6.5
CVSSv2

CVE-2008-5027

Published: 10/11/2008 Updated: 08/12/2016
CVSS v2 Base Score: 6.5 | Impact Score: 6.4 | Exploitability Score: 8
VMScore: 578
Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P

Vulnerability Summary

The Nagios process in (1) Nagios prior to 3.0.5 and (2) op5 Monitor prior to 4.0.1 allows remote authenticated users to bypass authorization checks, and trigger execution of arbitrary programs by this process, via an (a) custom form or a (b) browser addon.

Vulnerable Product Search on Vulmon Subscribe to Product

nagios nagios 1.0b4

nagios nagios 1.0b3

nagios nagios 1.4

nagios nagios 1.3

nagios nagios 2.0b4

nagios nagios 2.0rc2

nagios nagios 2.5

nagios nagios 2.7

nagios nagios 3.0

op5 monitor 3.3.2

op5 monitor 3.3.1

op5 monitor 2.8

nagios nagios 1.0_b3

nagios nagios 1.0b1

nagios nagios 1.0b2

nagios nagios 1.4.1

nagios nagios 1.2

nagios nagios 1.1

nagios nagios 1.0b6

nagios nagios 2.0rc1

nagios nagios 2.3

nagios nagios 2.8

nagios nagios 2.9

op5 monitor 3.2.4

op5 monitor 3.0.0

nagios nagios 1.0

nagios nagios 1.0b5

nagios nagios 2.0b1

nagios nagios 2.0

nagios nagios 2.0b5

nagios nagios 2.1

nagios nagios 2.3.1

nagios nagios 2.4

nagios nagios 3.0.2

nagios nagios 3.0.1

op5 monitor

op5 monitor 3.3.3

op5 monitor 3.0

op5 monitor 2.4

nagios nagios 1.0_b1

nagios nagios 1.0_b2

nagios nagios 2.0b3

nagios nagios 2.0b2

nagios nagios 2.0b6

nagios nagios 2.2

nagios nagios 2.10

nagios nagios 2.11

nagios nagios

nagios nagios 3.0.3

op5 monitor 2.6

op5 monitor 3.2

Vendor Advisories

It was discovered that Nagios was vulnerable to a Cross-site request forgery (CSRF) vulnerability If an authenticated nagios user were tricked into clicking a link on a specially crafted web page, an attacker could trigger commands to be processed by Nagios and execute arbitrary programs This update alters Nagios behaviour by disabling submission ...
It was discovered that Nagios was vulnerable to a Cross-site request forgery (CSRF) vulnerability If an authenticated nagios user were tricked into clicking a link on a specially crafted web page, an attacker could trigger commands to be processed by Nagios and execute arbitrary programs This update alters Nagios behaviour by disabling submission ...
It was discovered that Nagios did not properly parse commands submitted using the web interface An authenticated user could use a custom form or a browser addon to bypass security restrictions and submit unauthorized commands ...