CVE-2009-2288

EXPLOITED

Nagios <3.1.1 - RCE

Title source: llm

Description

statuswml.cgi in Nagios before 3.1.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) ping or (2) Traceroute parameters.

Exploits (4)

exploitdb WORKING POC VERIFIED
by Metasploit · rubywebappscgi
https://www.exploit-db.com/exploits/16908
exploitdb WORKING POC VERIFIED
by H D Moore · rubywebappsunix
https://www.exploit-db.com/exploits/9861
exploitdb WORKING POC VERIFIED
by Paul · textremotecgi
https://www.exploit-db.com/exploits/33051
metasploit WORKING POC EXCELLENT
by hdm · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/unix/webapp/nagios3_statuswml_ping.rb

Scores

EPSS 0.9326
EPSS Percentile 99.8%

Details

VulnCheck KEV 2020-12-01
CWE
CWE-78
Status published
Products (18)
nagios/nagios 1.0
nagios/nagios 1.0b1
nagios/nagios 1.0b2
nagios/nagios 1.0b4
nagios/nagios 1.1
nagios/nagios 1.4.1
nagios/nagios 2.0
nagios/nagios 2.0b4
nagios/nagios 2.7
nagios/nagios 2.10
... and 8 more
Published Jul 01, 2009
Tracked Since Feb 18, 2026