CVE-2008-5027
10.11.2008, 15:23
The Nagios process in (1) Nagios before 3.0.5 and (2) op5 Monitor before 4.0.1 allows remote authenticated users to bypass authorization checks, and trigger execution of arbitrary programs by this process, via an (a) custom form or a (b) browser addon.Enginsight
| Vendor | Product | Version |
|---|---|---|
| nagios | nagios | 𝑥 ≤ 3.0.4 |
| nagios | nagios | 1.0 |
| nagios | nagios | 1.0_b1:_b1 |
| nagios | nagios | 1.0_b2:_b2 |
| nagios | nagios | 1.0_b3:_b3 |
| nagios | nagios | 1.0b1:b1 |
| nagios | nagios | 1.0b2:b2 |
| nagios | nagios | 1.0b3:b3 |
| nagios | nagios | 1.0b4:b4 |
| nagios | nagios | 1.0b5:b5 |
| nagios | nagios | 1.0b6:b6 |
| nagios | nagios | 1.1 |
| nagios | nagios | 1.2 |
| nagios | nagios | 1.3 |
| nagios | nagios | 1.4 |
| nagios | nagios | 1.4.1 |
| nagios | nagios | 2.0 |
| nagios | nagios | 2.0b1:b1 |
| nagios | nagios | 2.0b2:b2 |
| nagios | nagios | 2.0b3:b3 |
| nagios | nagios | 2.0b4:b4 |
| nagios | nagios | 2.0b5:b5 |
| nagios | nagios | 2.0b6:b6 |
| nagios | nagios | 2.0rc1:rc1 |
| nagios | nagios | 2.0rc2:rc2 |
| nagios | nagios | 2.1 |
| nagios | nagios | 2.2 |
| nagios | nagios | 2.3 |
| nagios | nagios | 2.3.1 |
| nagios | nagios | 2.4 |
| nagios | nagios | 2.5 |
| nagios | nagios | 2.7 |
| nagios | nagios | 2.8 |
| nagios | nagios | 2.9 |
| nagios | nagios | 2.10 |
| nagios | nagios | 2.11 |
| nagios | nagios | 3.0 |
| nagios | nagios | 3.0:alpha1 |
| nagios | nagios | 3.0:alpha2 |
| nagios | nagios | 3.0:alpha3 |
| nagios | nagios | 3.0:alpha4 |
| nagios | nagios | 3.0:beta1 |
| nagios | nagios | 3.0:beta2 |
| nagios | nagios | 3.0:beta3 |
| nagios | nagios | 3.0:beta4 |
| nagios | nagios | 3.0:beta5 |
| nagios | nagios | 3.0:beta6 |
| nagios | nagios | 3.0:beta7 |
| nagios | nagios | 3.0:rc1 |
| nagios | nagios | 3.0:rc2 |
| nagios | nagios | 3.0:rc3 |
| nagios | nagios | 3.0.1 |
| nagios | nagios | 3.0.2 |
| nagios | nagios | 3.0.3 |
| op5 | monitor | 𝑥 ≤ 4.0.0 |
| op5 | monitor | 2.4 |
| op5 | monitor | 2.6 |
| op5 | monitor | 2.8 |
| op5 | monitor | 3.0 |
| op5 | monitor | 3.0.0 |
| op5 | monitor | 3.2 |
| op5 | monitor | 3.2.4 |
| op5 | monitor | 3.3.1 |
| op5 | monitor | 3.3.2 |
| op5 | monitor | 3.3.3 |
𝑥
= Vulnerable software versions
Ubuntu Releases
Common Weakness Enumeration
References