From d34bc2fe03bc3ac81b3fb2d9952d2b6cfb72b800 Mon Sep 17 00:00:00 2001 From: Matthew Mathur <9121784+k0pak4@users.noreply.github.com> Date: Thu, 2 Feb 2023 17:14:24 -0500 Subject: [PATCH] Add additional affected versions --- cves/2021/CVE-2021-25296.yaml | 4 ++-- cves/2021/CVE-2021-25297.yaml | 6 +++--- cves/2021/CVE-2021-25298.yaml | 6 +++--- 3 files changed, 8 insertions(+), 8 deletions(-) diff --git a/cves/2021/CVE-2021-25296.yaml b/cves/2021/CVE-2021-25296.yaml index 03ce39bb1f..45724eb2da 100644 --- a/cves/2021/CVE-2021-25296.yaml +++ b/cves/2021/CVE-2021-25296.yaml @@ -1,10 +1,10 @@ id: CVE-2021-25296 info: - name: Nagios XI 5.7.5 Command Injection + name: Nagios XI versions 5.5.6 to 5.7.5 Command Injection author: k0pak4 severity: critical - description: Nagios XI 5.7.5 is affected by OS command injection. An authenticated user can gain code execution with a single HTTP request due to unsanitized URL paramaters. + description: Nagios XI versions 5.5.6 to 5.7.5 are affected by OS command injection. An authenticated user can gain code execution due to unsanitized URL paramaters. reference: - https://nvd.nist.gov/vuln/detail/CVE-2021-25296 - https://github.com/fs0c-sh/nagios-xi-5.7.5-bugs/blob/main/README.md diff --git a/cves/2021/CVE-2021-25297.yaml b/cves/2021/CVE-2021-25297.yaml index d7199abe02..1647082ab8 100644 --- a/cves/2021/CVE-2021-25297.yaml +++ b/cves/2021/CVE-2021-25297.yaml @@ -1,10 +1,10 @@ id: CVE-2021-25297 info: - name: Nagios XI 5.7.5 Command Injection + name: Nagios XI versions 5.5.6 to 5.7.5 Command Injection author: k0pak4 severity: critical - description: Nagios XI 5.7.5 is affected by OS command injection. An authenticated user can gain code execution with a single HTTP request due to unsanitized URL paramaters. + description: Nagios XI versions 5.5.6 to 5.7.5 are affected by OS command injection. An authenticated user can gain code execution due to unsanitized URL paramaters. reference: - https://nvd.nist.gov/vuln/detail/CVE-2021-25297 - https://github.com/fs0c-sh/nagios-xi-5.7.5-bugs/blob/main/README.md @@ -14,7 +14,7 @@ info: cvss-score: 8.8 cve-id: CVE-2021-25297 cwe-id: CWE-78 - tags: cve,cve2021,nagiosxi + tags: cve,cve2021,nagiosxi,authenticated requests: - raw: diff --git a/cves/2021/CVE-2021-25298.yaml b/cves/2021/CVE-2021-25298.yaml index c8d0b39bc6..a97c7b40a9 100644 --- a/cves/2021/CVE-2021-25298.yaml +++ b/cves/2021/CVE-2021-25298.yaml @@ -1,10 +1,10 @@ id: CVE-2021-25298 info: - name: Nagios XI 5.7.5 Command Injection + name: Nagios XI 5.5.6 to 5.7.5 Command Injection author: k0pak4 severity: critical - description: Nagios XI 5.7.5 is affected by OS command injection. An authenticated user can gain code execution with a single HTTP request due to unsanitized URL paramaters. + description: Nagios XI versions 5.5.6 to 5.7.5 are affected by OS command injection. An authenticated user can gain code execution due to unsanitized URL paramaters. reference: - https://nvd.nist.gov/vuln/detail/CVE-2021-25298 - https://github.com/fs0c-sh/nagios-xi-5.7.5-bugs/blob/main/README.md @@ -14,7 +14,7 @@ info: cvss-score: 8.8 cve-id: CVE-2021-25298 cwe-id: CWE-78 - tags: cve,cve2021,nagiosxi + tags: cve,cve2021,nagiosxi,authenticated requests: - raw: