The ability to run arbitrary commands may allow an attacker to escalate privileges by escalating other vulnerabilities in the system, as that user. Note that the commands are executed as the user running the Netdata Agent.
By providing a specially crafted `registry_hostname` as part of the health data that is streamed to a Netdata (parent) agent, an attacker can execute arbitrary commands at the remote host as a side-effect of the raised alert. One of them is the `registry_hostname` of the node for which the alert is raised. This command is populated with several arguments that are not sanitized. This function performs different checks and then enqueues a command by calling `spawn_enq_cmd`. When an alert is triggered, the function `health_alarm_execute` is called. An attacker with the ability to establish a streaming connection can execute arbitrary commands on the targeted Netdata agent.
Netdata is an open source option for real-time infrastructure monitoring and troubleshooting. NET templating engine mono/t4, which can execute code. If one provides a file with the extension. This yields the possibility of including local files, as well as remote files on SMB shares.
A user-controllable path is handed to a path-concatenation method (Path.Combine from. It spawns a web interface listening on port 8088. Kardex Mlog MCC 5.7.12+0-a203c2a213-master allows remote code execution.