CVE-2009-2288
EXPLOITEDNagios <3.1.1 - RCE
Title source: llmDescription
statuswml.cgi in Nagios before 3.1.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) ping or (2) Traceroute parameters.
Exploits (4)
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubywebappscgi
https://www.exploit-db.com/exploits/16908
exploitdb
WORKING POC
VERIFIED
by H D Moore · rubywebappsunix
https://www.exploit-db.com/exploits/9861
metasploit
WORKING POC
EXCELLENT
by hdm · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/unix/webapp/nagios3_statuswml_ping.rb
References (12)
Scores
EPSS
0.9326
EPSS Percentile
99.8%
Details
VulnCheck KEV
2020-12-01
CWE
CWE-78
Status
published
Products (18)
nagios/nagios
1.0
nagios/nagios
1.0b1
nagios/nagios
1.0b2
nagios/nagios
1.0b4
nagios/nagios
1.1
nagios/nagios
1.4.1
nagios/nagios
2.0
nagios/nagios
2.0b4
nagios/nagios
2.7
nagios/nagios
2.10
... and 8 more
Published
Jul 01, 2009
Tracked Since
Feb 18, 2026