Vulnerability Details : CVE-2021-25296
Public exploit exists!
Nagios XI version xi-5.7.5 is affected by OS command injection. The vulnerability exists in the file /usr/local/nagiosxi/html/includes/configwizards/windowswmi/windowswmi.inc.php due to improper sanitization of authenticated user-controlled input by a single HTTP request, which can lead to OS command injection on the Nagios XI server.
Products affected by CVE-2021-25296
- cpe:2.3:a:nagios:nagios_xi:5.7.5:*:*:*:*:*:*:*
CVE-2021-25296 is in the CISA Known Exploited Vulnerabilities Catalog
CISA vulnerability name:
Nagios XI OS Command Injection
CISA required action:
Apply updates per vendor instructions.
CISA description:
Nagios XI contains a vulnerability which can lead to OS command injection on the Nagios XI server.
Notes:
https://nvd.nist.gov/vuln/detail/CVE-2021-25296
Added on
2022-01-18
Action due date
2022-02-01
Exploit prediction scoring system (EPSS) score for CVE-2021-25296
96.47%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 100 %
Percentile, the proportion of vulnerabilities that are scored at or less
Metasploit modules for CVE-2021-25296
-
Nagios XI 5.5.6 to 5.7.5 - ConfigWizards Authenticated Remote Code Exection
Disclosure Date: 2021-02-13First seen: 2023-09-11exploit/linux/http/nagios_xi_configwizards_authenticated_rceThis module exploits CVE-2021-25296, CVE-2021-25297, and CVE-2021-25298, which are OS command injection vulnerabilities in the windowswmi, switch, and cloud-vm configuration wizards that allow an authenticated user to perform remote code execution on Nagios X
CVSS scores for CVE-2021-25296
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.0
|
HIGH | AV:N/AC:L/Au:S/C:C/I:C/A:C |
8.0
|
10.0
|
NIST | |
8.8
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
NIST |
References for CVE-2021-25296
-
http://packetstormsecurity.com/files/170924/Nagios-XI-5.7.5-Remote-Code-Execution.html
Nagios XI 5.7.5 Remote Code Execution ≈ Packet StormThird Party Advisory;VDB Entry
-
https://www.fastly.com/blog/anatomy-of-a-command-injection-cve-2021-25296-7-8-with-metasploit-module-and
Anatomy of a Command Injection: CVE-2021-25296(7,8) with Metasploit Module & Nuclei Template | FastlyExploit;Third Party Advisory
-
http://packetstormsecurity.com/files/161561/Nagios-XI-5.7.5-Remote-Code-Execution.html
Nagios XI 5.7.5 Remote Code Execution ≈ Packet StormExploit;Third Party Advisory;VDB Entry
-
http://nagios.com
Nagios - Network, Server and Log Monitoring SoftwareProduct
-
https://assets.nagios.com/downloads/nagiosxi/versions.php
Nagios XI · Previous VersionsExploit;Product
-
https://github.com/fs0c-sh/nagios-xi-5.7.5-bugs/blob/main/README.md
nagios-xi-5.7.5-bugs/README.md at main · fs0c-sh/nagios-xi-5.7.5-bugs · GitHubExploit;Third Party Advisory
Jump to