
Published
2013-01-22 23:00
Modified
2024-08-06 21:21
Severity ?
Summary
Multiple stack-based buffer overflows in the get_history function in history.cgi in Nagios Core before 3.4.4, and Icinga 1.6.x before 1.6.2, 1.7.x before 1.7.4, and 1.8.x before 1.8.4, might allow remote attackers to execute arbitrary code via a long (1) host_name variable (host parameter) or (2) svc_description variable.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T21:21:28.457Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20121209 Nagios Core 3.4.3: Stack based buffer overflow in web interface",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2012-December/089125.html"
          },
          {
            "name": "DSA-2616",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2013/dsa-2616"
          },
          {
            "name": "openSUSE-SU-2013:0188",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00077.html"
          },
          {
            "name": "24084",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "http://www.exploit-db.com/exploits/24084"
          },
          {
            "name": "openSUSE-SU-2013:0140",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00033.html"
          },
          {
            "name": "51863",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/51863"
          },
          {
            "name": "openSUSE-SU-2013:0206",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00088.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.nagios.org/projects/nagioscore/history/core-3x"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=893269"
          },
          {
            "name": "24159",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "http://www.exploit-db.com/exploits/24159"
          },
          {
            "name": "89170",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/89170"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.icinga.org/2013/01/14/icinga-1-6-2-1-7-4-1-8-4-released/"
          },
          {
            "name": "openSUSE-SU-2013:0169",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00060.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://dev.icinga.org/issues/3532"
          },
          {
            "name": "DSA-2653",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2013/dsa-2653"
          },
          {
            "name": "56879",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/56879"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-12-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple stack-based buffer overflows in the get_history function in history.cgi in Nagios Core before 3.4.4, and Icinga 1.6.x before 1.6.2, 1.7.x before 1.7.4, and 1.8.x before 1.8.4, might allow remote attackers to execute arbitrary code via a long (1) host_name variable (host parameter) or (2) svc_description variable."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2013-02-02T10:00:00",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "20121209 Nagios Core 3.4.3: Stack based buffer overflow in web interface",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2012-December/089125.html"
        },
        {
          "name": "DSA-2616",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2013/dsa-2616"
        },
        {
          "name": "openSUSE-SU-2013:0188",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00077.html"
        },
        {
          "name": "24084",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "http://www.exploit-db.com/exploits/24084"
        },
        {
          "name": "openSUSE-SU-2013:0140",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00033.html"
        },
        {
          "name": "51863",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/51863"
        },
        {
          "name": "openSUSE-SU-2013:0206",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00088.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.nagios.org/projects/nagioscore/history/core-3x"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=893269"
        },
        {
          "name": "24159",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "http://www.exploit-db.com/exploits/24159"
        },
        {
          "name": "89170",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/89170"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.icinga.org/2013/01/14/icinga-1-6-2-1-7-4-1-8-4-released/"
        },
        {
          "name": "openSUSE-SU-2013:0169",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00060.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://dev.icinga.org/issues/3532"
        },
        {
          "name": "DSA-2653",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2013/dsa-2653"
        },
        {
          "name": "56879",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/56879"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2012-6096",
    "datePublished": "2013-01-22T23:00:00",
    "dateReserved": "2012-12-06T00:00:00",
    "dateUpdated": "2024-08-06T21:21:28.457Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2016-0726
Vulnerability from cvelistv5
Published
2017-06-06 18:00
Modified
2024-08-05 22:30
Severity ?
Summary
The Fedora Nagios package uses "nagiosadmin" as the default password for the "nagiosadmin" administrator account, which makes it easier for remote attackers to obtain access by leveraging knowledge of the credentials.
References
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T22:30:03.556Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1295446"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2016-01-04T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The Fedora Nagios package uses \"nagiosadmin\" as the default password for the \"nagiosadmin\" administrator account, which makes it easier for remote attackers to obtain access by leveraging knowledge of the credentials."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-06-06T17:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1295446"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2016-0726",
    "datePublished": "2017-06-06T18:00:00",
    "dateReserved": "2015-12-16T00:00:00",
    "dateUpdated": "2024-08-05T22:30:03.556Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2006-2162
Vulnerability from cvelistv5
Published
2006-05-03 21:00
Modified
2024-08-07 17:43
Severity ?
Summary
Buffer overflow in CGI scripts in Nagios 1.x before 1.4 and 2.x before 2.3 allows remote attackers to execute arbitrary code via a negative content length (Content-Length) HTTP header.
