CVE-2021-25298 Scanner
Detects 'OS Command Injection' vulnerability in Nagios XI affects v. xi-5.7.5.
Short Info
Level
High
Single Scan
Single Scan
Can be used by
Asset Owner
Estimated Time
10 seconds
Time Interval
4 weeks
Scan only one
Domain, IPv4
Toolbox
-
Nagios XI is a popular IT infrastructure monitoring tool used by organizations to keep track of their IT systems. The software is designed to monitor servers, switches, applications, and services, and provide alerts to system admins when any issues arise. Nagios XI helps organizations ensure that their systems are running smoothly and efficiently, and that any potential problems can be addressed before they cause serious damage.
However, Nagios XI version xi-5.7.5 has been found to have a serious vulnerability, identified as CVE-2021-25298. This vulnerability can potentially allow an attacker to inject malicious code into the Nagios XI server, which can then compromise the entire IT infrastructure of the organization. The vulnerability exists in the file /usr/local/nagiosxi/html/includes/configwizards/cloud-vm/cloud-vm.inc.php, due to inadequate sanitization of user-controlled input. This means that any authenticated user can execute unauthorized commands on the Nagios XI server, leading to OS command injection.
The exploitation of this vulnerability can be quite dangerous for organizations, as attackers can gain complete control over the IT infrastructure of the organization. Attackers can potentially steal sensitive data, install malicious software, or cause service disruptions to the organization's systems. Therefore, it is crucial for organizations to take immediate action to mitigate the risk of this vulnerability.
In conclusion, it's important for organizations to be aware of the potential risks associated with Nagios XI's CVE-2021-25298 vulnerability and take appropriate measures to protect their IT infrastructure. With the pro features of the s4e.io platform, organizations can easily and quickly learn about vulnerabilities in their digital assets and take action to mitigate any risks. By prioritizing security, organizations can ensure that their IT systems are protected from potential threats.
REFERENCES
- http://nagios.com
- http://packetstormsecurity.com/files/161561/Nagios-XI-5.7.5-Remote-Code-Execution.html
- http://packetstormsecurity.com/files/170924/Nagios-XI-5.7.5-Remote-Code-Execution.html
- https://assets.nagios.com/downloads/nagiosxi/versions.php
- https://github.com/fs0c-sh/nagios-xi-5.7.5-bugs/blob/main/README.md
- https://www.fastly.com/blog/anatomy-of-a-command-injection-cve-2021-25296-7-8-with-metasploit-module-and