Safe way of exposing this information to Nagios
-
We manage a large number of custom WordPress sites, each with their own update cycles and their own sets of plugins. It would be extremely helpful to be able to monitor, from our central Nagios server, which of them have critical out of date plugins. We already have a custom Nagios task to check the version of WordPress itself against the most recently reported critical vulnerability.
That said, making this information visible to the general public would be a bad thing. I’m generally not of the school that believes in obscuring what server technology you’re using, on the grounds that attackers generally don’t care. But publishing a nice tidy list of the specific vulnerabilities you’re subject to can’t be a good thing.
The Nagios agent runs on the machine itself as a system user without any WordPress credentials, so it can’t normally see anything in
wp-admin
. So can you think of a safe way of making the vulnerabilities in this accessible to Nagios?
- The topic ‘Safe way of exposing this information to Nagios’ is closed to new replies.