References
http://www.gentoo.org/security/en/glsa/glsa-200605-07.xmlvendor-advisory, x_refsource_GENTOO
https://usn.ubuntu.com/282-1/vendor-advisory, x_refsource_UBUNTU
http://www.debian.org/security/2006/dsa-1072vendor-advisory, x_refsource_DEBIAN
http://www.novell.com/linux/security/advisories/2006_05_19.htmlvendor-advisory, x_refsource_SUSE
http://www.nagios.org/development/changelog.phpx_refsource_CONFIRM
http://www.vupen.com/english/advisories/2006/1662vdb-entry, x_refsource_VUPEN
http://secunia.com/advisories/19998third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/19991third-party-advisory, x_refsource_SECUNIA
https://exchange.xforce.ibmcloud.com/vulnerabilities/26253vdb-entry, x_refsource_XF
http://secunia.com/advisories/20013third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/20215third-party-advisory, x_refsource_SECUNIA
https://sourceforge.net/mailarchive/forum.php?thread_id=10297806&forum_id=7890x_refsource_CONFIRM
http://www.securityfocus.com/bid/17879vdb-entry, x_refsource_BID
http://secunia.com/advisories/20247third-party-advisory, x_refsource_SECUNIA
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T17:43:27.424Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "GLSA-200605-07",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://www.gentoo.org/security/en/glsa/glsa-200605-07.xml"
          },
          {
            "name": "USN-282-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "https://usn.ubuntu.com/282-1/"
          },
          {
            "name": "DSA-1072",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2006/dsa-1072"
          },
          {
            "name": "SUSE-SR:2006:011",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://www.novell.com/linux/security/advisories/2006_05_19.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.nagios.org/development/changelog.php"
          },
          {
            "name": "ADV-2006-1662",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/1662"
          },
          {
            "name": "19998",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/19998"
          },
          {
            "name": "19991",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/19991"
          },
          {
            "name": "nagios-multiple-scripts-bo(26253)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26253"
          },
          {
            "name": "20013",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20013"
          },
          {
            "name": "20215",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20215"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://sourceforge.net/mailarchive/forum.php?thread_id=10297806\u0026forum_id=7890"
          },
          {
            "name": "17879",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/17879"
          },
          {
            "name": "20247",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20247"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-05-03T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflow in CGI scripts in Nagios 1.x before 1.4 and 2.x before 2.3 allows remote attackers to execute arbitrary code via a negative content length (Content-Length) HTTP header."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-03T20:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "GLSA-200605-07",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://www.gentoo.org/security/en/glsa/glsa-200605-07.xml"
        },
        {
          "name": "USN-282-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "https://usn.ubuntu.com/282-1/"
        },
        {
          "name": "DSA-1072",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2006/dsa-1072"
        },
        {
          "name": "SUSE-SR:2006:011",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://www.novell.com/linux/security/advisories/2006_05_19.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.nagios.org/development/changelog.php"
        },
        {
          "name": "ADV-2006-1662",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/1662"
        },
        {
          "name": "19998",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/19998"
        },
        {
          "name": "19991",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/19991"
        },
        {
          "name": "nagios-multiple-scripts-bo(26253)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26253"
        },
        {
          "name": "20013",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20013"
        },
        {
          "name": "20215",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20215"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://sourceforge.net/mailarchive/forum.php?thread_id=10297806\u0026forum_id=7890"
        },
        {
          "name": "17879",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/17879"
        },
        {
          "name": "20247",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20247"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secalert@redhat.com",
          "ID": "CVE-2006-2162",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Buffer overflow in CGI scripts in Nagios 1.x before 1.4 and 2.x before 2.3 allows remote attackers to execute arbitrary code via a negative content length (Content-Length) HTTP header."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "GLSA-200605-07",
              "refsource": "GENTOO",
              "url": "http://www.gentoo.org/security/en/glsa/glsa-200605-07.xml"
            },
            {
              "name": "USN-282-1",
              "refsource": "UBUNTU",
              "url": "https://usn.ubuntu.com/282-1/"
            },
            {
              "name": "DSA-1072",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2006/dsa-1072"
            },
            {
              "name": "SUSE-SR:2006:011",
              "refsource": "SUSE",
              "url": "http://www.novell.com/linux/security/advisories/2006_05_19.html"
            },
            {
              "name": "http://www.nagios.org/development/changelog.php",
              "refsource": "CONFIRM",
              "url": "http://www.nagios.org/development/changelog.php"
            },
            {
              "name": "ADV-2006-1662",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/1662"
            },
            {
              "name": "19998",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/19998"
            },
            {
              "name": "19991",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/19991"
            },
            {
              "name": "nagios-multiple-scripts-bo(26253)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26253"
            },
            {
              "name": "20013",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/20013"
            },
            {
              "name": "20215",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/20215"
            },
            {
              "name": "https://sourceforge.net/mailarchive/forum.php?thread_id=10297806\u0026forum_id=7890",
              "refsource": "CONFIRM",
              "url": "https://sourceforge.net/mailarchive/forum.php?thread_id=10297806\u0026forum_id=7890"
            },
            {
              "name": "17879",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/17879"
            },
            {
              "name": "20247",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/20247"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2006-2162",
    "datePublished": "2006-05-03T21:00:00",
    "dateReserved": "2006-05-03T00:00:00",
    "dateUpdated": "2024-08-07T17:43:27.424Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2002-1959
Vulnerability from cvelistv5
Published
2005-06-28 04:00
Modified
2024-09-16 19:15
Severity ?
Summary
Nagios 1.0b1 through 1.0b3 allows remote attackers to execute arbitrary commands via shell metacharacters in plugin output.
References
http://www.securityfocus.com/bid/5174vdb-entry, x_refsource_BID
http://www.iss.net/security_center/static/9508.phpvdb-entry, x_refsource_XF
http://www.nagios.org/changelog.phpx_refsource_CONFIRM
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T03:43:33.624Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "5174",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/5174"
          },
          {
            "name": "nagios-plugin-command-execution(9508)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "http://www.iss.net/security_center/static/9508.php"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.nagios.org/changelog.php"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Nagios 1.0b1 through 1.0b3 allows remote attackers to execute arbitrary commands via shell metacharacters in plugin output."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2005-06-28T04:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "5174",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/5174"
        },
        {
          "name": "nagios-plugin-command-execution(9508)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "http://www.iss.net/security_center/static/9508.php"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.nagios.org/changelog.php"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2002-1959",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Nagios 1.0b1 through 1.0b3 allows remote attackers to execute arbitrary commands via shell metacharacters in plugin output."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "5174",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/5174"
            },
            {
              "name": "nagios-plugin-command-execution(9508)",
              "refsource": "XF",
              "url": "http://www.iss.net/security_center/static/9508.php"
            },
            {
              "name": "http://www.nagios.org/changelog.php",
              "refsource": "CONFIRM",
              "url": "http://www.nagios.org/changelog.php"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2002-1959",
    "datePublished": "2005-06-28T04:00:00Z",
    "dateReserved": "2005-06-28T04:00:00Z",
    "dateUpdated": "2024-09-16T19:15:18.226Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2014-4703
Vulnerability from cvelistv5
Published
2014-12-05 16:00
Modified
2024-08-06 11:27
Severity ?
