All the vulnerabilites related to icinga - icinga
cve-2018-6534
Vulnerability from cvelistv5
Published
2018-02-27 19:00
Modified
2024-08-05 06:10
Severity ?
EPSS score ?
Summary
An issue was discovered in Icinga 2.x through 2.8.1. By sending specially crafted messages, an attacker can cause a NULL pointer dereference, which can cause the product to crash.
References
▼ | URL | Tags |
---|---|---|
https://github.com/Icinga/icinga2/pull/6104 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T06:10:10.126Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/Icinga/icinga2/pull/6104" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2018-02-20T00:00:00", "descriptions": [ { "lang": "en", "value": "An issue was discovered in Icinga 2.x through 2.8.1. By sending specially crafted messages, an attacker can cause a NULL pointer dereference, which can cause the product to crash." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-02-27T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/Icinga/icinga2/pull/6104" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-6534", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in Icinga 2.x through 2.8.1. By sending specially crafted messages, an attacker can cause a NULL pointer dereference, which can cause the product to crash." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/Icinga/icinga2/pull/6104", "refsource": "CONFIRM", "url": "https://github.com/Icinga/icinga2/pull/6104" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-6534", "datePublished": "2018-02-27T19:00:00", "dateReserved": "2018-02-02T00:00:00", "dateUpdated": "2024-08-05T06:10:10.126Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-6532
Vulnerability from cvelistv5
Published
2018-02-27 19:00
Modified
2024-08-05 06:10
Severity ?
EPSS score ?
Summary
An issue was discovered in Icinga 2.x through 2.8.1. By sending specially crafted (authenticated and unauthenticated) requests, an attacker can exhaust a lot of memory on the server side, triggering the OOM killer.
References
▼ | URL | Tags |
---|---|---|
https://github.com/Icinga/icinga2/pull/6103 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T06:10:10.130Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/Icinga/icinga2/pull/6103" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2018-02-20T00:00:00", "descriptions": [ { "lang": "en", "value": "An issue was discovered in Icinga 2.x through 2.8.1. By sending specially crafted (authenticated and unauthenticated) requests, an attacker can exhaust a lot of memory on the server side, triggering the OOM killer." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-02-27T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/Icinga/icinga2/pull/6103" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-6532", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in Icinga 2.x through 2.8.1. By sending specially crafted (authenticated and unauthenticated) requests, an attacker can exhaust a lot of memory on the server side, triggering the OOM killer." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/Icinga/icinga2/pull/6103", "refsource": "CONFIRM", "url": "https://github.com/Icinga/icinga2/pull/6103" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-6532", "datePublished": "2018-02-27T19:00:00", "dateReserved": "2018-02-02T00:00:00", "dateUpdated": "2024-08-05T06:10:10.130Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-32739
Vulnerability from cvelistv5
Published
2021-07-15 14:55
Modified
2024-08-03 23:33
Severity ?
EPSS score ?
Summary
Icinga is a monitoring system which checks the availability of network resources, notifies users of outages, and generates performance data for reporting. From version 2.4.0 through version 2.12.4, a vulnerability exists that may allow privilege escalation for authenticated API users. With a read-ony user's credentials, an attacker can view most attributes of all config objects including `ticket_salt` of `ApiListener`. This salt is enough to compute a ticket for every possible common name (CN). A ticket, the master node's certificate, and a self-signed certificate are enough to successfully request the desired certificate from Icinga. That certificate may in turn be used to steal an endpoint or API user's identity. Versions 2.12.5 and 2.11.10 both contain a fix the vulnerability. As a workaround, one may either specify queryable types explicitly or filter out ApiListener objects.
