CVE-2023-37154

NameCVE-2023-37154
Descriptioncheck_by_ssh in Nagios nagios-plugins 2.4.5 allows arbitrary command execution via ProxyCommand, LocalCommand, and PermitLocalCommand with \${IFS}. This has been categorized both as fixed in e8810de, and as intended behavior.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
monitoring-plugins (PTS)bullseye2.3.1-1vulnerable
bookworm2.3.3-5+deb12u2vulnerable
sid, trixie2.4.0-1vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
monitoring-pluginssource(unstable)(unfixed)unimportant

Notes

Fix in nagios-plugins project: https://github.com/nagios-plugins/nagios-plugins/commit/e8810de21be80148562b7e0168b0a62aeedffde6
monitoring-plugins upstream does not plan to make an upstream change similar to
nagios-plugins because there are valid usecases to execute stuff locally via
check_by_ssh (although not commonly known and used).
Documentation for expected behaviour in monitoring-plugins/check_by_ssh:
https://github.com/monitoring-plugins/monitoring-plugins/security/advisories/GHSA-p3gv-vmpx-hhw4
https://joshua.hu/nagios-hacking-cve-2023-37154

Search for package or bug name: Reporting problems