|
|
|
0 members (),
1,054
guests, and
24
robots. |
|
Key:
Admin,
Global Mod,
Mod
|
|
S |
M |
T |
W |
T |
F |
S |
|
1
|
2
|
3
|
4
|
5
|
6
|
7
|
|
8
|
9
|
10
|
11
|
12
|
13
|
14
|
|
15
|
16
|
17
|
18
|
19
|
20
|
21
|
|
22
|
23
|
24
|
25
|
26
|
27
|
28
|
|
There are no members with birthdays on this day. |
#604066
Thu 15 Apr 2021 01:52:PM
|
Joined: Feb 2001
Posts: 381,904
Launch Director
|
OP
Launch Director
Joined: Feb 2001
Posts: 381,904 |
This Metasploit module exploits a command injection vulnerability in the /admin/monitoringplugins.php page of Nagios XI versions prior to 5.8.0 when uploading plugins. Successful exploitation allows an authenticated admin user to achieve remote code execution as the apache user by uploading a malicious plugin. Valid credentials for a Nagios XI admin user are required. This module has been successfully tested against Nagios versions XI 5.3.0 and 5.7.5, both running on CentOS 7. Source: Nagios XI Remote Code Execution
|
|
CMS The Best Conveyancing solicitors conveyancing quotes throughout the UK
For any webhosting enquiries please email webmaster@aus-city.com
|
|
Entire Thread
|
Nagios XI Remote Code Execution
|
Webmaster
|
Thu 15 Apr 2021 01:52:PM
|
|
Forums60
Topics760,870
Posts795,594
Members2,957
| |
Most Online17,963 Jan 15th, 2026
|
|
|
|
|
Copyright 1996 - 2026 by David Cottle. Designed by David Bate Jr. All Rights Reserved.
By using this forum, the user agrees not to transfer any data or technical information received under the agreement, to any other entity without the express approval of the AUS-CITY Forum Admins and/or authors of individual posts (Forum Admins and DoD/USSPACECOM for the analysis of satellite tracking data).
Two-line elements (TLE) and all other satellite data presented and distributed via this forum and e-mail lists of AUS-CITY are distributed with permission from DoD/USSTRATCOM.
Reprise Hosting
|
|