References
▼ | URL | Tags |
---|---|---|
https://github.com/Icinga/icinga2/security/advisories/GHSA-98wp-jc6q-x5q5 | x_refsource_CONFIRM | |
https://icinga.com/blog/2021/07/02/releasing-icinga-2-12-5-2-11-10/ | x_refsource_MISC | |
https://lists.debian.org/debian-lts-announce/2021/11/msg00010.html | mailing-list, x_refsource_MLIST |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:33:55.502Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/Icinga/icinga2/security/advisories/GHSA-98wp-jc6q-x5q5" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://icinga.com/blog/2021/07/02/releasing-icinga-2-12-5-2-11-10/" }, { "name": "[debian-lts-announce] 20211110 [SECURITY] [DLA 2816-1] icinga2 security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00010.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "icinga2", "vendor": "Icinga", "versions": [ { "status": "affected", "version": "\u003e= 2.4.0, \u003c= 2.12.4" } ] } ], "descriptions": [ { "lang": "en", "value": "Icinga is a monitoring system which checks the availability of network resources, notifies users of outages, and generates performance data for reporting. From version 2.4.0 through version 2.12.4, a vulnerability exists that may allow privilege escalation for authenticated API users. With a read-ony user\u0027s credentials, an attacker can view most attributes of all config objects including `ticket_salt` of `ApiListener`. This salt is enough to compute a ticket for every possible common name (CN). A ticket, the master node\u0027s certificate, and a self-signed certificate are enough to successfully request the desired certificate from Icinga. That certificate may in turn be used to steal an endpoint or API user\u0027s identity. Versions 2.12.5 and 2.11.10 both contain a fix the vulnerability. As a workaround, one may either specify queryable types explicitly or filter out ApiListener objects." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-267", "description": "CWE-267: Privilege Defined With Unsafe Actions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-10T23:06:12", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/Icinga/icinga2/security/advisories/GHSA-98wp-jc6q-x5q5" }, { "tags": [ "x_refsource_MISC" ], "url": "https://icinga.com/blog/2021/07/02/releasing-icinga-2-12-5-2-11-10/" }, { "name": "[debian-lts-announce] 20211110 [SECURITY] [DLA 2816-1] icinga2 security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00010.html" } ], "source": { "advisory": "GHSA-98wp-jc6q-x5q5", "discovery": "UNKNOWN" }, "title": "Results of queries for ApiListener objects include the ticket salt which allows in turn to steal (more privileged) identities", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-32739", "STATE": "PUBLIC", "TITLE": "Results of queries for ApiListener objects include the ticket salt which allows in turn to steal (more privileged) identities" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "icinga2", "version": { "version_data": [ { "version_value": "\u003e= 2.4.0, \u003c= 2.12.4" } ] } } ] }, "vendor_name": "Icinga" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Icinga is a monitoring system which checks the availability of network resources, notifies users of outages, and generates performance data for reporting. From version 2.4.0 through version 2.12.4, a vulnerability exists that may allow privilege escalation for authenticated API users. With a read-ony user\u0027s credentials, an attacker can view most attributes of all config objects including `ticket_salt` of `ApiListener`. This salt is enough to compute a ticket for every possible common name (CN). A ticket, the master node\u0027s certificate, and a self-signed certificate are enough to successfully request the desired certificate from Icinga. That certificate may in turn be used to steal an endpoint or API user\u0027s identity. Versions 2.12.5 and 2.11.10 both contain a fix the vulnerability. As a workaround, one may either specify queryable types explicitly or filter out ApiListener objects." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-267: Privilege Defined With Unsafe Actions" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/Icinga/icinga2/security/advisories/GHSA-98wp-jc6q-x5q5", "refsource": "CONFIRM", "url": "https://github.com/Icinga/icinga2/security/advisories/GHSA-98wp-jc6q-x5q5" }, { "name": "https://icinga.com/blog/2021/07/02/releasing-icinga-2-12-5-2-11-10/", "refsource": "MISC", "url": "https://icinga.com/blog/2021/07/02/releasing-icinga-2-12-5-2-11-10/" }, { "name": "[debian-lts-announce] 20211110 [SECURITY] [DLA 2816-1] icinga2 security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00010.html" } ] }, "source": { "advisory": "GHSA-98wp-jc6q-x5q5", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-32739", "datePublished": "2021-07-15T14:55:11", "dateReserved": "2021-05-12T00:00:00", "dateUpdated": "2024-08-03T23:33:55.502Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-16882
Vulnerability from cvelistv5
Published
2017-11-18 18:00
Modified
2024-08-05 20:35
Severity ?