Summary
lib/parse_ini.c in Nagios Plugins 2.0.2 allows local users to obtain sensitive information via a symlink attack on the configuration file in the extra-opts flag. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-4701.
References
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T11:27:36.071Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://nagios-plugins.org/nagios-plugins-2-0-3-released/"
          },
          {
            "name": "20140628 check_dhcp - Nagios Plugins = 2.0.2 Race Condition",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://seclists.org/fulldisclosure/2014/Jun/141"
          },
          {
            "name": "76810",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/76810"
          },
          {
            "name": "[oss-security] 20140630 Re: CVE requests: nagios check_dhcp plug-in: read parts of INI config files belonging to root",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2014/06/30/6"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-06-28T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "lib/parse_ini.c in Nagios Plugins 2.0.2 allows local users to obtain sensitive information via a symlink attack on the configuration file in the extra-opts flag.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-4701."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-11-25T19:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://nagios-plugins.org/nagios-plugins-2-0-3-released/"
        },
        {
          "name": "20140628 check_dhcp - Nagios Plugins = 2.0.2 Race Condition",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://seclists.org/fulldisclosure/2014/Jun/141"
        },
        {
          "name": "76810",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/76810"
        },
        {
          "name": "[oss-security] 20140630 Re: CVE requests: nagios check_dhcp plug-in: read parts of INI config files belonging to root",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2014/06/30/6"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2014-4703",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "lib/parse_ini.c in Nagios Plugins 2.0.2 allows local users to obtain sensitive information via a symlink attack on the configuration file in the extra-opts flag.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-4701."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://nagios-plugins.org/nagios-plugins-2-0-3-released/",
              "refsource": "CONFIRM",
              "url": "http://nagios-plugins.org/nagios-plugins-2-0-3-released/"
            },
            {
              "name": "20140628 check_dhcp - Nagios Plugins = 2.0.2 Race Condition",
              "refsource": "FULLDISC",
              "url": "http://seclists.org/fulldisclosure/2014/Jun/141"
            },
            {
              "name": "76810",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/76810"
            },
            {
              "name": "[oss-security] 20140630 Re: CVE requests: nagios check_dhcp plug-in: read parts of INI config files belonging to root",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2014/06/30/6"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2014-4703",
    "datePublished": "2014-12-05T16:00:00",
    "dateReserved": "2014-06-30T00:00:00",
    "dateUpdated": "2024-08-06T11:27:36.071Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2007-5624
Vulnerability from cvelistv5
Published
2007-10-23 16:00
Modified
2024-08-07 15:39
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in Nagios 2.x before 2.10 allows remote attackers to inject arbitrary web script or HTML via unknown vectors to unspecified CGI scripts.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T15:39:13.208Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "SUSE-SR:2008:011",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2008-05/msg00000.html"
          },
          {
            "name": "FEDORA-2007-4145",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00161.html"
          },
          {
            "name": "MDVSA-2008:067",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:067"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=362791"
          },
          {
            "name": "ADV-2007-3567",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2007/3567"
          },
          {
            "name": "27980",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/27980"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.nagios.org/development/changelog.php#2x_branch"
          },
          {
            "name": "nagios-cgi-xss(37350)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/37350"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=362801"
          },
          {
            "name": "26152",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/26152"
          },
          {
            "name": "FEDORA-2007-4123",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00125.html"
          },
          {
            "name": "27316",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/27316"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-10-21T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting (XSS) vulnerability in Nagios 2.x before 2.10 allows remote attackers to inject arbitrary web script or HTML via unknown vectors to unspecified CGI scripts."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-28T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "SUSE-SR:2008:011",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2008-05/msg00000.html"
        },
        {
          "name": "FEDORA-2007-4145",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00161.html"
        },
        {
          "name": "MDVSA-2008:067",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:067"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=362791"
        },
        {
          "name": "ADV-2007-3567",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2007/3567"
        },
        {
          "name": "27980",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/27980"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.nagios.org/development/changelog.php#2x_branch"
        },
        {
          "name": "nagios-cgi-xss(37350)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/37350"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=362801"
        },
        {
          "name": "26152",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/26152"
        },
        {
          "name": "FEDORA-2007-4123",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00125.html"
        },
        {
          "name": "27316",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/27316"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-5624",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting (XSS) vulnerability in Nagios 2.x before 2.10 allows remote attackers to inject arbitrary web script or HTML via unknown vectors to unspecified CGI scripts."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "SUSE-SR:2008:011",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2008-05/msg00000.html"
            },
            {
              "name": "FEDORA-2007-4145",
              "refsource": "FEDORA",
              "url": "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00161.html"
            },
            {
              "name": "MDVSA-2008:067",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2008:067"
            },
            {
              "name": "https://bugzilla.redhat.com/show_bug.cgi?id=362791",
              "refsource": "MISC",
              "url": "https://bugzilla.redhat.com/show_bug.cgi?id=362791"
            },
            {
              "name": "ADV-2007-3567",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2007/3567"
            },
            {
              "name": "27980",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/27980"
            },
            {
              "name": "http://www.nagios.org/development/changelog.php#2x_branch",
              "refsource": "CONFIRM",
              "url": "http://www.nagios.org/development/changelog.php#2x_branch"
            },
            {
              "name": "nagios-cgi-xss(37350)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/37350"
            },
            {
              "name": "https://bugzilla.redhat.com/show_bug.cgi?id=362801",
              "refsource": "MISC",
              "url": "https://bugzilla.redhat.com/show_bug.cgi?id=362801"
            },
            {
              "name": "26152",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/26152"
            },
            {
              "name": "FEDORA-2007-4123",
              "refsource": "FEDORA",
              "url": "https://www.redhat.com/archives/fedora-package-announce/2007-December/msg00125.html"
            },
            {
              "name": "27316",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/27316"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-5624",
    "datePublished": "2007-10-23T16:00:00",
    "dateReserved": "2007-10-23T00:00:00",
    "dateUpdated": "2024-08-07T15:39:13.208Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2013-7205
Vulnerability from cvelistv5
Published
2014-01-14 18:00
Modified
2024-08-06 18:01
Severity ?
