Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
N/A
Vulnerability Description
statuswml.cgi in Nagios before 3.1.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) ping or (2) Traceroute parameters.
CVSS Information
N/A
Vulnerability Type
N/A
Vulnerability Title
Nagios statuswml.cgi远程Shell命令注入漏洞
Vulnerability Description
Nagios是一款免费开放源代码的主机和服务监视软件,可使用在多种Linux和Unix操作系统下 。 Nagios没有正确地过滤传送给statuswml.cgi的ping参数,远程攻击者可以通过tools -> ping和tools -> Traceroute WAP/WML页面注入并执行任意shell命令。例如,Ping主机名/地址173.45.235.65;echo $PATH会返回ping命令的输出并执行和返回echo $PATH命令的输出 。
CVSS Information
N/A
Vulnerability Type
N/A