CVE-2019-15949

HIGH KEV

Nagios XI <5.6.6 - RCE

Title source: llm

Description

Nagios XI before 5.6.6 allows remote command execution as root. The exploit requires access to the server as the nagios user, or access as the admin user via the web interface. The getprofile.sh script, invoked by downloading a system profile (profile.php?cmd=download), is executed as root via a passwordless sudo entry; the script executes check_plugin, which is owned by the nagios user. A user logged into Nagios XI with permissions to modify plugins, or the nagios user on the server, can modify the check_plugin executable and insert malicious commands to execute as root.

Exploits (6)

exploitdb WORKING POC VERIFIED
by Metasploit · rubyremotelinux
https://www.exploit-db.com/exploits/48191
exploitdb WORKING POC
by Calil Khalil · textwebappsmultiple
https://www.exploit-db.com/exploits/52138
nomisec WORKING POC
by plur1bu5 · poc
https://github.com/plur1bu5/Nagios-CVE-2019-15949-RCE
vulncheck_xdb WORKING POC
remote-auth
https://github.com/hadrian3689/nagiosxi_5.6.6
metasploit WORKING POC EXCELLENT
by Jak Gibb, Erik Wynter · rubypoclinux
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/nagios_xi_plugins_check_plugin_authenticated_rce.rb

Scores

CVSS v3 8.8
EPSS 0.8705
EPSS Percentile 99.4%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Details

CISA KEV 2021-11-03
VulnCheck KEV 2021-11-03
InTheWild.io 2021-07-23
ENISA EUVD EUVD-2019-6850
CWE
CWE-78
Status published
Products (1)
nagios/nagios_xi < 5.6.6
Published Sep 05, 2019
KEV Added Nov 03, 2021
Tracked Since Feb 18, 2026