Summary
Off-by-one error in the process_cgivars function in contrib/daemonchk.c in Nagios Core 3.5.1, 4.0.2, and earlier allows remote authenticated users to obtain sensitive information from process memory or cause a denial of service (crash) via a long string in the last key value in the variable list, which triggers a heap-based buffer over-read.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T18:01:20.131Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "64489",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/64489"
          },
          {
            "name": "MDVSA-2014:004",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:004"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://sourceforge.net/p/nagios/nagioscore/ci/d97e03f32741a7d851826b03ed73ff4c9612a866/"
          },
          {
            "name": "[debian-lts-announce] 20181224 [SECURITY] [DLA 1615-1] nagios3 security update",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2018/12/msg00014.html"
          },
          {
            "name": "[oss-security] 20131224 Re: CVE request: denial of service in Nagios (process_cgivars())",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2013/12/24/1"
          },
          {
            "name": "55976",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/55976"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2013-12-20T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Off-by-one error in the process_cgivars function in contrib/daemonchk.c in Nagios Core 3.5.1, 4.0.2, and earlier allows remote authenticated users to obtain sensitive information from process memory or cause a denial of service (crash) via a long string in the last key value in the variable list, which triggers a heap-based buffer over-read."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-12-25T10:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "64489",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/64489"
        },
        {
          "name": "MDVSA-2014:004",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:004"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://sourceforge.net/p/nagios/nagioscore/ci/d97e03f32741a7d851826b03ed73ff4c9612a866/"
        },
        {
          "name": "[debian-lts-announce] 20181224 [SECURITY] [DLA 1615-1] nagios3 security update",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2018/12/msg00014.html"
        },
        {
          "name": "[oss-security] 20131224 Re: CVE request: denial of service in Nagios (process_cgivars())",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2013/12/24/1"
        },
        {
          "name": "55976",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/55976"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2013-7205",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Off-by-one error in the process_cgivars function in contrib/daemonchk.c in Nagios Core 3.5.1, 4.0.2, and earlier allows remote authenticated users to obtain sensitive information from process memory or cause a denial of service (crash) via a long string in the last key value in the variable list, which triggers a heap-based buffer over-read."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "64489",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/64489"
            },
            {
              "name": "MDVSA-2014:004",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:004"
            },
            {
              "name": "http://sourceforge.net/p/nagios/nagioscore/ci/d97e03f32741a7d851826b03ed73ff4c9612a866/",
              "refsource": "CONFIRM",
              "url": "http://sourceforge.net/p/nagios/nagioscore/ci/d97e03f32741a7d851826b03ed73ff4c9612a866/"
            },
            {
              "name": "[debian-lts-announce] 20181224 [SECURITY] [DLA 1615-1] nagios3 security update",
              "refsource": "MLIST",
              "url": "https://lists.debian.org/debian-lts-announce/2018/12/msg00014.html"
            },
            {
              "name": "[oss-security] 20131224 Re: CVE request: denial of service in Nagios (process_cgivars())",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2013/12/24/1"
            },
            {
              "name": "55976",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/55976"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2013-7205",
    "datePublished": "2014-01-14T18:00:00",
    "dateReserved": "2013-12-23T00:00:00",
    "dateUpdated": "2024-08-06T18:01:20.131Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2014-4702
Vulnerability from cvelistv5
Published
2014-12-05 16:00
Modified
2024-08-06 11:27
Severity ?