EPSS score ?
Summary
Icinga Core through 1.14.0 initially executes bin/icinga as root but supports configuration options in which this file is owned by a non-root account (and similarly can have etc/icinga.cfg owned by a non-root account), which allows local users to gain privileges by leveraging access to this non-root account, a related issue to CVE-2017-14312. This also affects bin/icingastats, bin/ido2db, and bin/log2ido.
References
▼ | URL | Tags |
---|---|---|
https://github.com/Icinga/icinga-core/issues/1601 | x_refsource_MISC | |
https://security.gentoo.org/glsa/202007-31 | vendor-advisory, x_refsource_GENTOO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T20:35:21.361Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/Icinga/icinga-core/issues/1601" }, { "name": "GLSA-202007-31", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202007-31" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2017-11-18T00:00:00", "descriptions": [ { "lang": "en", "value": "Icinga Core through 1.14.0 initially executes bin/icinga as root but supports configuration options in which this file is owned by a non-root account (and similarly can have etc/icinga.cfg owned by a non-root account), which allows local users to gain privileges by leveraging access to this non-root account, a related issue to CVE-2017-14312. This also affects bin/icingastats, bin/ido2db, and bin/log2ido." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-07-27T01:06:31", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/Icinga/icinga-core/issues/1601" }, { "name": "GLSA-202007-31", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/202007-31" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-16882", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Icinga Core through 1.14.0 initially executes bin/icinga as root but supports configuration options in which this file is owned by a non-root account (and similarly can have etc/icinga.cfg owned by a non-root account), which allows local users to gain privileges by leveraging access to this non-root account, a related issue to CVE-2017-14312. This also affects bin/icingastats, bin/ido2db, and bin/log2ido." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/Icinga/icinga-core/issues/1601", "refsource": "MISC", "url": "https://github.com/Icinga/icinga-core/issues/1601" }, { "name": "GLSA-202007-31", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202007-31" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-16882", "datePublished": "2017-11-18T18:00:00", "dateReserved": "2017-11-18T00:00:00", "dateUpdated": "2024-08-05T20:35:21.361Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-6533
Vulnerability from cvelistv5
Published
2018-02-27 19:00
Modified
2024-08-05 06:10
Severity ?
EPSS score ?
Summary
An issue was discovered in Icinga 2.x through 2.8.1. By editing the init.conf file, Icinga 2 can be run as root. Following this the program can be used to run arbitrary code as root. This was fixed by no longer using init.conf to determine account information for any root-executed code (a larger issue than CVE-2017-16933).
References
▼ | URL | Tags |
---|---|---|
https://github.com/Icinga/icinga2/pull/5850 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T06:10:10.143Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/Icinga/icinga2/pull/5850" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2018-02-20T00:00:00", "descriptions": [ { "lang": "en", "value": "An issue was discovered in Icinga 2.x through 2.8.1. By editing the init.conf file, Icinga 2 can be run as root. Following this the program can be used to run arbitrary code as root. This was fixed by no longer using init.conf to determine account information for any root-executed code (a larger issue than CVE-2017-16933)." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-03-01T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/Icinga/icinga2/pull/5850" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-6533", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in Icinga 2.x through 2.8.1. By editing the init.conf file, Icinga 2 can be run as root. Following this the program can be used to run arbitrary code as root. This was fixed by no longer using init.conf to determine account information for any root-executed code (a larger issue than CVE-2017-16933)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/Icinga/icinga2/pull/5850", "refsource": "CONFIRM", "url": "https://github.com/Icinga/icinga2/pull/5850" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-6533", "datePublished": "2018-02-27T19:00:00", "dateReserved": "2018-02-02T00:00:00", "dateUpdated": "2024-08-05T06:10:10.143Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-2179
Vulnerability from cvelistv5
Published
2011-06-14 17:00
Modified
2024-08-06 22:53
Severity ?
EPSS score ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in config.c in config.cgi in (1) Nagios 3.2.3 and (2) Icinga before 1.4.1 allow remote attackers to inject arbitrary web script or HTML via the expand parameter, as demonstrated by an (a) command action or a (b) hosts action.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T22:53:17.162Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20110601 Cross-Site Scripting vulnerability in Nagios", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2011-06/0018.html" }, { "name": "icinga-expand-xss(67797)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67797" }, { "name": "8274", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/8274" }, { "name": "48087", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/48087" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=709871" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://tracker.nagios.org/view.php?id=224" }, { "name": "[oss-security] 20110601 CVE request: XSS in nagios", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2011/06/01/10" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.rul3z.de/advisories/SSCHADV2011-006.txt" }, { "name": "[oss-security] 20110602 Re: CVE request: XSS in nagios", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2011/06/02/6" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://dev.icinga.org/issues/1605" }, { "name": "44974", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/44974" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.rul3z.de/advisories/SSCHADV2011-005.txt" }, { "name": "USN-1151-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "http://www.ubuntu.com/usn/USN-1151-1" }, { "name": "20110601 Cross-Site Scripting vulnerability in Icinga", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2011-06/0017.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-06-01T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in config.c in config.cgi in (1) Nagios 3.2.3 and (2) Icinga before 1.4.1 allow remote attackers to inject arbitrary web script or HTML via the expand parameter, as demonstrated by an (a) command action or a (b) hosts action." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "20110601 Cross-Site Scripting vulnerability in Nagios", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2011-06/0018.html" }, { "name": "icinga-expand-xss(67797)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67797" }, { "name": "8274", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/8274" }, { "name": "48087", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/48087" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=709871" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://tracker.nagios.org/view.php?id=224" }, { "name": "[oss-security] 20110601 CVE request: XSS in nagios", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2011/06/01/10" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.rul3z.de/advisories/SSCHADV2011-006.txt" }, { "name": "[oss-security] 20110602 Re: CVE request: XSS in nagios", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2011/06/02/6" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://dev.icinga.org/issues/1605" }, { "name": "44974", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/44974" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.rul3z.de/advisories/SSCHADV2011-005.txt" }, { "name": "USN-1151-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "http://www.ubuntu.com/usn/USN-1151-1" }, { "name": "20110601 Cross-Site Scripting vulnerability in Icinga", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2011-06/0017.html" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2011-2179", "datePublished": "2011-06-14T17:00:00", "dateReserved": "2011-05-31T00:00:00", "dateUpdated": "2024-08-06T22:53:17.162Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37698
Vulnerability from cvelistv5
Published
2021-08-19 13:55
Modified
2024-08-04 01:23
Severity ?
EPSS score ?
Summary
Icinga is a monitoring system which checks the availability of network resources, notifies users of outages, and generates performance data for reporting. In versions 2.5.0 through 2.13.0, ElasticsearchWriter, GelfWriter, InfluxdbWriter and Influxdb2Writer do not verify the server's certificate despite a certificate authority being specified. Icinga 2 instances which connect to any of the mentioned time series databases (TSDBs) using TLS over a spoofable infrastructure should immediately upgrade to version 2.13.1, 2.12.6, or 2.11.11 to patch the issue. Such instances should also change the credentials (if any) used by the TSDB writer feature to authenticate against the TSDB. There are no workarounds aside from upgrading.
