10 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
8.4 High
AI Score
Confidence
High
0.118 Low
EPSS
Percentile
95.4%
According to the self-reported version of Nagios Fusion, the remote host is affected by multiple vulnerabilities, including the following:
Insufficient Verification of Data Authenticity in Nagios Fusion 4.1.8 and earlier and Nagios XI 5.7.5 and earlier allows for Escalation of Privileges or Code Execution as root via vectors related to an untrusted update package to upgrade_to_latest.sh. (CVE-2020-28900)
Command Injection in Nagios Fusion 4.1.8 and earlier allows Privilege Escalation from apache to root in cmd_subsys.php. (CVE-2020-28902)
Command Injection in Nagios Fusion 4.1.8 and earlier allows for Privilege Escalation or Code Execution as root via vectors related to corrupt component installation in cmd_subsys.php. (CVE-2020-28901)
Note that Nessus has not tested for this issue but has instead relied only on the application’s self-reported version number.
#%NASL_MIN_LEVEL 70300
##
# (C) Tenable Network Security, Inc.
##
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(150054);
script_version("1.6");
script_set_attribute(attribute:"plugin_modification_date", value:"2024/06/06");
script_cve_id(
"CVE-2020-28900",
"CVE-2020-28901",
"CVE-2020-28902",
"CVE-2020-28903",
"CVE-2020-28904",
"CVE-2020-28905",
"CVE-2020-28906",
"CVE-2020-28907",
"CVE-2020-28908",
"CVE-2020-28909",
"CVE-2020-28911"
);
script_xref(name:"IAVB", value:"2021-B-0030-S");
script_name(english:"Nagios Fusion < 4.1.9 Multiple Vulnerabilities");
script_set_attribute(attribute:"synopsis", value:
"The remote host has a web application affected by multiple vulnerabilities.");
script_set_attribute(attribute:"description", value:
"According to the self-reported version of Nagios Fusion, the remote host is affected by multiple vulnerabilities,
including the following:
- Insufficient Verification of Data Authenticity in Nagios Fusion 4.1.8 and earlier and Nagios XI 5.7.5 and
earlier allows for Escalation of Privileges or Code Execution as root via vectors related to an untrusted
update package to upgrade_to_latest.sh. (CVE-2020-28900)
- Command Injection in Nagios Fusion 4.1.8 and earlier allows Privilege Escalation from apache to root in
cmd_subsys.php. (CVE-2020-28902)
- Command Injection in Nagios Fusion 4.1.8 and earlier allows for Privilege Escalation or Code Execution as
root via vectors related to corrupt component installation in cmd_subsys.php. (CVE-2020-28901)
Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version
number.");
script_set_attribute(attribute:"see_also", value:"https://www.nagios.com/downloads/nagios-xi/change-log/");
script_set_attribute(attribute:"see_also", value:"https://www.nagios.com/products/security/");
script_set_attribute(attribute:"solution", value:
"Upgrade to Nagios Fusion 4.1.9 or later");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C");
script_set_cvss_temporal_vector("CVSS2#E:POC/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:P/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2020-28907");
script_set_attribute(attribute:"cvss3_score_source", value:"CVE-2020-28908");
script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
script_set_attribute(attribute:"exploit_available", value:"true");
script_set_attribute(attribute:"vuln_publication_date", value:"2020/03/18");
script_set_attribute(attribute:"patch_publication_date", value:"2020/03/18");
script_set_attribute(attribute:"plugin_publication_date", value:"2021/05/28");
script_set_attribute(attribute:"plugin_type", value:"remote");
script_set_attribute(attribute:"cpe", value:"cpe:/a:nagios:fusion");
script_set_attribute(attribute:"stig_severity", value:"I");
script_set_attribute(attribute:"enable_cgi_scanning", value:"true");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"CGI abuses");
script_copyright(english:"This script is Copyright (C) 2021-2024 Tenable Network Security, Inc.");
script_dependencies("nagios_enterprise_detect.nasl");
script_require_keys("installed_sw/nagios_fusion");
script_exclude_keys("Settings/disable_cgi_scanning");
script_require_ports("Services/www", 80);
exit(0);
}
include('http_func.inc');
include('webapp_func.inc');
include('spad_log_func.inc');
# Get the ports that web servers have been found on.
var port = get_http_port(default:80, embedded:TRUE);
# Get details of the install.
var install = get_install_from_kb(appname:'nagios_fusion', port:port, exit_on_fail:TRUE);
spad_log(message:'install: ' + obj_rep(install));
var dir = install['dir'];
var ver = install['ver'];
var url = build_url(port:port, qs:dir + '/');
if (ver == UNKNOWN_VER)
audit(AUDIT_UNKNOWN_WEB_APP_VER, 'Nagios Fusion', url);
var matches = pregmatch(string:ver, pattern:"^((\d+)R([.\d]+)|[0-9.]+)");
if (empty_or_null(matches))
exit(1, 'Unable to parse version string for Nagios server on port ' + port + '.');
var vuln = FALSE;
# note : https://assets.nagios.com/downloads/nagiosfusion/versions.php
# vendor has returned to YYYYYR versioning.
# For this YYYYR style, only mark 200x and 201x years as vuln (way before current).
if (ver =~ "^20[01]\d[Rr]")
vuln = TRUE;
var modern_ver_match = pregmatch(string:ver, pattern:"^([0-9.]+)");
if (!empty_or_null(modern_ver_match))
{
modern_ver_match = modern_ver_match[1];
if (ver_compare(fix:'4.1.9', ver:modern_ver_match) < 0)
vuln = TRUE;
}
if (!vuln)
audit(AUDIT_INST_VER_NOT_VULN, 'Nagios Fusion', ver);
report =
'\n URL : ' + url +
'\n Installed version : ' + ver +
'\n Fixed version : 4.1.9' +
'\n';
security_report_v4(port:port, severity:SECURITY_HOLE, extra:report);
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28900
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28901
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28902
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28903
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28904
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28905
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28906
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28907
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28908
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28909
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28911
www.nagios.com/downloads/nagios-xi/change-log/
www.nagios.com/products/security/
10 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:C/I:C/A:C
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
8.4 High
AI Score
Confidence
High
0.118 Low
EPSS
Percentile
95.4%