Summary
The check_icmp plugin in Nagios Plugins before 2.0.2 allows local users to obtain sensitive information from INI configuration files via the extra-opts flag, a different vulnerability than CVE-2014-4701.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T11:27:36.534Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "61319",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/61319"
          },
          {
            "name": "58751",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/58751"
          },
          {
            "name": "68293",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/68293"
          },
          {
            "name": "[oss-security] 20140630 Re: CVE requests: nagios check_dhcp plug-in: read parts of INI config files belonging to root",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2014/06/30/6"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://nagios-plugins.org/nagios-plugins-2-0-2-released/?utm_source=Nagios.org\u0026utm_medium=News+Post\u0026utm_content=Nagios%20Plugins%202.0.2%20Released\u0026utm_campaign=Nagios%20Plugins"
          },
          {
            "name": "SUSE-SU-2014:1352",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "https://www.suse.com/support/update/announcement/2014/suse-su-20141352-1.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-05-20T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The check_icmp plugin in Nagios Plugins before 2.0.2 allows local users to obtain sensitive information from INI configuration files via the extra-opts flag, a different vulnerability than CVE-2014-4701."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-11-25T19:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "61319",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/61319"
        },
        {
          "name": "58751",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/58751"
        },
        {
          "name": "68293",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/68293"
        },
        {
          "name": "[oss-security] 20140630 Re: CVE requests: nagios check_dhcp plug-in: read parts of INI config files belonging to root",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2014/06/30/6"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://nagios-plugins.org/nagios-plugins-2-0-2-released/?utm_source=Nagios.org\u0026utm_medium=News+Post\u0026utm_content=Nagios%20Plugins%202.0.2%20Released\u0026utm_campaign=Nagios%20Plugins"
        },
        {
          "name": "SUSE-SU-2014:1352",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "https://www.suse.com/support/update/announcement/2014/suse-su-20141352-1.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2014-4702",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The check_icmp plugin in Nagios Plugins before 2.0.2 allows local users to obtain sensitive information from INI configuration files via the extra-opts flag, a different vulnerability than CVE-2014-4701."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "61319",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/61319"
            },
            {
              "name": "58751",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/58751"
            },
            {
              "name": "68293",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/68293"
            },
            {
              "name": "[oss-security] 20140630 Re: CVE requests: nagios check_dhcp plug-in: read parts of INI config files belonging to root",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2014/06/30/6"
            },
            {
              "name": "http://nagios-plugins.org/nagios-plugins-2-0-2-released/?utm_source=Nagios.org\u0026utm_medium=News+Post\u0026utm_content=Nagios%20Plugins%202.0.2%20Released\u0026utm_campaign=Nagios%20Plugins",
              "refsource": "CONFIRM",
              "url": "http://nagios-plugins.org/nagios-plugins-2-0-2-released/?utm_source=Nagios.org\u0026utm_medium=News+Post\u0026utm_content=Nagios%20Plugins%202.0.2%20Released\u0026utm_campaign=Nagios%20Plugins"
            },
            {
              "name": "SUSE-SU-2014:1352",
              "refsource": "SUSE",
              "url": "https://www.suse.com/support/update/announcement/2014/suse-su-20141352-1.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2014-4702",
    "datePublished": "2014-12-05T16:00:00",
    "dateReserved": "2014-06-30T00:00:00",
    "dateUpdated": "2024-08-06T11:27:36.534Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2008-4796
Vulnerability from cvelistv5
Published
2008-10-30 20:49
Modified
2024-08-07 10:31
Severity ?
Summary
The _httpsrequest function (Snoopy/Snoopy.class.php) in Snoopy 1.2.3 and earlier, as used in (1) ampache, (2) libphp-snoopy, (3) mahara, (4) mediamate, (5) opendb, (6) pixelpost, and possibly other products, allows remote attackers to execute arbitrary commands via shell metacharacters in https URLs.
References
https://exchange.xforce.ibmcloud.com/vulnerabilities/46068vdb-entry, x_refsource_XF
http://www.openwall.com/lists/oss-security/2008/11/01/1mailing-list, x_refsource_MLIST
http://www.vupen.com/english/advisories/2008/2901vdb-entry, x_refsource_VUPEN
http://www.securityfocus.com/archive/1/496068/100/0/threadedmailing-list, x_refsource_BUGTRAQ
http://www.securityfocus.com/bid/31887vdb-entry, x_refsource_BID
http://www.debian.org/security/2009/dsa-1871vendor-advisory, x_refsource_DEBIAN
http://jvn.jp/en/jp/JVN20502807/index.htmlthird-party-advisory, x_refsource_JVN
http://sourceforge.net/forum/forum.php?forum_id=879959x_refsource_CONFIRM
https://www.nagios.org/projects/nagios-core/history/4x/x_refsource_CONFIRM
https://security.gentoo.org/glsa/201702-26vendor-advisory, x_refsource_GENTOO
http://www.debian.org/security/2008/dsa-1691vendor-advisory, x_refsource_DEBIAN
http://jvndb.jvn.jp/ja/contents/2008/JVNDB-2008-000074.htmlthird-party-advisory, x_refsource_JVNDB
http://secunia.com/advisories/32361third-party-advisory, x_refsource_SECUNIA
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T10:31:27.318Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "snoopy-snoopyclass-command-execution(46068)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46068"
          },
          {
            "name": "[oss-security] 20081101 CVE-2008-4796: snoopy triage",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2008/11/01/1"
          },
          {
            "name": "ADV-2008-2901",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/2901"
          },
          {
            "name": "20080907 xoops-1.3.10 shell command execute vulnerability ( causing snoopy class )",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/496068/100/0/threaded"
          },
          {
            "name": "31887",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/31887"
          },
          {
            "name": "DSA-1871",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2009/dsa-1871"
          },
          {
            "name": "JVN#20502807",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN20502807/index.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://sourceforge.net/forum/forum.php?forum_id=879959"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.nagios.org/projects/nagios-core/history/4x/"
          },
          {
            "name": "GLSA-201702-26",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "https://security.gentoo.org/glsa/201702-26"
          },
          {
            "name": "DSA-1691",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2008/dsa-1691"
          },
          {
            "name": "JVNDB-2008-000074",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVNDB",
              "x_transferred"
            ],
            "url": "http://jvndb.jvn.jp/ja/contents/2008/JVNDB-2008-000074.html"
          },
          {
            "name": "32361",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/32361"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-10-28T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The _httpsrequest function (Snoopy/Snoopy.class.php) in Snoopy 1.2.3 and earlier, as used in (1) ampache, (2) libphp-snoopy, (3) mahara, (4) mediamate, (5) opendb, (6) pixelpost, and possibly other products, allows remote attackers to execute arbitrary commands via shell metacharacters in https URLs."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-11T19:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "snoopy-snoopyclass-command-execution(46068)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46068"
        },
        {
          "name": "[oss-security] 20081101 CVE-2008-4796: snoopy triage",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2008/11/01/1"
        },
        {
          "name": "ADV-2008-2901",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/2901"
