Rapid7 Vulnerability & Exploit Database

Nagios Remote Plugin Executor Arbitrary Command Execution

Back to Search

Nagios Remote Plugin Executor Arbitrary Command Execution

Disclosed
02/21/2013
Created
05/30/2018

Description

The Nagios Remote Plugin Executor (NRPE) is installed to allow a central Nagios server to actively poll information from the hosts it monitors. NRPE has a configuration option dont_blame_nrpe which enables command-line arguments to be provided remote plugins. When this option is enabled, even when NRPE makes an effort to sanitize arguments to prevent command execution, it is possible to execute arbitrary commands.

Author(s)

  • Rudolph Pereir
  • jwpari <jwpari@beersec.org>

Platform

Unix

Architectures

cmd

Development

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

msf > use exploit/linux/misc/nagios_nrpe_arguments
msf exploit(nagios_nrpe_arguments) > show targets
    ...targets...
msf exploit(nagios_nrpe_arguments) > set TARGET < target-id >
msf exploit(nagios_nrpe_arguments) > show options
    ...show and set options...
msf exploit(nagios_nrpe_arguments) > exploit

Time is precious, so I don’t want to do something manually that I can automate. Leveraging the Metasploit Framework when automating any task keeps us from having to re-create the wheel as we can use the existing libraries and focus our efforts where it matters.

– Jim O’Gorman | President, Offensive Security

;