Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2008-5027 | First vendor Publication | 2008-11-10 |
Vendor | Cve | Last vendor Modification | 2024-11-21 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:S/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 6.5 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Low |
Cvss Expoit Score | 8 | Authentication | Requires single instance |
Calculate full CVSS 2.0 Vectors scores |
Detail
The Nagios process in (1) Nagios before 3.0.5 and (2) op5 Monitor before 4.0.1 allows remote authenticated users to bypass authorization checks, and trigger execution of arbitrary programs by this process, via an (a) custom form or a (b) browser addon. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5027 |
CAPEC : Common Attack Pattern Enumeration & Classification
Id | Name |
---|---|
CAPEC-1 | Accessing Functionality Not Properly Constrained by ACLs |
CAPEC-13 | Subverting Environment Variable Values |
CAPEC-17 | Accessing, Modifying or Executing Executable Files |
CAPEC-39 | Manipulating Opaque Client-based Data Tokens |
CAPEC-45 | Buffer Overflow via Symbolic Links |
CAPEC-51 | Poison Web Service Registry |
CAPEC-59 | Session Credential Falsification through Prediction |
CAPEC-60 | Reusing Session IDs (aka Session Replay) |
CAPEC-76 | Manipulating Input to File System Calls |
CAPEC-77 | Manipulating User-Controlled Variables |
CAPEC-87 | Forceful Browsing |
CAPEC-104 | Cross Zone Scripting |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-264 | Permissions, Privileges, and Access Controls |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:20295 | |||
Oval ID: | oval:org.mitre.oval:def:20295 | ||
Title: | USN-698-2 -- nagios3 vulnerabilities | ||
Description: | It was discovered that Nagios was vulnerable to a Cross-site request forgery (CSRF) vulnerability. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-698-2 CVE-2008-5028 CVE-2008-5027 | Version: | 5 |
Platform(s): | Ubuntu 8.10 | Product(s): | nagios3 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:20718 | |||
Oval ID: | oval:org.mitre.oval:def:20718 | ||
Title: | USN-698-3 -- nagios2 vulnerabilities | ||
Description: | It was discovered that Nagios was vulnerable to a Cross-site request forgery (CSRF) vulnerability. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-698-3 CVE-2008-5028 CVE-2008-5027 | Version: | 5 |
Platform(s): | Ubuntu 8.04 | Product(s): | nagios2 |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:21043 | |||
Oval ID: | oval:org.mitre.oval:def:21043 | ||
Title: | USN-698-1 -- nagios vulnerability | ||
Description: | It was discovered that Nagios did not properly parse commands submitted using the web interface. | ||
Family: | unix | Class: | patch |
Reference(s): | USN-698-1 CVE-2008-5027 | Version: | 5 |
Platform(s): | Ubuntu 6.06 | Product(s): | nagios |
Definition Synopsis: | |||
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2009-07-29 | Name : Gentoo Security Advisory GLSA 200907-15 (nagios-core) File : nvt/glsa_200907_15.nasl |
2009-06-05 | Name : Ubuntu USN-698-1 (nagios) File : nvt/ubuntu_698_1.nasl |
2009-06-05 | Name : Ubuntu USN-698-3 (nagios2) File : nvt/ubuntu_698_3.nasl |
2009-05-06 | Name : Nagios Web Interface Privilege Escalation Vulnerability File : nvt/nagios_cve_2008_5027.nasl |
2009-03-23 | Name : Ubuntu Update for nagios vulnerability USN-698-1 File : nvt/gb_ubuntu_USN_698_1.nasl |
2009-03-23 | Name : Ubuntu Update for nagios2 vulnerabilities USN-698-3 File : nvt/gb_ubuntu_USN_698_3.nasl |
2009-02-16 | Name : Fedora Update for nagios FEDORA-2008-10323 File : nvt/gb_fedora_2008_10323_nagios_fc10.nasl |
2009-01-13 | Name : FreeBSD Ports: nagios File : nvt/freebsd_nagios0.nasl |
2008-12-29 | Name : Ubuntu USN-697-1 (imlib2) File : nvt/ubuntu_697_1.nasl |
2008-12-29 | Name : Ubuntu USN-698-2 (nagios3) File : nvt/ubuntu_698_2.nasl |
2008-12-29 | Name : Ubuntu USN-699-1 (blender) File : nvt/ubuntu_699_1.nasl |
2008-11-27 | Name : Nagios Cross-site Request Forgery (CSRF) and Authentication Bypass Vulnerability File : nvt/gb_nagios_csrf_n_auth_bypass_vuln.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
50242 | op5 Nagios Process Browser Addon Remote Authentication Bypass |
50241 | op5 Nagios Process Custom Form Remote Authentication Bypass |
50240 | Nagios Nagios Process Browser Addon Remote Authentication Bypass |
50239 | Nagios Nagios Process Custom Form Remote Authentication Bypass |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2009-07-21 | Name : The remote openSUSE host is missing a security update. File : suse_11_0_nagios-090217.nasl - Type : ACT_GATHER_INFO |
2009-07-21 | Name : The remote openSUSE host is missing a security update. File : suse_11_1_nagios-090217.nasl - Type : ACT_GATHER_INFO |
2009-07-20 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-200907-15.nasl - Type : ACT_GATHER_INFO |
2009-04-23 | Name : The remote Fedora host is missing a security update. File : fedora_2008-10323.nasl - Type : ACT_GATHER_INFO |
2009-04-23 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-698-1.nasl - Type : ACT_GATHER_INFO |
2009-04-23 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-698-2.nasl - Type : ACT_GATHER_INFO |
2009-04-23 | Name : The remote Ubuntu host is missing one or more security-related patches. File : ubuntu_USN-698-3.nasl - Type : ACT_GATHER_INFO |
2009-01-12 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_d4a358d3e09a11dda7650030843d3802.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 23:13:02 |
|
2024-11-28 12:16:59 |
|
2021-05-04 12:08:21 |
|
2021-04-22 01:08:42 |
|
2020-05-24 01:05:00 |
|
2020-05-23 00:22:34 |
|
2019-03-18 12:01:52 |
|
2017-04-05 12:00:51 |
|
2016-12-08 09:23:22 |
|
2016-04-26 18:00:56 |
|
2014-02-17 10:47:14 |
|
2013-05-11 00:30:28 |
|