| Severity |
|
| Remote |
|
| Type |
| + |
Arbitrary command execution |
|
| Description |
| + |
Incomplete blacklist vulnerability in nrpc.c in Nagios Remote Plug-In Executor (NRPE) might allow remote attackers to execute arbitrary shell commands via "$()" shell metacharacters, which are processed by bash. |
|
| References |
| + |
http://seclists.org/bugtraq/2013/Feb/119 |
| + |
https://github.com/NagiosEnterprises/nrpe/commit/eaaebb3c2925f9aee74319b61264ee535784b859 |
|
| Notes |
| + |
This issue can only occur when nrpc is compiled with --enable-command-args and the administrator enables the "dont_blame_nrpe" option in nrpe.conf despite the "HIGH security risk" warning within the comments. |
| + |
|
| + |
Test Exploit: |
| + |
# ./check_nrpe -n -H 127.0.0.1 -c check_disk -a "-c $(touch /tmp/VULNERABLE)" |
|