Nagios XI versions prior to 2024R1.1.3 did not invalidate all other active sessions for a user when that users password was changed. As a result, any pre-existing sessions (including those potentially controlled by an attacker) remained valid after a credential update. This insufficient session expiration could allow continued unauthorized access to user data and actions even after a password change.
According to WASC, “Insufficient Session Expiration is when a web site permits an attacker to reuse old session credentials or session IDs for authorization.”
| Name | Vendor | Start Version | End Version |
|---|---|---|---|
| Nagios_xi | Nagios | * | 2024 (excluding) |
| Nagios_xi | Nagios | 2024-r1 (including) | 2024-r1 (including) |
| Nagios_xi | Nagios | 2024-r1.0.1 (including) | 2024-r1.0.1 (including) |
| Nagios_xi | Nagios | 2024-r1.0.2 (including) | 2024-r1.0.2 (including) |
| Nagios_xi | Nagios | 2024-r1.1 (including) | 2024-r1.1 (including) |
| Nagios_xi | Nagios | 2024-r1.1.1 (including) | 2024-r1.1.1 (including) |
| Nagios_xi | Nagios | 2024-r1.1.2 (including) | 2024-r1.1.2 (including) |