7.5

CVE-2009-2288

Exploit

statuswml.cgi in Nagios before 3.1.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) ping or (2) Traceroute parameters.

Data is provided by the National Vulnerability Database (NVD)
NagiosNagios Version <= 3.1.0
NagiosNagios Version1.0
NagiosNagios Version1.0b1
NagiosNagios Version1.0b2
NagiosNagios Version1.0b4
NagiosNagios Version1.1
NagiosNagios Version1.4.1
NagiosNagios Version2.0
NagiosNagios Version2.0b4
NagiosNagios Version2.7
NagiosNagios Version2.10
NagiosNagios Version3.0
NagiosNagios Version3.0 Updatealpha1
NagiosNagios Version3.0 Updatealpha2
NagiosNagios Version3.0 Updatealpha3
NagiosNagios Version3.0 Updatealpha4
NagiosNagios Version3.0 Updatebeta1
NagiosNagios Version3.0 Updatebeta2
NagiosNagios Version3.0 Updatebeta3
NagiosNagios Version3.0 Updatebeta4
NagiosNagios Version3.0 Updatebeta5
NagiosNagios Version3.0 Updatebeta6
NagiosNagios Version3.0 Updatebeta7
NagiosNagios Version3.0 Updaterc1
NagiosNagios Version3.0 Updaterc2
NagiosNagios Version3.0 Updaterc3
NagiosNagios Version3.0.1
NagiosNagios Version3.0.2
NagiosNagios Version3.0.3
NagiosNagios Version3.0.4
NagiosNagios Version3.0.5
NagiosNagios Version3.0.6
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 93.3% 0.998
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 7.5 10 6.4
AV:N/AC:L/Au:N/C:P/I:P/A:P
CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.