Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-60424 PoC — Nagios Fusion 安全漏洞

Source
Associated Vulnerability
Title:Nagios Fusion 安全漏洞 (CVE-2025-60424)
Description:A lack of rate limiting in the OTP verification component of Nagios Fusion v2024R1.2 and v2024R2 allows attackers to bypass authentication via a bruteforce attack.
Readme
# 2FA Bypass Using a Brute Force Attack

## Overview
The Nagios Fusion application (version 2024R1.2 and 2024R2) is vulnerable to a Brute-Force attack on its Two-Factor Authentication (2FA) mechanism. Specifically, the 2FA implementation does not adequately enforce rate-limiting or account lockout mechanisms, allowing an attacker to bypass 2FA by repeatedly guessing the One-Time Password (OTP).

**The following issues were observed:**
- **Lack of Rate-Limiting**: The 2FA endpoint does not limit the number of OTP submission attempts.
- **Weak Lockout Policy**: No account lockout is triggered after repeated failed OTP attempts, enabling brute-force attacks to succeed.
- **Potential for Unauthorized Access**: With sufficient computational resources, an attacker could bypass 2FA and gain unauthorized access to sensitive accounts, including administrator accounts.

*This vulnerability stems from the absence of proper defences against brute-force attacks, rendering the 2FA mechanism ineffective against targeted attacks.*

## Severity
- **Severity**: High
- **CWE**: CWE-307 (primary); CWE-287 (secondary)
- **CVSS Score (v3.0)**: 7.6 High
- **CVSS Vector**: AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L

## Affected Components
- 2FA Verification Endpoint (e.g., /verify-otp)
- Authentication Middleware
- Session Issuance Service
- Rate Limiting / Anti-Automation Controls

## Affected Vendor/Product
- **Product Name**- Nagios Fusion
- **Affected Version**: 2024R1.2 and 2024R2
- **Fixed Version**: 2024R2.1

## Summary of the Issue
**What Happens:**
1. User attempts login with valid username and password.
2. System prompts for OTP from authenticator app/SMS/email.
3. Attacker scripts automated requests to /verify-otp endpoint.
4. Due to lack of rate limiting and lockout, attacker can attempt unlimited guesses.
5. Within feasible time, attacker predicts correct OTP and bypasses 2FA.

**Security Posture Gap**:
2FA is meant to increase entropy and reduce brute-force feasibility. Without proper anti-automation controls, OTP becomes brute-forceable, negating the second factor.

**Abuse Scenarios**:
- Automated credential stuffing + brute-force OTP to achieve mass account takeover.
- Targeted attack against high-value accounts where password was phished or leaked.

## Mitigation Recommendations
- Enforce strict rate limiting per account/IP/device for OTP attempts.
- Lock account after N failed OTP attempts and require re-authentication.
- Introduce back-off delays (e.g., exponential) on repeated failures.

## Disclosure Timeline
- **[05-01-2025]**: Vulnerability discovered  
- **[05-01-2025]**: Reported to vendor  
- **[10-01-2025]**: Vendor verified the vulnerability
- **[23-07-2025]**: Vendor patched the vulnerability with a new release
- **[16-08-2025]**: Apply For CVE
- **[23-10-2025]**: Assign CVE

  ---
📌 *This repository is intended solely for vulnerability reporting and CVE reference.*
File Snapshot

[4.0K] /data/pocs/3dad2cb8410c4ea625b26bd7bfabea8ee61e290c └── [2.9K] README.md 1 directory, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →