The web management console of Opsview Monitor 5.4.x before 5.4.2 provides functionality accessible by an authenticated administrator to test notifications that are triggered under certain configurable events. The value parameter is not properly sanitized, leading to arbitrary command injection with the privileges of the nagios user account.
References
Link | Resource |
---|---|
https://knowledge.opsview.com/v5.4/docs/whats-new | Vendor Advisory |
https://seclists.org/fulldisclosure/2018/Sep/3 | Exploit Mailing List Third Party Advisory |
https://www.coresecurity.com/advisories/opsview-monitor-multiple-vulnerabilities | Exploit Third Party Advisory |
https://knowledge.opsview.com/v5.4/docs/whats-new | Vendor Advisory |
https://seclists.org/fulldisclosure/2018/Sep/3 | Exploit Mailing List Third Party Advisory |
https://www.coresecurity.com/advisories/opsview-monitor-multiple-vulnerabilities | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 03:52
Type | Values Removed | Values Added |
---|---|---|
References | () https://knowledge.opsview.com/v5.4/docs/whats-new - Vendor Advisory | |
References | () https://seclists.org/fulldisclosure/2018/Sep/3 - Exploit, Mailing List, Third Party Advisory | |
References | () https://www.coresecurity.com/advisories/opsview-monitor-multiple-vulnerabilities - Exploit, Third Party Advisory |
Information
Published : 2018-09-05 21:29
Updated : 2024-11-21 03:52
NVD link : CVE-2018-16146
Mitre link : CVE-2018-16146
CVE.ORG link : CVE-2018-16146
JSON object : View
Products Affected
opsview
- opsview
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')