← Voltar para CVEs
CVE-2008-5028
N/ADescricao
Cross-site request forgery (CSRF) vulnerability in cmd.cgi in (1) Nagios 3.0.5 and (2) op5 Monitor before 4.0.1 allows remote attackers to send commands to the Nagios process, and trigger execution of arbitrary programs by this process, via unspecified HTTP requests.
Detalhes CVE
Pontuacao CVSS v3.1N/A
Publicado11/10/2008
Ultima modificacao4/23/2026
Fontenvd
Avistamentos honeypot0
Produtos afetados
nagios:nagiosop5:monitor
Fraquezas (CWE)
CWE-352
Referencias
http://git.op5.org/git/?p=nagios.git%3Ba=commit%3Bh=814d8d4d1a73f7151eeed187c0667585d79fea18(cve@mitre.org)
http://marc.info/?l=bugtraq&m=124156641928637&w=2(cve@mitre.org)
http://osvdb.org/49678(cve@mitre.org)
http://secunia.com/advisories/32610(cve@mitre.org)
http://secunia.com/advisories/32630(cve@mitre.org)
http://secunia.com/advisories/33320(cve@mitre.org)
http://secunia.com/advisories/35002(cve@mitre.org)
http://security.gentoo.org/glsa/glsa-200907-15.xml(cve@mitre.org)
http://sourceforge.net/mailarchive/forum.php?thread_name=4914396D.5010009%40op5.se&forum_name=nagios-devel(cve@mitre.org)
http://www.openwall.com/lists/oss-security/2008/11/06/2(cve@mitre.org)
http://www.securitytracker.com/id?1022165(cve@mitre.org)
http://www.vupen.com/english/advisories/2008/3029(cve@mitre.org)
http://www.vupen.com/english/advisories/2009/1256(cve@mitre.org)
https://exchange.xforce.ibmcloud.com/vulnerabilities/46426(cve@mitre.org)
https://exchange.xforce.ibmcloud.com/vulnerabilities/46521(cve@mitre.org)
https://www.ubuntu.com/usn/USN-698-3/(cve@mitre.org)
http://git.op5.org/git/?p=nagios.git%3Ba=commit%3Bh=814d8d4d1a73f7151eeed187c0667585d79fea18(af854a3a-2127-422b-91ae-364da2661108)
http://marc.info/?l=bugtraq&m=124156641928637&w=2(af854a3a-2127-422b-91ae-364da2661108)
http://osvdb.org/49678(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/32610(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/32630(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/33320(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/35002(af854a3a-2127-422b-91ae-364da2661108)
http://security.gentoo.org/glsa/glsa-200907-15.xml(af854a3a-2127-422b-91ae-364da2661108)
http://sourceforge.net/mailarchive/forum.php?thread_name=4914396D.5010009%40op5.se&forum_name=nagios-devel(af854a3a-2127-422b-91ae-364da2661108)
http://www.op5.com/support/news/389-important-security-fix-available-for-op5-monitor(af854a3a-2127-422b-91ae-364da2661108)
http://www.openwall.com/lists/oss-security/2008/11/06/2(af854a3a-2127-422b-91ae-364da2661108)
http://www.securitytracker.com/id?1022165(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2008/3029(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2009/1256(af854a3a-2127-422b-91ae-364da2661108)
https://exchange.xforce.ibmcloud.com/vulnerabilities/46426(af854a3a-2127-422b-91ae-364da2661108)
https://exchange.xforce.ibmcloud.com/vulnerabilities/46521(af854a3a-2127-422b-91ae-364da2661108)
https://www.ubuntu.com/usn/USN-698-3/(af854a3a-2127-422b-91ae-364da2661108)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.