CVE-2021-37353

9.8 CRITICAL

📋 TL;DR

Nagios XI Docker Wizard versions before 1.1.3 contain a Server-Side Request Forgery (SSRF) vulnerability in table_population.php due to improper input sanitization. This allows attackers to make unauthorized requests from the vulnerable server to internal or external systems. Organizations using Nagios XI with the Docker Wizard component are affected.

💻 Affected Systems

Products:
  • Nagios XI Docker Wizard
Versions: All versions before 1.1.3
Operating Systems: Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Nagios XI with Docker Wizard component installed and accessible.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could pivot from the vulnerable Nagios server to access internal systems, steal credentials, perform port scanning, or access cloud metadata services to obtain sensitive information.

🟠

Likely Case

Attackers scan internal networks, access internal web applications, or retrieve sensitive information from cloud metadata endpoints.

🟢

If Mitigated

With proper network segmentation and egress filtering, impact is limited to the Nagios server itself or adjacent systems in the same network segment.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authentication to Nagios XI. SSRF vulnerabilities are commonly exploited in real-world attacks.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.1.3

Vendor Advisory: https://www.nagios.com/downloads/nagios-xi/change-log/

Restart Required: Yes

Instructions:

1. Log into Nagios XI admin interface. 2. Navigate to Admin > Updates. 3. Check for available updates. 4. Update Docker Wizard to version 1.1.3 or later. 5. Restart Nagios XI services.

🔧 Temporary Workarounds

Disable Docker Wizard

linux

Remove or disable the vulnerable Docker Wizard component if not required.

sudo rm -rf /usr/local/nagiosxi/html/includes/dockerwizard/

Network Segmentation

linux

Restrict Nagios XI server network access to prevent SSRF exploitation.

iptables -A OUTPUT -p tcp --dport 80 -j DROP
iptables -A OUTPUT -p tcp --dport 443 -j DROP

🧯 If You Can't Patch

  • Implement strict network egress filtering to prevent the Nagios server from making unauthorized outbound requests.
  • Place Nagios XI behind a web application firewall (WAF) with SSRF protection rules enabled.

🔍 How to Verify

Check if Vulnerable:

Check Docker Wizard version: cat /usr/local/nagiosxi/html/includes/dockerwizard/version.txt

Check Version:

cat /usr/local/nagiosxi/html/includes/dockerwizard/version.txt

Verify Fix Applied:

Verify version is 1.1.3 or higher: cat /usr/local/nagiosxi/html/includes/dockerwizard/version.txt

📡 Detection & Monitoring

Log Indicators:

  • Unusual outbound HTTP requests from Nagios server
  • Requests to internal IP addresses or cloud metadata endpoints from Nagios

Network Indicators:

  • HTTP traffic from Nagios server to unexpected destinations
  • Port scanning activity originating from Nagios server

SIEM Query:

source="nagios" AND (url="*table_population.php*" OR dest_ip="169.254.169.254" OR dest_port=80,443)

🔗 References

📤 Share & Export