References
▼ | URL | Tags |
---|---|---|
https://github.com/Icinga/icinga2/security/advisories/GHSA-cxfm-8j5v-5qr2 | x_refsource_CONFIRM | |
https://github.com/Icinga/icinga2/releases/tag/v2.11.11 | x_refsource_MISC | |
https://github.com/Icinga/icinga2/releases/tag/v2.12.6 | x_refsource_MISC | |
https://github.com/Icinga/icinga2/releases/tag/v2.13.1 | x_refsource_MISC | |
https://lists.debian.org/debian-lts-announce/2021/11/msg00010.html | mailing-list, x_refsource_MLIST |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:23:01.505Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/Icinga/icinga2/security/advisories/GHSA-cxfm-8j5v-5qr2" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/Icinga/icinga2/releases/tag/v2.11.11" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/Icinga/icinga2/releases/tag/v2.12.6" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/Icinga/icinga2/releases/tag/v2.13.1" }, { "name": "[debian-lts-announce] 20211110 [SECURITY] [DLA 2816-1] icinga2 security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00010.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "icinga2", "vendor": "Icinga", "versions": [ { "status": "affected", "version": "\u003e= 2.5.0, \u003c= 2.13.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Icinga is a monitoring system which checks the availability of network resources, notifies users of outages, and generates performance data for reporting. In versions 2.5.0 through 2.13.0, ElasticsearchWriter, GelfWriter, InfluxdbWriter and Influxdb2Writer do not verify the server\u0027s certificate despite a certificate authority being specified. Icinga 2 instances which connect to any of the mentioned time series databases (TSDBs) using TLS over a spoofable infrastructure should immediately upgrade to version 2.13.1, 2.12.6, or 2.11.11 to patch the issue. Such instances should also change the credentials (if any) used by the TSDB writer feature to authenticate against the TSDB. There are no workarounds aside from upgrading." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-295", "description": "CWE-295: Improper Certificate Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-10T23:06:10", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/Icinga/icinga2/security/advisories/GHSA-cxfm-8j5v-5qr2" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/Icinga/icinga2/releases/tag/v2.11.11" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/Icinga/icinga2/releases/tag/v2.12.6" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/Icinga/icinga2/releases/tag/v2.13.1" }, { "name": "[debian-lts-announce] 20211110 [SECURITY] [DLA 2816-1] icinga2 security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00010.html" } ], "source": { "advisory": "GHSA-cxfm-8j5v-5qr2", "discovery": "UNKNOWN" }, "title": "Missing TLS service certificate validation in GelfWriter, ElasticsearchWriter, InfluxdbWriter and Influxdb2Writer", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-37698", "STATE": "PUBLIC", "TITLE": "Missing TLS service certificate validation in GelfWriter, ElasticsearchWriter, InfluxdbWriter and Influxdb2Writer" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "icinga2", "version": { "version_data": [ { "version_value": "\u003e= 2.5.0, \u003c= 2.13.0" } ] } } ] }, "vendor_name": "Icinga" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Icinga is a monitoring system which checks the availability of network resources, notifies users of outages, and generates performance data for reporting. In versions 2.5.0 through 2.13.0, ElasticsearchWriter, GelfWriter, InfluxdbWriter and Influxdb2Writer do not verify the server\u0027s certificate despite a certificate authority being specified. Icinga 2 instances which connect to any of the mentioned time series databases (TSDBs) using TLS over a spoofable infrastructure should immediately upgrade to version 2.13.1, 2.12.6, or 2.11.11 to patch the issue. Such instances should also change the credentials (if any) used by the TSDB writer feature to authenticate against the TSDB. There are no workarounds aside from upgrading." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-295: Improper Certificate Validation" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/Icinga/icinga2/security/advisories/GHSA-cxfm-8j5v-5qr2", "refsource": "CONFIRM", "url": "https://github.com/Icinga/icinga2/security/advisories/GHSA-cxfm-8j5v-5qr2" }, { "name": "https://github.com/Icinga/icinga2/releases/tag/v2.11.11", "refsource": "MISC", "url": "https://github.com/Icinga/icinga2/releases/tag/v2.11.11" }, { "name": "https://github.com/Icinga/icinga2/releases/tag/v2.12.6", "refsource": "MISC", "url": "https://github.com/Icinga/icinga2/releases/tag/v2.12.6" }, { "name": "https://github.com/Icinga/icinga2/releases/tag/v2.13.1", "refsource": "MISC", "url": "https://github.com/Icinga/icinga2/releases/tag/v2.13.1" }, { "name": "[debian-lts-announce] 20211110 [SECURITY] [DLA 2816-1] icinga2 security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00010.html" } ] }, "source": { "advisory": "GHSA-cxfm-8j5v-5qr2", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-37698", "datePublished": "2021-08-19T13:55:10", "dateReserved": "2021-07-29T00:00:00", "dateUpdated": "2024-08-04T01:23:01.505Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-1878
Vulnerability from cvelistv5
Published
2014-02-28 15:00
Modified
2024-08-06 09:58
Severity ?
