CVE-2020-36862

6.1 MEDIUM

📋 TL;DR

Nagios XI versions before 5.6.11 have unauthenticated vulnerabilities in the Highcharts export tool. Attackers can inject malicious scripts into exported content (XSS) and force the server to access internal URLs (SSRF). This affects all Nagios XI installations using vulnerable versions, exposing them to client-side attacks and potential internal network reconnaissance.

💻 Affected Systems

Products:
  • Nagios XI
Versions: All versions prior to 5.6.11
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in default Highcharts export functionality; no special configuration required.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker steals admin session cookies via XSS, gains full Nagios XI control, then uses SSRF to pivot to internal systems, potentially accessing sensitive data or internal services.

🟠

Likely Case

Attacker performs reflected XSS to steal user sessions or credentials, and uses SSRF to scan internal network services or access metadata services.

🟢

If Mitigated

With proper network segmentation and WAF rules, impact limited to XSS affecting individual users viewing malicious exports.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires crafting specific export requests but doesn't require authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.6.11

Vendor Advisory: https://www.nagios.com/changelog/nagios-xi/

Restart Required: No

Instructions:

1. Backup current Nagios XI installation. 2. Download Nagios XI 5.6.11 or later from Nagios customer portal. 3. Follow official upgrade instructions for your platform. 4. Verify upgrade completed successfully.

🔧 Temporary Workarounds

Disable Highcharts Export

all

Temporarily disable the vulnerable Highcharts export functionality

Edit Nagios XI configuration to remove or disable Highcharts export module

Network Access Control

all

Restrict access to Nagios XI export endpoints via firewall or WAF

Configure firewall rules to block external access to /nagiosxi/export endpoints

🧯 If You Can't Patch

  • Implement strict WAF rules to block malicious export requests and SSRF attempts
  • Segment Nagios XI server to prevent SSRF access to critical internal resources

🔍 How to Verify

Check if Vulnerable:

Check Nagios XI version via Admin > System Config > About page or command: cat /usr/local/nagiosxi/var/xiversion

Check Version:

cat /usr/local/nagiosxi/var/xiversion

Verify Fix Applied:

Confirm version is 5.6.11 or higher and test export functionality with safe test payloads

📡 Detection & Monitoring

Log Indicators:

  • Unusual export requests with script tags or external URLs in Nagios XI logs
  • Multiple failed export attempts from single IP

Network Indicators:

  • HTTP requests to /nagiosxi/export with suspicious parameters
  • Outbound connections from Nagios XI server to unexpected internal IPs

SIEM Query:

source="nagiosxi.log" AND ("export" AND ("script" OR "http://" OR "https://"))

🔗 References

📤 Share & Export