RSS   Podatności dla 'Fusion'   RSS

2021-05-24
 
CVE-2020-28900

CWE-345
 

 
Insufficient Verification of Data Authenticity in Nagios Fusion 4.1.8 and earlier and Nagios XI 5.7.5 and earlier allows for Escalation of Privileges or Code Execution as root via vectors related to an untrusted update package to upgrade_to_latest.sh.

 
 
CVE-2020-28901

CWE-77
 

 
Command Injection in Nagios Fusion 4.1.8 and earlier allows for Privilege Escalation or Code Execution as root via vectors related to corrupt component installation in cmd_subsys.php.

 
 
CVE-2020-28902

CWE-77
 

 
Command Injection in Nagios Fusion 4.1.8 and earlier allows Privilege Escalation from apache to root in cmd_subsys.php.

 
 
CVE-2020-28903

CWE-79
 

 
Improper input validation in Nagios Fusion 4.1.8 and earlier allows a remote attacker with control over a fused server to inject arbitrary HTML, aka XSS.

 
 
CVE-2020-28904

CWE-269
 

 
Execution with Unnecessary Privileges in Nagios Fusion 4.1.8 and earlier allows for Privilege Escalation as nagios via installation of a malicious component containing PHP code.

 
 
CVE-2020-28905

CWE-20
 

 
Improper Input Validation in Nagios Fusion 4.1.8 and earlier allows an authenticated attacker to execute remote code via table pagination.

 
 
CVE-2020-28906

CWE-276
 

 
Incorrect File Permissions in Nagios XI 5.7.5 and earlier and Nagios Fusion 4.1.8 and earlier allows for Privilege Escalation to root. Low-privileged users are able to modify files that are included (aka sourced) by scripts executed by root.

 
 
CVE-2020-28907

CWE-295
 

 
Incorrect SSL certificate validation in Nagios Fusion 4.1.8 and earlier allows for Escalation of Privileges or Code Execution as root via vectors related to download of an untrusted update package in upgrade_to_latest.sh.

 
 
CVE-2020-28908

CWE-77
 

 
Command Injection in Nagios Fusion 4.1.8 and earlier allows for Privilege Escalation to nagios.

 
 
CVE-2020-28909

CWE-732
 

 
Incorrect File Permissions in Nagios Fusion 4.1.8 and earlier allows for Privilege Escalation to root via modification of scripts. Low-privileges users are able to modify files that can be executed by sudo.

 


Copyright 2024, cxsecurity.com

 

Back to Top