{"id":"CVE-2016-9565","details":"MagpieRSS, as used in the front-end component in Nagios Core before 4.2.2 might allow remote attackers to read or write to arbitrary files by spoofing a crafted response from the Nagios RSS feed server.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2008-4796.","modified":"2026-04-16T01:46:43.714169609Z","published":"2016-12-15T22:59:00.460Z","references":[{"type":"WEB","url":"http://www.securityfocus.com/archive/1/539925/100/0/threaded"},{"type":"WEB","url":"http://www.securitytracker.com/id/1037488"},{"type":"WEB","url":"https://www.exploit-db.com/exploits/40920/"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2017-0211.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2017-0212.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2017-0213.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2017-0214.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2017-0258.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2017-0259.html"},{"type":"ADVISORY","url":"http://seclists.org/fulldisclosure/2016/Dec/57"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/94922"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201702-26"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201710-20"},{"type":"ADVISORY","url":"https://www.nagios.org/projects/nagios-core/history/4x/"},{"type":"EVIDENCE","url":"http://packetstormsecurity.com/files/140169/Nagios-Core-Curl-Command-Injection-Code-Execution.html"},{"type":"EVIDENCE","url":"https://legalhackers.com/advisories/Nagios-Exploit-Command-Injection-CVE-2016-9565-2008-4796.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/nagiosenterprises/nagioscore","events":[{"introduced":"0"},{"last_affected":"290af75004de0d31a77a66d16b5688ab6a8a6664"}],"database_specific":{"cpe":"cpe:2.3:a:nagios:nagios:*:*:*:*:*:*:*:*","extracted_events":[{"introduced":"0"},{"last_affected":"4.2.1"}],"source":"CPE_FIELD"}}],"versions":["nagios-1.0a6","nagios-1.0a7","nagios-1.0b1","nagios-1.0b2","nagios-1.0b3","nagios-1.0b4","nagios-1.0b5","nagios-1.0b6","nagios-2.0","nagios-2.0.b5","nagios-2.0b1","nagios-2.0b2","nagios-2.0b3","nagios-2.0b4","nagios-2.0b6","nagios-2.0rc1","nagios-3.0","nagios-3.0.1","nagios-3.0.2","nagios-3.0.3","nagios-3.0.4","nagios-3.0.5","nagios-3.0.6","nagios-3.0a1","nagios-3.0a2","nagios-3.0a3","nagios-3.0a4","nagios-3.0a5","nagios-3.0b1","nagios-3.0b2","nagios-3.0b3","nagios-3.0b4","nagios-3.0b5","nagios-3.0b6","nagios-3.0b7","nagios-3.0rc1","nagios-3.0rc2","nagios-3.0rc3","nagios-3.1.0","nagios-3.1.1","nagios-3.1.2","nagios-3.2.0","nagios-3.2.1","nagios-3.2.2","nagios-3.2.3","nagios-3.3.1","nagios-3.4.0","nagios-3.4.1","nagios-4.0.0","nagios-4.0.0-beta1","nagios-4.0.0-beta2","nagios-4.0.0-beta3","nagios-4.0.0-beta4","nagios-4.0.4","nagios-4.0.5","nagios-4.0.6","nagios-4.1.0","nagios-4.1.0rc2","nagios-4.1.1","nagios-4.2.1","nagios-4.2.3","release-4.2.3"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-9565.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}