CVE-2021-38156 Scanner
CVE-2021-38156 scanner - Cross-Site Scripting (XSS) vulnerability in Nagios XI
Short Info
Level
Medium
Single Scan
Single Scan
Can be used by
Asset Owner
Estimated Time
10 seconds
Time Interval
29 days
Scan only one
Domain, IPv4, Subdomain
Toolbox
-
Nagios XI is a widely-used monitoring tool designed to provide IT professionals with a comprehensive view of the health, performance, and availability of IT infrastructure. Used primarily by systems administrators and network operations teams, it monitors servers, applications, and network devices to ensure optimal performance. This software allows users to proactively monitor system health, identify potential issues before they become critical, and minimize system downtime. With its flexible dashboard, Nagios XI enables customization for tailored monitoring environments. However, due to its online access capabilities, it's essential to secure it against vulnerabilities that can be exploited remotely.
This Cross-Site Scripting (XSS) vulnerability affects Nagios XI before version 5.8.6, specifically on the dashboard page when administrative users edit dashboards. This vulnerability arises due to inadequate input validation on the dashboard title field, which can accept and execute malicious scripts. By exploiting this, an attacker could inject a script that runs in the context of another administrative user, leading to unauthorized access or data leakage. The flaw poses moderate risk by potentially compromising the security and integrity of the Nagios XI installation.
The vulnerability resides in the Nagios XI dashboard editing functionality. When administrative users attempt to update the title of a dashboard, Nagios XI does not properly sanitize the input, allowing JavaScript to be injected and executed. The vulnerable endpoint is /dashboards/#
, specifically the title
parameter of the dashboard object, which fails to escape input containing script tags. The attack can be triggered by an authenticated attacker entering a payload such as <script>alert(document.domain)</script>
in the title field. This script will execute within the user’s browser when the infected dashboard loads, potentially leading to session hijacking or other attacks on administrators.
Exploitation of this vulnerability could result in unauthorized actions performed within the victim’s administrative session. Attackers could gain access to sensitive information or manipulate settings in the Nagios XI system. If successful, this could lead to information disclosure, session hijacking, or changes in system configurations. Persistent XSS could allow attackers to plant payloads that execute each time a targeted user accesses the infected dashboard, creating an ongoing threat.
By joining S4E, users gain access to proactive and thorough monitoring of their IT infrastructure’s security posture. Our platform offers instant detection, continuous monitoring, and easy-to-follow guidance on remediation to address vulnerabilities like Cross-Site Scripting (XSS). Additionally, users benefit from real-time notifications, a consolidated view of all potential vulnerabilities, and actionable insights that are crucial for maintaining security across their digital assets. Join now to keep your systems safe and up-to-date!
References: