CVE-2024-14001

5.4 MEDIUM

📋 TL;DR

Nagios XI versions before 2024R1.1.3 are vulnerable to cross-site scripting (XSS) in the Executive Summary Report component. Attackers can inject malicious scripts that execute in victims' browsers when viewing reports. This affects all Nagios XI administrators and users who access Executive Summary Reports.

💻 Affected Systems

Products:
  • Nagios XI
Versions: All versions prior to 2024R1.1.3
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Requires access to Executive Summary Report functionality; typically affects authenticated users.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator session cookies, perform actions as authenticated users, redirect to malicious sites, or install malware on victim machines.

🟠

Likely Case

Session hijacking leading to unauthorized access, data theft, or privilege escalation within Nagios XI.

🟢

If Mitigated

Limited impact with proper input validation, output encoding, and Content Security Policy (CSP) headers in place.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires attacker to have access to Executive Summary Report input fields and victim to view the malicious report.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2024R1.1.3 or later

Vendor Advisory: https://www.nagios.com/changelog/nagios-xi/

Restart Required: No

Instructions:

1. Backup current Nagios XI installation. 2. Download latest version from Nagios customer portal. 3. Run upgrade script following Nagios documentation. 4. Verify upgrade completed successfully.

🔧 Temporary Workarounds

Input Validation Enhancement

all

Implement additional input validation for Executive Summary Report fields to reject script tags and special characters.

Output Encoding

all

Apply proper HTML encoding to all user-controlled data displayed in Executive Summary Reports.

🧯 If You Can't Patch

  • Restrict access to Executive Summary Report functionality to trusted users only.
  • Implement Content Security Policy (CSP) headers to restrict script execution sources.

🔍 How to Verify

Check if Vulnerable:

Check Nagios XI version via Admin > System Config > About Nagios XI. If version is earlier than 2024R1.1.3, system is vulnerable.

Check Version:

cat /usr/local/nagiosxi/var/xiversion

Verify Fix Applied:

After upgrade, verify version shows 2024R1.1.3 or later in About Nagios XI page.

📡 Detection & Monitoring

Log Indicators:

  • Unusual input patterns in Executive Summary Report logs
  • Multiple failed report generation attempts with script-like content

Network Indicators:

  • Unexpected external script loads in Nagios XI traffic
  • Suspicious redirects from report pages

SIEM Query:

source="nagios" AND ("Executive Summary" OR "report") AND ("script" OR "javascript:" OR "onerror=" OR "onload=")

🔗 References

📤 Share & Export