<?xml version="1.0" encoding="UTF-8" ?>

<bugzilla version="5.2"
          urlbase="https://bugzilla.altlinux.org/"
          
          maintainer="jenya@basealt.ru"
>

    <bug>
          <bug_id>20554</bug_id>
          
          <creation_ts>2009-06-24 00:11:27 +0400</creation_ts>
          <short_desc>CVE-2009-2288 Nagios &quot;statuswml.cgi&quot; Command Injection Vulnerability</short_desc>
          <delta_ts>2019-10-06 17:14:26 +0300</delta_ts>
          <reporter_accessible>1</reporter_accessible>
          <cclist_accessible>1</cclist_accessible>
          <classification_id>4</classification_id>
          <classification>Development</classification>
          <product>Sisyphus</product>
          <component>nagios</component>
          <version>unstable</version>
          <rep_platform>all</rep_platform>
          <op_sys>Linux</op_sys>
          <bug_status>CLOSED</bug_status>
          <resolution>FIXED</resolution>
          
          
          <bug_file_loc>http://secunia.com/advisories/35543/</bug_file_loc>
          <status_whiteboard></status_whiteboard>
          <keywords>security</keywords>
          <priority>P3</priority>
          <bug_severity>blocker</bug_severity>
          <target_milestone>---</target_milestone>
          <dependson>33309</dependson>
          
          <everconfirmed>1</everconfirmed>
          <reporter name="Vladimir Lettiev">crux</reporter>
          <assigned_to name="serjigva@altlinux.org">serjigva</assigned_to>
          <cc>grenka</cc>
    
    <cc>ldv</cc>
    
    <cc>mike</cc>
    
    <cc>serjigva</cc>
          
          <qa_contact>qa-sisyphus</qa_contact>

      

      

      

          <comment_sort_order>oldest_to_newest</comment_sort_order>  
          <long_desc isprivate="0" >
    <commentid>93594</commentid>
    <comment_count>0</comment_count>
    <who name="Vladimir Lettiev">crux</who>
    <bug_when>2009-06-24 00:11:27 +0400</bug_when>
    <thetext>Input passed to the &quot;ping&quot; parameter in statuswml.cgi is not properly sanitised before being used to invoke the ping command. This can be exploited to inject and execute arbitrary shell commands.
Successful exploitation requires access to the ping feature of the WAP interface.

Fixed in nagios &gt;= 3.1.1</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>143559</commentid>
    <comment_count>1</comment_count>
    <who name="Michael Shigorin">mike</who>
    <bug_when>2013-10-31 16:16:27 +0400</bug_when>
    <thetext>Если что, nagios у нас с 2009 года только пересобирался с новыми перлами.

* Mon Jan 12 2009 Dmitry Lebkov &lt;dlebkov@altlinux&gt; 3.0.6-alt1</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>184773</commentid>
    <comment_count>2</comment_count>
    <who name="nbr">nbr</who>
    <bug_when>2019-10-05 20:49:06 +0300</bug_when>
    <thetext>http://git.altlinux.org/gears/n/nagios.git?p=nagios.git;a=commit;h=75c99281c4cf3023ad62d323801542bb9ac9ac72</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>184777</commentid>
    <comment_count>3</comment_count>
    <who name="Michael Shigorin">mike</who>
    <bug_when>2019-10-06 17:14:26 +0300</bug_when>
    <thetext>2 nbr: спасибо; у тебя ещё 3.0.6-alt7 есть -- может, закинь тоже в сизиф?</thetext>
  </long_desc>
      
      

    </bug>

</bugzilla>