CVE-2020-35578
📋 TL;DR
CVE-2020-35578 is an OS command injection vulnerability in Nagios XI's Manage Plugins page that allows authenticated admin users to execute arbitrary operating system commands during plugin upload. This affects Nagios XI versions before 5.8.0. Attackers with admin credentials can achieve remote code execution on the Nagios XI server.
💻 Affected Systems
- Nagios XI
📦 What is this software?
Nagios Xi by Nagios
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of the Nagios XI server, allowing attackers to execute arbitrary commands as the Nagios user, potentially leading to lateral movement, data exfiltration, or installation of persistent backdoors.
Likely Case
Authenticated attackers with admin privileges gain remote code execution on the Nagios XI server, enabling them to manipulate monitoring data, disrupt monitoring services, or use the server as a pivot point.
If Mitigated
Limited impact due to proper access controls, network segmentation, and monitoring that detects unusual plugin uploads or command execution.
🎯 Exploit Status
Multiple public exploit scripts are available on Packet Storm Security. Exploitation requires admin credentials but is straightforward once authenticated.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 5.8.0 and later
Vendor Advisory: https://www.nagios.com/downloads/nagios-xi/change-log/
Restart Required: Yes
Instructions:
1. Backup your Nagios XI configuration and data. 2. Download Nagios XI 5.8.0 or later from the official Nagios website. 3. Follow the upgrade instructions in the Nagios XI documentation. 4. Restart Nagios XI services after upgrade.
🔧 Temporary Workarounds
Restrict Admin Access
allLimit admin user accounts to only trusted personnel and implement strong authentication controls.
Disable Plugin Uploads
linuxTemporarily disable plugin upload functionality in the Manage Plugins page if not required.
🧯 If You Can't Patch
- Implement strict network segmentation to isolate Nagios XI from critical systems.
- Enhance monitoring of Nagios XI logs for unusual plugin uploads or command execution patterns.
🔍 How to Verify
Check if Vulnerable:
Check Nagios XI version via the web interface (Help > About) or command line: grep 'nagiosxi_version' /usr/local/nagiosxi/var/xiversion
Check Version:
grep 'nagiosxi_version' /usr/local/nagiosxi/var/xiversion
Verify Fix Applied:
Verify version is 5.8.0 or higher using the same commands. Test plugin upload functionality to ensure proper validation.
📡 Detection & Monitoring
Log Indicators:
- Unusual plugin uploads in /usr/local/nagiosxi/var/components/profile*.log
- Suspicious command execution in system logs
Network Indicators:
- Unexpected outbound connections from Nagios XI server
- Anomalous HTTP POST requests to plugin upload endpoints
SIEM Query:
source="nagiosxi" AND (event="plugin_upload" OR command_execution)
🔗 References
- http://packetstormsecurity.com/files/160948/Nagios-XI-5.7.x-Remote-Code-Execution.html
- http://packetstormsecurity.com/files/162207/Nagios-XI-Remote-Code-Execution.html
- https://www.nagios.com/downloads/nagios-xi/change-log/
- https://www.nagios.com/products/security/
- http://packetstormsecurity.com/files/160948/Nagios-XI-5.7.x-Remote-Code-Execution.html
- http://packetstormsecurity.com/files/162207/Nagios-XI-Remote-Code-Execution.html
- https://www.nagios.com/downloads/nagios-xi/change-log/
- https://www.nagios.com/products/security/