        },
        {
          "name": "20080907 xoops-1.3.10 shell command execute vulnerability ( causing snoopy class )",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/496068/100/0/threaded"
        },
        {
          "name": "31887",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/31887"
        },
        {
          "name": "DSA-1871",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2009/dsa-1871"
        },
        {
          "name": "JVN#20502807",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/en/jp/JVN20502807/index.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://sourceforge.net/forum/forum.php?forum_id=879959"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.nagios.org/projects/nagios-core/history/4x/"
        },
        {
          "name": "GLSA-201702-26",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "https://security.gentoo.org/glsa/201702-26"
        },
        {
          "name": "DSA-1691",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2008/dsa-1691"
        },
        {
          "name": "JVNDB-2008-000074",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVNDB"
          ],
          "url": "http://jvndb.jvn.jp/ja/contents/2008/JVNDB-2008-000074.html"
        },
        {
          "name": "32361",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/32361"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-4796",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The _httpsrequest function (Snoopy/Snoopy.class.php) in Snoopy 1.2.3 and earlier, as used in (1) ampache, (2) libphp-snoopy, (3) mahara, (4) mediamate, (5) opendb, (6) pixelpost, and possibly other products, allows remote attackers to execute arbitrary commands via shell metacharacters in https URLs."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "snoopy-snoopyclass-command-execution(46068)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/46068"
            },
            {
              "name": "[oss-security] 20081101 CVE-2008-4796: snoopy triage",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2008/11/01/1"
            },
            {
              "name": "ADV-2008-2901",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/2901"
            },
            {
              "name": "20080907 xoops-1.3.10 shell command execute vulnerability ( causing snoopy class )",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/496068/100/0/threaded"
            },
            {
              "name": "31887",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/31887"
            },
            {
              "name": "DSA-1871",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2009/dsa-1871"
            },
            {
              "name": "JVN#20502807",
              "refsource": "JVN",
              "url": "http://jvn.jp/en/jp/JVN20502807/index.html"
            },
            {
              "name": "http://sourceforge.net/forum/forum.php?forum_id=879959",
              "refsource": "CONFIRM",
              "url": "http://sourceforge.net/forum/forum.php?forum_id=879959"
            },
            {
              "name": "https://www.nagios.org/projects/nagios-core/history/4x/",
              "refsource": "CONFIRM",
              "url": "https://www.nagios.org/projects/nagios-core/history/4x/"
            },
            {
              "name": "GLSA-201702-26",
              "refsource": "GENTOO",
              "url": "https://security.gentoo.org/glsa/201702-26"
            },
            {
              "name": "DSA-1691",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2008/dsa-1691"
            },
            {
              "name": "JVNDB-2008-000074",
              "refsource": "JVNDB",
              "url": "http://jvndb.jvn.jp/ja/contents/2008/JVNDB-2008-000074.html"
            },
            {
              "name": "32361",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/32361"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-4796",
    "datePublished": "2008-10-30T20:49:00",
    "dateReserved": "2008-10-30T00:00:00",
    "dateUpdated": "2024-08-07T10:31:27.318Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-13977
Vulnerability from cvelistv5
Published
2020-06-09 13:06
Modified
2024-08-04 12:32
Severity ?
Summary
Nagios 4.4.5 allows an attacker, who already has administrative access to change the "URL for JSON CGIs" configuration setting, to modify the Alert Histogram and Trends code via crafted versions of the archivejson.cgi, objectjson.cgi, and statusjson.cgi files. NOTE: this vulnerability has been mistakenly associated with CVE-2020-1408.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T12:32:14.607Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://anhtai.me/nagios-core-4-4-5-url-injection/"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.nagios.org/projects/nagios-core/history/4x/"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://github.com/sawolf/nagioscore/tree/url-injection-fix"
          },
          {
            "name": "FEDORA-2021-b5e897a2e5",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H7T6MSDWMBJEVVFSOK7DOYJJWDAFQCEQ/"
          },
          {
            "name": "FEDORA-2021-5689072a7e",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JUEIABR4Y6L5J5MZDFWU46ZWXMJO64U3/"
          },
          {
            "name": "FEDORA-2021-01a2f76cc3",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5P6NHNG2SJAM6DXVTXQH3AOJ4WQVKJUE/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Nagios 4.4.5 allows an attacker, who already has administrative access to change the \"URL for JSON CGIs\" configuration setting, to modify the Alert Histogram and Trends code via crafted versions of the archivejson.cgi, objectjson.cgi, and statusjson.cgi files. NOTE: this vulnerability has been mistakenly associated with CVE-2020-1408."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-03-19T22:06:35",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://anhtai.me/nagios-core-4-4-5-url-injection/"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.nagios.org/projects/nagios-core/history/4x/"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://github.com/sawolf/nagioscore/tree/url-injection-fix"
        },
        {
          "name": "FEDORA-2021-b5e897a2e5",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H7T6MSDWMBJEVVFSOK7DOYJJWDAFQCEQ/"
        },
        {
          "name": "FEDORA-2021-5689072a7e",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JUEIABR4Y6L5J5MZDFWU46ZWXMJO64U3/"
        },
        {
          "name": "FEDORA-2021-01a2f76cc3",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5P6NHNG2SJAM6DXVTXQH3AOJ4WQVKJUE/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2020-13977",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Nagios 4.4.5 allows an attacker, who already has administrative access to change the \"URL for JSON CGIs\" configuration setting, to modify the Alert Histogram and Trends code via crafted versions of the archivejson.cgi, objectjson.cgi, and statusjson.cgi files. NOTE: this vulnerability has been mistakenly associated with CVE-2020-1408."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://anhtai.me/nagios-core-4-4-5-url-injection/",
              "refsource": "MISC",
              "url": "https://anhtai.me/nagios-core-4-4-5-url-injection/"
            },
            {
              "name": "https://www.nagios.org/projects/nagios-core/history/4x/",
              "refsource": "MISC",
              "url": "https://www.nagios.org/projects/nagios-core/history/4x/"
            },
            {
              "name": "https://github.com/sawolf/nagioscore/tree/url-injection-fix",
              "refsource": "MISC",
              "url": "https://github.com/sawolf/nagioscore/tree/url-injection-fix"
            },
            {
              "name": "FEDORA-2021-b5e897a2e5",
              "refsource": "FEDORA",
              "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H7T6MSDWMBJEVVFSOK7DOYJJWDAFQCEQ/"
            },
            {
              "name": "FEDORA-2021-5689072a7e",
              "refsource": "FEDORA",
              "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUEIABR4Y6L5J5MZDFWU46ZWXMJO64U3/"
            },
            {
              "name": "FEDORA-2021-01a2f76cc3",
              "refsource": "FEDORA",
              "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5P6NHNG2SJAM6DXVTXQH3AOJ4WQVKJUE/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2020-13977",
    "datePublished": "2020-06-09T13:06:56",
    "dateReserved": "2020-06-09T00:00:00",
    "dateUpdated": "2024-08-04T12:32:14.607Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2006-2489
Vulnerability from cvelistv5
Published
2006-05-19 23:00
Modified
2024-08-07 17:51
Severity ?
