Name | CVE-2023-37154 |
Description | check_by_ssh in Nagios nagios-plugins 2.4.5 allows arbitrary command execution via ProxyCommand, LocalCommand, and PermitLocalCommand with \${IFS}. This has been categorized both as fixed in e8810de, and as intended behavior. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
monitoring-plugins (PTS) | bullseye | 2.3.1-1 | vulnerable |
| bookworm | 2.3.3-5+deb12u2 | vulnerable |
| sid, trixie | 2.4.0-1 | vulnerable |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|
monitoring-plugins | source | (unstable) | (unfixed) | unimportant | | |
Notes
Fix in nagios-plugins project: https://github.com/nagios-plugins/nagios-plugins/commit/e8810de21be80148562b7e0168b0a62aeedffde6
monitoring-plugins upstream does not plan to make an upstream change similar to
nagios-plugins because there are valid usecases to execute stuff locally via
check_by_ssh (although not commonly known and used).
Documentation for expected behaviour in monitoring-plugins/check_by_ssh:
https://github.com/monitoring-plugins/monitoring-plugins/security/advisories/GHSA-p3gv-vmpx-hhw4
https://joshua.hu/nagios-hacking-cve-2023-37154