CVE-2019-15949
HIGH KEVNagios XI <5.6.6 - RCE
Title source: llmDescription
Nagios XI before 5.6.6 allows remote command execution as root. The exploit requires access to the server as the nagios user, or access as the admin user via the web interface. The getprofile.sh script, invoked by downloading a system profile (profile.php?cmd=download), is executed as root via a passwordless sudo entry; the script executes check_plugin, which is owned by the nagios user. A user logged into Nagios XI with permissions to modify plugins, or the nagios user on the server, can modify the check_plugin executable and insert malicious commands to execute as root.
Exploits (6)
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremotelinux
https://www.exploit-db.com/exploits/48191
exploitdb
WORKING POC
by Calil Khalil · textwebappsmultiple
https://www.exploit-db.com/exploits/52138
metasploit
WORKING POC
EXCELLENT
by Jak Gibb, Erik Wynter · rubypoclinux
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/nagios_xi_plugins_check_plugin_authenticated_rce.rb
References (4)
Scores
CVSS v3
8.8
EPSS
0.8705
EPSS Percentile
99.4%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Details
CISA KEV
2021-11-03
VulnCheck KEV
2021-11-03
InTheWild.io
2021-07-23
ENISA EUVD
EUVD-2019-6850
CWE
CWE-78
Status
published
Products (1)
nagios/nagios_xi
< 5.6.6
Published
Sep 05, 2019
KEV Added
Nov 03, 2021
Tracked Since
Feb 18, 2026