CVE-2024-54958

6.1 MEDIUM

📋 TL;DR

Nagios XI 2024R1.2.2 contains a stored XSS vulnerability in the Tools page that allows authenticated attackers to inject malicious scripts. When other users access the Tools page, these scripts execute in their browser context, potentially compromising their sessions or performing actions on their behalf. This affects all Nagios XI administrators and users with access to the Tools interface.

💻 Affected Systems

Products:
  • Nagios XI
Versions: 2024R1.2.2
Operating Systems: All platforms running Nagios XI
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to the Tools page. Earlier versions may also be affected but this specific CVE is confirmed for 2024R1.2.2.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could steal administrator session cookies, perform unauthorized administrative actions, redirect users to malicious sites, or deploy malware through the compromised Nagios interface.

🟠

Likely Case

Session hijacking of Nagios administrators, credential theft, or unauthorized monitoring configuration changes that could hide malicious activity.

🟢

If Mitigated

Limited to authenticated users only, with potential for privilege escalation if lower-privileged users can exploit against administrators.

🌐 Internet-Facing: MEDIUM - While exploitation requires authentication, internet-facing Nagios instances are more likely to be targeted by attackers who obtain credentials through other means.
🏢 Internal Only: MEDIUM - Internal attackers or compromised accounts could exploit this to escalate privileges or maintain persistence within the monitoring system.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

The GitHub reference contains proof-of-concept details. Exploitation requires authenticated access but is technically simple once credentials are obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Nagios XI updates beyond 2024R1.2.2

Vendor Advisory: https://www.nagios.com/products/security/

Restart Required: Yes

Instructions:

1. Log into Nagios XI as administrator. 2. Navigate to Admin > Check for Updates. 3. Apply the latest security update. 4. Restart Nagios XI services. 5. Clear browser caches of all users.

🔧 Temporary Workarounds

Input Sanitization Enhancement

all

Implement additional input validation and output encoding for Tools page parameters

Requires code modification - consult Nagios documentation for custom validation rules

Content Security Policy

linux

Implement strict CSP headers to limit script execution

Add to web server config: Content-Security-Policy: script-src 'self'

🧯 If You Can't Patch

  • Restrict access to Nagios XI Tools page to only essential administrators using network ACLs or application firewalls
  • Implement web application firewall rules to detect and block XSS payloads in Tools page parameters

🔍 How to Verify

Check if Vulnerable:

Check Nagios XI version via Admin > System Overview or run: cat /usr/local/nagiosxi/var/xiversion

Check Version:

cat /usr/local/nagiosxi/var/xiversion

Verify Fix Applied:

After patching, attempt to inject basic XSS payloads like <script>alert('test')</script> into Tools page fields and verify they are properly sanitized

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to Tools page with script tags or JavaScript code in parameters
  • Multiple failed login attempts followed by Tools page access

Network Indicators:

  • HTTP requests containing <script> tags or JavaScript functions in Tools page parameters
  • Unexpected outbound connections from Nagios server after Tools page access

SIEM Query:

source="nagios_access.log" AND (uri_path="/nagiosxi/admin/tools.php" OR uri_path="/nagiosxi/includes/components/tools/") AND (http_method="POST" OR parameters CONTAINS "<script>" OR parameters CONTAINS "javascript:")

🔗 References

📤 Share & Export