CVE-2021-47698
📋 TL;DR
Nagios XI versions before 5.8.7 contain a cross-site scripting vulnerability in the Core UI's Views URL handling. Attackers can inject malicious scripts that execute in victims' browsers when they visit manipulated URLs. This affects all Nagios XI administrators and users who access the vulnerable interface.
💻 Affected Systems
- Nagios XI
📦 What is this software?
Nagios Xi by Nagios
⚠️ Risk & Real-World Impact
Worst Case
Attackers could steal administrator session cookies, perform actions as authenticated users, or redirect users to malicious sites, potentially leading to full system compromise.
Likely Case
Session hijacking, credential theft, or defacement of the Nagios interface through script injection.
If Mitigated
Limited impact with proper input validation and output encoding in place, though the vulnerability still exists.
🎯 Exploit Status
Exploitation requires tricking authenticated users into clicking malicious links. No public exploit code is available.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 5.8.7
Vendor Advisory: https://www.nagios.com/changelog/nagios-xi/
Restart Required: Yes
Instructions:
1. Backup current configuration. 2. Download Nagios XI 5.8.7 or later from Nagios website. 3. Follow the upgrade instructions in the documentation. 4. Restart Nagios services after upgrade.
🔧 Temporary Workarounds
Input Validation Enhancement
allImplement additional input validation for URL parameters in the Core UI Views
Not applicable - requires code modification
🧯 If You Can't Patch
- Implement web application firewall (WAF) rules to block XSS payloads in URL parameters
- Restrict access to Nagios XI interface to trusted networks only
🔍 How to Verify
Check if Vulnerable:
Check Nagios XI version via Admin > System Config > About. If version is below 5.8.7, system is vulnerable.
Check Version:
cat /usr/local/nagiosxi/var/xiversion
Verify Fix Applied:
Verify version is 5.8.7 or higher and test URL parameter handling in Core UI Views.
📡 Detection & Monitoring
Log Indicators:
- Unusual URL parameters in web server logs containing script tags or JavaScript
Network Indicators:
- HTTP requests with suspicious parameters to Nagios XI Core UI endpoints
SIEM Query:
source="web_server_logs" AND uri="*nagiosxi*" AND (param="*<script>*" OR param="*javascript:*")