CVE-2012-10063

9.8 CRITICAL

📋 TL;DR

This SQL injection vulnerability in Nagios XI's legacy Core Configuration Manager allows authenticated users to manipulate database queries. Attackers could access or modify configuration data, including notification settings, potentially compromising the entire application database. Organizations running Nagios XI versions before 2012R1.3 are affected.

💻 Affected Systems

Products:
  • Nagios XI
Versions: All versions prior to 2012R1.3
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to the legacy CCM interface, which may be enabled by default in affected versions.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the Nagios XI database, allowing attackers to modify monitoring configurations, disable alerts, and potentially gain access to credentials or sensitive infrastructure data.

🟠

Likely Case

Unauthorized access to notification and configuration data, potentially allowing attackers to modify alerting rules or exfiltrate monitoring information.

🟢

If Mitigated

Limited impact if proper input validation and database permissions are enforced, though the vulnerability still exists.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but uses standard SQL injection techniques against vulnerable parameters.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2012R1.3 and later

Vendor Advisory: https://www.nagios.com/changelog/nagios-xi/

Restart Required: Yes

Instructions:

1. Backup current Nagios XI configuration and database. 2. Download Nagios XI 2012R1.3 or later from the Nagios website. 3. Follow the official upgrade documentation. 4. Restart Nagios XI services after upgrade.

🔧 Temporary Workarounds

Disable Legacy CCM Interface

linux

Disable the vulnerable Core Configuration Manager interface if not required for operations.

# Check Nagios XI documentation for specific CCM disable procedures

Network Access Control

all

Restrict access to Nagios XI web interface to trusted IP addresses only.

# Configure firewall rules to limit access to Nagios XI port (typically 80/443)

🧯 If You Can't Patch

  • Implement strict input validation and parameterized queries at the application layer
  • Apply database-level controls to limit user permissions and implement query whitelisting

🔍 How to Verify

Check if Vulnerable:

Check Nagios XI version via web interface Admin > System Status or command line: grep 'nagiosxi_version' /usr/local/nagiosxi/var/xiversion

Check Version:

grep 'nagiosxi_version' /usr/local/nagiosxi/var/xiversion

Verify Fix Applied:

Confirm version is 2012R1.3 or later and test CCM interface functionality

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in database logs
  • Multiple failed authentication attempts followed by CCM access
  • Unexpected parameter values in web server logs for CCM endpoints

Network Indicators:

  • SQL error messages in HTTP responses
  • Unusual database connection patterns from Nagios XI application server

SIEM Query:

source="nagios_web_logs" AND (uri="*ccm*" AND (param="*sql*" OR param="*union*" OR param="*select*"))

🔗 References

📤 Share & Export