Nagios 4.4.5 allows an attacker, who already has administrative access to change the "URL for JSON CGIs" configuration setting, to modify the Alert Histogram and Trends code via crafted versions of the archivejson.cgi, objectjson.cgi, and statusjson.cgi files. NOTE: this vulnerability has been mistakenly associated with CVE-2020-1408.
References
| Link | Resource |
|---|---|
| https://www.nagios.org/projects/nagios-core/history/4x/ | Release Notes Vendor Advisory |
| https://github.com/sawolf/nagioscore/tree/url-injection-fix | Product Third Party Advisory |
| https://anhtai.me/nagios-core-4-4-5-url-injection/ | Exploit Third Party Advisory |
| https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/H7T6MSDWMBJEVVFSOK7DOYJJWDAFQCEQ/ | Mailing List Third Party Advisory |
| https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JUEIABR4Y6L5J5MZDFWU46ZWXMJO64U3/ | Mailing List Third Party Advisory |
| https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5P6NHNG2SJAM6DXVTXQH3AOJ4WQVKJUE/ | Mailing List Third Party Advisory |
Information
Published : 2020-06-09 14:15
Updated : 2021-07-21 11:39
NVD link : CVE-2020-13977
Mitre link : CVE-2020-13977
JSON object : View
Products Affected
fedoraproject
- fedora
nagios
- nagios
CWE
CWE-74
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