Summary
Integer overflow in CGI scripts in Nagios 1.x before 1.4.1 and 2.x before 2.3.1 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a content length (Content-Length) HTTP header. NOTE: this is a different vulnerability than CVE-2006-2162.
References
http://www.gentoo.org/security/en/glsa/glsa-200605-07.xmlvendor-advisory, x_refsource_GENTOO
https://exchange.xforce.ibmcloud.com/vulnerabilities/26454vdb-entry, x_refsource_XF
http://www.debian.org/security/2006/dsa-1072vendor-advisory, x_refsource_DEBIAN
http://www.nagios.org/development/changelog.phpx_refsource_CONFIRM
https://usn.ubuntu.com/287-1/vendor-advisory, x_refsource_UBUNTU
http://secunia.com/advisories/20313third-party-advisory, x_refsource_SECUNIA
http://www.securityfocus.com/bid/18059vdb-entry, x_refsource_BID
http://secunia.com/advisories/20123third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/20247third-party-advisory, x_refsource_SECUNIA
http://www.vupen.com/english/advisories/2006/1822vdb-entry, x_refsource_VUPEN
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T17:51:04.646Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "GLSA-200605-07",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://www.gentoo.org/security/en/glsa/glsa-200605-07.xml"
          },
          {
            "name": "nagios-contentlength-overflow(26454)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26454"
          },
          {
            "name": "DSA-1072",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2006/dsa-1072"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.nagios.org/development/changelog.php"
          },
          {
            "name": "USN-287-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "https://usn.ubuntu.com/287-1/"
          },
          {
            "name": "20313",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20313"
          },
          {
            "name": "18059",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/18059"
          },
          {
            "name": "20123",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20123"
          },
          {
            "name": "20247",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20247"
          },
          {
            "name": "ADV-2006-1822",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/1822"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-05-16T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Integer overflow in CGI scripts in Nagios 1.x before 1.4.1 and 2.x before 2.3.1 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a content length (Content-Length) HTTP header.  NOTE: this is a different vulnerability than CVE-2006-2162."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-03T20:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "GLSA-200605-07",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://www.gentoo.org/security/en/glsa/glsa-200605-07.xml"
        },
        {
          "name": "nagios-contentlength-overflow(26454)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26454"
        },
        {
          "name": "DSA-1072",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2006/dsa-1072"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.nagios.org/development/changelog.php"
        },
        {
          "name": "USN-287-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "https://usn.ubuntu.com/287-1/"
        },
        {
          "name": "20313",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20313"
        },
        {
          "name": "18059",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/18059"
        },
        {
          "name": "20123",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20123"
        },
        {
          "name": "20247",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20247"
        },
        {
          "name": "ADV-2006-1822",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/1822"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-2489",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Integer overflow in CGI scripts in Nagios 1.x before 1.4.1 and 2.x before 2.3.1 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a content length (Content-Length) HTTP header.  NOTE: this is a different vulnerability than CVE-2006-2162."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "GLSA-200605-07",
              "refsource": "GENTOO",
              "url": "http://www.gentoo.org/security/en/glsa/glsa-200605-07.xml"
            },
            {
              "name": "nagios-contentlength-overflow(26454)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26454"
            },
            {
              "name": "DSA-1072",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2006/dsa-1072"
            },
            {
              "name": "http://www.nagios.org/development/changelog.php",
              "refsource": "CONFIRM",
              "url": "http://www.nagios.org/development/changelog.php"
            },
            {
              "name": "USN-287-1",
              "refsource": "UBUNTU",
              "url": "https://usn.ubuntu.com/287-1/"
            },
            {
              "name": "20313",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/20313"
            },
            {
              "name": "18059",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/18059"
            },
            {
              "name": "20123",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/20123"
            },
            {
              "name": "20247",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/20247"
            },
            {
              "name": "ADV-2006-1822",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/1822"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-2489",
    "datePublished": "2006-05-19T23:00:00",
    "dateReserved": "2006-05-19T00:00:00",
    "dateUpdated": "2024-08-07T17:51:04.646Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2013-4214
Vulnerability from cvelistv5
Published
2013-11-23 17:00
Modified
2024-08-06 16:38
Severity ?
Summary
rss-newsfeed.php in Nagios Core 3.4.4, 3.5.1, and earlier, when MAGPIE_CACHE_ON is set to 1, allows local users to overwrite arbitrary files via a symlink attack on /tmp/magpie_cache.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T16:38:01.466Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "RHSA-2013:1526",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://rhn.redhat.com/errata/RHSA-2013-1526.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=958002"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.nagios.org/projects/nagios-core/history/4x/"
          },
          {
            "name": "61747",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/61747"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2013-11-18T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "rss-newsfeed.php in Nagios Core 3.4.4, 3.5.1, and earlier, when MAGPIE_CACHE_ON is set to 1, allows local users to overwrite arbitrary files via a symlink attack on /tmp/magpie_cache."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-12-15T21:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "RHSA-2013:1526",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://rhn.redhat.com/errata/RHSA-2013-1526.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=958002"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.nagios.org/projects/nagios-core/history/4x/"
        },
        {
          "name": "61747",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/61747"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2013-4214",
    "datePublished": "2013-11-23T17:00:00",
    "dateReserved": "2013-06-12T00:00:00",
    "dateUpdated": "2024-08-06T16:38:01.466Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2009-2288
Vulnerability from cvelistv5
Published
2009-07-01 12:26
Modified
2024-08-07 05:44
Severity ?
Summary
statuswml.cgi in Nagios before 3.1.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) ping or (2) Traceroute parameters.
References
http://secunia.com/advisories/35688third-party-advisory, x_refsource_SECUNIA
http://security.gentoo.org/glsa/glsa-200907-15.xmlvendor-advisory, x_refsource_GENTOO
http://secunia.com/advisories/35543third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/39227third-party-advisory, x_refsource_SECUNIA
http://tracker.nagios.org/view.php?id=15x_refsource_CONFIRM
http://www.nagios.org/development/history/core-3x/x_refsource_CONFIRM
http://marc.info/?l=bugtraq&m=126996888626964&w=2vendor-advisory, x_refsource_HP
http://www.vupen.com/english/advisories/2010/0750vdb-entry, x_refsource_VUPEN
http://secunia.com/advisories/35692third-party-advisory, x_refsource_SECUNIA
http://www.securitytracker.com/id?1022503vdb-entry, x_refsource_SECTRACK
http://www.ubuntu.com/usn/USN-795-1vendor-advisory, x_refsource_UBUNTU
http://marc.info/?l=bugtraq&m=126996888626964&w=2vendor-advisory, x_refsource_HP
http://www.debian.org/security/2009/dsa-1825vendor-advisory, x_refsource_DEBIAN
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T05:44:55.810Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "35688",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/35688"
          },
          {
            "name": "GLSA-200907-15",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-200907-15.xml"
          },
          {
            "name": "35543",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/35543"
          },
          {
            "name": "39227",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/39227"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://tracker.nagios.org/view.php?id=15"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.nagios.org/development/history/core-3x/"
          },
          {
            "name": "HPSBMA02513",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=126996888626964\u0026w=2"
          },
          {
            "name": "ADV-2010-0750",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2010/0750"
          },
          {
            "name": "35692",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/35692"
          },
          {
            "name": "1022503",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1022503"
          },
          {
            "name": "USN-795-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "http://www.ubuntu.com/usn/USN-795-1"
          },
          {
            "name": "SSRT090110",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=126996888626964\u0026w=2"
          },
          {
            "name": "DSA-1825",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2009/dsa-1825"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-06-22T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "statuswml.cgi in Nagios before 3.1.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) ping or (2) Traceroute parameters."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2009-07-10T09:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "35688",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/35688"
        },
        {
          "name": "GLSA-200907-15",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-200907-15.xml"
        },
        {
          "name": "35543",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/35543"
        },
        {
          "name": "39227",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/39227"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://tracker.nagios.org/view.php?id=15"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.nagios.org/development/history/core-3x/"
        },
        {
          "name": "HPSBMA02513",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=126996888626964\u0026w=2"
        },
        {
          "name": "ADV-2010-0750",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2010/0750"
        },
        {
          "name": "35692",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/35692"
        },
        {
          "name": "1022503",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1022503"
        },
        {
          "name": "USN-795-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "http://www.ubuntu.com/usn/USN-795-1"
        },
        {
          "name": "SSRT090110",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=126996888626964\u0026w=2"
        },
        {
          "name": "DSA-1825",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2009/dsa-1825"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-2288",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "statuswml.cgi in Nagios before 3.1.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) ping or (2) Traceroute parameters."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "35688",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/35688"
            },
            {
              "name": "GLSA-200907-15",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-200907-15.xml"
            },
            {
              "name": "35543",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/35543"
            },
            {
              "name": "39227",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/39227"
            },
            {
              "name": "http://tracker.nagios.org/view.php?id=15",
              "refsource": "CONFIRM",
              "url": "http://tracker.nagios.org/view.php?id=15"
            },
            {
              "name": "http://www.nagios.org/development/history/core-3x/",
              "refsource": "CONFIRM",
              "url": "http://www.nagios.org/development/history/core-3x/"
            },
            {
              "name": "HPSBMA02513",
              "refsource": "HP",
              "url": "http://marc.info/?l=bugtraq\u0026m=126996888626964\u0026w=2"
            },
            {
              "name": "ADV-2010-0750",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2010/0750"
            },
            {
              "name": "35692",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/35692"
            },
            {
              "name": "1022503",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1022503"
            },
            {
              "name": "USN-795-1",
              "refsource": "UBUNTU",
              "url": "http://www.ubuntu.com/usn/USN-795-1"
            },
            {
              "name": "SSRT090110",
              "refsource": "HP",
              "url": "http://marc.info/?l=bugtraq\u0026m=126996888626964\u0026w=2"
            },
            {
              "name": "DSA-1825",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2009/dsa-1825"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-2288",
    "datePublished": "2009-07-01T12:26:00",
    "dateReserved": "2009-07-01T00:00:00",
    "dateUpdated": "2024-08-07T05:44:55.810Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}