Nagios XI versions prior to 5.7.2 allow PHP files to be uploaded to the Audio Import directory and executed from that location. The upload handler did not properly restrict file types or enforce storage outside of the webroot, and the web server permitted execution within the upload directory. An authenticated attacker with access to the audio import feature could upload a crafted PHP file and then request it to achieve remote code execution with the privileges of the application service.
PUBLISHED5.2CWE-434
Nagios XI < 5.7.2 Unrestricted File Upload via Audio Import Directory
Problem type
Affected products
Nagios
XI
< 5.7.2 - AFFECTED
References
nagios.com
https://www.nagios.com/changelog/nagios-xi/
vulncheck.com
https://www.vulncheck.com/advisories/nagios-xi-unrestricted-file-upload-via-audio-import-directory
JSON source
Click to expand
{
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2",
  "cveMetadata": {
    "cveId": "CVE-2020-36863",
    "assignerOrgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10",
    "assignerShortName": "VulnCheck",
    "dateUpdated": "2025-10-31T13:23:15.327Z",
    "dateReserved": "2025-10-30T14:33:17.562Z",
    "datePublished": "2025-10-30T21:46:58.792Z",
    "state": "PUBLISHED"
  },
  "containers": {
    "cna": {
      "providerMetadata": {
        "orgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10",
        "shortName": "VulnCheck",
        "dateUpdated": "2025-10-30T21:46:58.792Z"
      },
      "title": "Nagios XI < 5.7.2 Unrestricted File Upload via Audio Import Directory",
      "descriptions": [
        {
          "lang": "en",
          "value": "Nagios XI versions prior to 5.7.2 allow PHP files to be uploaded to the Audio Import directory and executed from that location. The upload handler did not properly restrict file types or enforce storage outside of the webroot, and the web server permitted execution within the upload directory. An authenticated attacker with access to the audio import feature could upload a crafted PHP file and then request it to achieve remote code execution with the privileges of the application service.",
          "supportingMedia": [
            {
              "type": "text/html",
              "base64": false,
              "value": "Nagios XI versions prior to 5.7.2 allow PHP files to be uploaded to the Audio Import directory and executed from that location. The upload handler did not properly restrict file types or enforce storage outside of the webroot, and the web server permitted execution within the upload directory. An authenticated attacker with access to the audio import feature could upload a crafted PHP file and then request it to achieve remote code execution with the privileges of the application service.<br>"
            }
          ]
        }
      ],
      "affected": [
        {
          "vendor": "Nagios",
          "product": "XI",
          "modules": [
            "Audio import directory / upload handler (web UI/API)",
            "Web server configuration for upload directory execution"
          ],
          "defaultStatus": "unaffected",
          "versions": [
            {
              "version": "0",
              "status": "affected",
              "versionType": "semver",
              "lessThan": "5.7.2"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "lang": "en",
              "description": "CWE-434 Unrestricted Upload of File with Dangerous Type",
              "cweId": "CWE-434",
              "type": "CWE"
            }
          ]
        }
      ],
      "references": [
        {
          "url": "https://www.nagios.com/changelog/nagios-xi/",
          "tags": [
            "release-notes",
            "patch"
          ]
        },
        {
          "url": "https://www.vulncheck.com/advisories/nagios-xi-unrestricted-file-upload-via-audio-import-directory",
          "tags": [
            "third-party-advisory"
          ]
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-1",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-1 Accessing Functionality Not Properly Constrained by ACLs"
            }
          ]
        }
      ],
      "metrics": [
        {
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "value": "Nagios addresses this vulnerability as \"Fixed security vulernability with audio import directory allowing php files to be uploaded/ran from that directory.\"",
          "supportingMedia": [
            {
              "type": "text/html",
              "base64": false,
              "value": "Nagios addresses this vulnerability as \"Fixed security vulernability with audio import directory allowing php files to be uploaded/ran from that directory.\"<br>"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "TactiFail",
          "type": "finder"
        }
      ]
    },
    "adp": [
      {
        "providerMetadata": {
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP",
          "dateUpdated": "2025-10-31T13:23:15.327Z"
        },
        "title": "CISA ADP Vulnrichment",
        "metrics": [
          {}
        ]
      }
    ]
  }
}