CVE-2020-36863

8.8 HIGH

📋 TL;DR

This vulnerability allows authenticated attackers to upload PHP files to Nagios XI's Audio Import directory and execute them, leading to remote code execution. It affects Nagios XI versions before 5.7.2. Attackers need access to the audio import feature to exploit this.

💻 Affected Systems

Products:
  • Nagios XI
Versions: All versions prior to 5.7.2
Operating Systems: Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to the audio import feature. Default installations are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with application service privileges, allowing attackers to execute arbitrary commands, access sensitive data, and pivot to other systems.

🟠

Likely Case

Unauthorized file upload leading to web shell deployment, data exfiltration, and potential lateral movement within the network.

🟢

If Mitigated

Limited impact with proper file upload restrictions and directory permissions preventing PHP execution.

🌐 Internet-Facing: HIGH if Nagios XI is exposed to the internet, as authenticated attackers could gain full control.
🏢 Internal Only: MEDIUM for internal networks, requiring authenticated access but still posing significant risk if exploited.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward once access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 5.7.2

Vendor Advisory: https://www.nagios.com/changelog/nagios-xi/

Restart Required: Yes

Instructions:

1. Backup current configuration. 2. Download Nagios XI 5.7.2 or later from official sources. 3. Follow Nagios XI upgrade instructions. 4. Restart Nagios XI services.

🔧 Temporary Workarounds

Restrict PHP execution in upload directory

linux

Prevent PHP file execution in the Audio Import directory using web server configuration.

For Apache: Add 'php_flag engine off' to .htaccess in audio import directory
For Nginx: Add 'location ~ \.php$ { deny all; }' to server block

Remove execute permissions

linux

Remove execute permissions from the Audio Import directory.

chmod -R -x /usr/local/nagiosxi/html/includes/components/audioplayer/audio_import/

🧯 If You Can't Patch

  • Restrict access to Nagios XI to trusted networks only using firewall rules.
  • Implement strict authentication controls and monitor for unauthorized file uploads.

🔍 How to Verify

Check if Vulnerable:

Check Nagios XI version via web interface or command: cat /usr/local/nagiosxi/var/xiversion

Check Version:

cat /usr/local/nagiosxi/var/xiversion

Verify Fix Applied:

Confirm version is 5.7.2 or higher and test that PHP files cannot be uploaded/executed in audio import directory.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file uploads to audio import directory
  • PHP file execution attempts in non-standard locations

Network Indicators:

  • HTTP POST requests to audio import endpoints with PHP files
  • Unexpected outbound connections from Nagios server

SIEM Query:

source="nagios" AND (url="*audio_import*" AND method="POST")

🔗 References

📤 Share & Export