CVE-2023-7319

5.4 MEDIUM

📋 TL;DR

Nagios Network Analyzer versions before 2024R1 contain a cross-site scripting vulnerability in the Percentile Calculator menu. Attackers can inject malicious scripts that execute in victims' browsers when they access the vulnerable interface. This affects all organizations running vulnerable versions of Nagios Network Analyzer.

💻 Affected Systems

Products:
  • Nagios Network Analyzer
Versions: All versions prior to 2024R1
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the Percentile Calculator menu component and requires user interaction with the vulnerable interface.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator session cookies, perform actions as authenticated users, redirect users to malicious sites, or install malware via the victim's browser.

🟠

Likely Case

Attackers could steal session cookies to hijack authenticated sessions, potentially gaining unauthorized access to the Nagios Network Analyzer interface.

🟢

If Mitigated

With proper input validation and output encoding, the vulnerability would be prevented, and impact would be limited to failed exploitation attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires the attacker to trick a victim into interacting with the vulnerable Percentile Calculator menu with malicious input.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2024R1

Vendor Advisory: https://www.nagios.com/changelog/#network-analyzer

Restart Required: No

Instructions:

1. Download Nagios Network Analyzer 2024R1 or later from the official Nagios website. 2. Follow the upgrade instructions in the Nagios documentation. 3. Verify the installation completes successfully.

🔧 Temporary Workarounds

Disable Percentile Calculator Access

all

Restrict access to the Percentile Calculator menu through web server configuration or access controls.

Implement Web Application Firewall Rules

all

Configure WAF rules to block XSS payloads targeting the Percentile Calculator endpoint.

🧯 If You Can't Patch

  • Implement strict Content Security Policy headers to mitigate script execution
  • Restrict network access to Nagios Network Analyzer to trusted users only

🔍 How to Verify

Check if Vulnerable:

Check the Nagios Network Analyzer version in the web interface under Help > About or via the system status page.

Check Version:

Check the web interface or consult the Nagios Network Analyzer documentation for CLI version checking.

Verify Fix Applied:

After upgrading to 2024R1 or later, verify the version shows as patched and test the Percentile Calculator menu with safe test inputs.

📡 Detection & Monitoring

Log Indicators:

  • Unusual or malformed input in Percentile Calculator requests
  • Multiple failed access attempts to the vulnerable endpoint

Network Indicators:

  • HTTP requests containing script tags or JavaScript payloads to the Percentile Calculator endpoint

SIEM Query:

web.url:*percentile* AND (web.query:*script* OR web.query:*javascript* OR web.query:*onload* OR web.query:*onerror*)

🔗 References

📤 Share & Export