Insecure Permissions vulnerability in Nagios Network Analyzer v.2024R1.02-64 and before allows a local attacker to escalate pri
嗯,用户让我帮忙总结一下这篇文章的内容,控制在一百个字以内,而且不需要用“文章内容总结”或者“这篇文章”这样的开头。直接写描述就行。好的,我先仔细看看文章内容。 文章讲的是Nagios Network Analyzer的一个漏洞,版本是v.2024R1.02-64及之前的版本。漏洞名称是Insecure Permissions vulnerability,允许本地攻击者通过remove_source.sh组件提升权限。具体来说,Nagios VM的默认设置给了“nna”用户sudo权限来执行特定脚本。这些权限可以被利用来改变脚本行为,导致权限提升攻击。即使密码有变化,普通用户也能通过滥用sudo权限升级到root,从而控制整个系统。 受影响的组件是/usr/local/nagiosna/scripts/remove_source.sh。厂商已经确认了这个漏洞,并提供了变更日志链接和参考资料链接。 现在我需要把这些信息浓缩到一百字以内。重点包括:Nagios Network Analyzer的漏洞、版本、本地攻击者、remove_source.sh组件、sudo权限滥用、权限提升到root。 所以,总结的时候要包含这些关键点:Nagios Network Analyzer某版本存在漏洞,允许本地攻击者利用remove_source.sh组件通过sudo权限提升至root。 检查一下字数是否在限制内,并且表达清晰。 </think> Nagios Network Analyzer某版本存在漏洞,允许本地攻击者利用`remove_source.sh`组件通过sudo权限提升至root。 2026-4-26 21:7:36 Author: cxsecurity.com(查看原文) 阅读量:26 收藏

Insecure Permissions vulnerability in Nagios Network Analyzer v.2024R1.02-64 and before allows a local attacker to escalate privileges via the remove_source.sh component. Nagios Network Analyzer VM's default setup grants the "nna" user sudo permissions to execute specific scripts. These permissions can be exploited to alter script behaviors, enabling a Privilege Escalation Attack. Thus, even with/without password changes, a normal user can escalate to Superuser (root), gaining full system control through the misuse of sudo rights. Affected Component: /usr/local/nagiosna/scripts/remove_source.sh Confirmation by the Vendor: https://www.nagios.com/changelog/#network-analyzer

References:

https://github.com/sartlabs/0days/tree/main/Nagios%20Network%20Analyzer




 

Thanks for you comment!
Your message is in quarantine 48 hours.


文章来源: https://cxsecurity.com/issue/WLB-2026040019
如有侵权请联系:admin#unsafe.sh