Bug 1167658 (CVE-2020-6581) - VUL-0: CVE-2020-6581: nrpe: insufficient filtering and incorrect parsing of the configuration file may lead to command injection
Summary: VUL-0: CVE-2020-6581: nrpe: insufficient filtering and incorrect parsing of t...
Status: RESOLVED FIXED
Alias: CVE-2020-6581
Product: openSUSE Distribution
Classification: openSUSE
Component: Security (show other bugs)
Version: Leap 15.1
Hardware: Other Other
: P3 - Medium : Major (vote)
Target Milestone: ---
Assignee: Security Team bot
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/255200/
Whiteboard: CVSSv2:NVD:CVE-2020-6581:6.8:(AV:N/A...
Keywords:
Depends on:
Blocks:
 
Reported: 2020-03-25 13:41 UTC by Wolfgang Frisch
Modified: 2024-07-04 07:25 UTC (History)
1 user (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Wolfgang Frisch 2020-03-25 13:41:28 UTC
CVE-2020-6581

Nagios NRPE 3.2.1 has Insufficient Filtering because, for example, nasty_metachars interprets \n as the character \ and the character n (not as the \n newline sequence). This can cause command injection.

References:
https://bugzilla.redhat.com/show_bug.cgi?id=1816801
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-6581
http://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-6581.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-6581
https://herolab.usd.de/security-advisories/
https://herolab.usd.de/security-advisories/usd-2020-0002/
Comment 1 Wolfgang Frisch 2020-03-26 15:18:48 UTC
SUSE:SLE-11-SP1:Update   nagios-nrpe   Not affected  [1]
SUSE:SLE-12:Update       nrpe          Not affected  [1]

openSUSE:Factory         nrpe          Affected [2]
openSUSE:Leap:15.1       nrpe          Affected [2]

[1] These versions do not support the `nasty_metachars` option in the configuration file.

[2] This version of nrpe parses the `nasty_metachars` option in the configuration file incorrectly. When `nasty_metachars` is set in /etc/nrpe.cfg, the daemon rejects arguments that contain the character "n":
/usr/lib/nagios/plugins/check_nrpe -n -H 127.0.0.1 -c check_POC -a "n"
>nrpe[10076]: Error: Request contained illegal metachars!

I was not able to reproduce the exploit but the bug exists nevertheless.

Please submit for openSUSE.
Comment 2 Wolfgang Frisch 2024-07-04 07:25:30 UTC
Resolved