EPSS score ?
Summary
Stack-based buffer overflow in the cmd_submitf function in cgi/cmd.c in Nagios Core, possibly 4.0.3rc1 and earlier, and Icinga before 1.8.6, 1.9 before 1.9.5, and 1.10 before 1.10.3 allows remote attackers to cause a denial of service (segmentation fault) via a long message to cmd.cgi.
References
▼ | URL | Tags |
---|---|---|
http://lists.opensuse.org/opensuse-updates/2014-04/msg00033.html | vendor-advisory, x_refsource_SUSE | |
https://dev.icinga.org/issues/5434 | x_refsource_CONFIRM | |
https://www.icinga.org/2014/02/11/bugfix-releases-1-10-3-1-9-5-1-8-6 | x_refsource_CONFIRM | |
https://bugzilla.redhat.com/show_bug.cgi?id=1066578 | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/65605 | vdb-entry, x_refsource_BID | |
https://lists.debian.org/debian-lts-announce/2018/12/msg00014.html | mailing-list, x_refsource_MLIST | |
http://secunia.com/advisories/57024 | third-party-advisory, x_refsource_SECUNIA |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T09:58:16.149Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "openSUSE-SU-2014:0516", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-04/msg00033.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://dev.icinga.org/issues/5434" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.icinga.org/2014/02/11/bugfix-releases-1-10-3-1-9-5-1-8-6" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1066578" }, { "name": "65605", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/65605" }, { "name": "[debian-lts-announce] 20181224 [SECURITY] [DLA 1615-1] nagios3 security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2018/12/msg00014.html" }, { "name": "57024", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/57024" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-02-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in the cmd_submitf function in cgi/cmd.c in Nagios Core, possibly 4.0.3rc1 and earlier, and Icinga before 1.8.6, 1.9 before 1.9.5, and 1.10 before 1.10.3 allows remote attackers to cause a denial of service (segmentation fault) via a long message to cmd.cgi." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-12-25T10:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "openSUSE-SU-2014:0516", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-04/msg00033.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://dev.icinga.org/issues/5434" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.icinga.org/2014/02/11/bugfix-releases-1-10-3-1-9-5-1-8-6" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1066578" }, { "name": "65605", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/65605" }, { "name": "[debian-lts-announce] 20181224 [SECURITY] [DLA 1615-1] nagios3 security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2018/12/msg00014.html" }, { "name": "57024", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/57024" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-1878", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Stack-based buffer overflow in the cmd_submitf function in cgi/cmd.c in Nagios Core, possibly 4.0.3rc1 and earlier, and Icinga before 1.8.6, 1.9 before 1.9.5, and 1.10 before 1.10.3 allows remote attackers to cause a denial of service (segmentation fault) via a long message to cmd.cgi." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "openSUSE-SU-2014:0516", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2014-04/msg00033.html" }, { "name": "https://dev.icinga.org/issues/5434", "refsource": "CONFIRM", "url": "https://dev.icinga.org/issues/5434" }, { "name": "https://www.icinga.org/2014/02/11/bugfix-releases-1-10-3-1-9-5-1-8-6", "refsource": "CONFIRM", "url": "https://www.icinga.org/2014/02/11/bugfix-releases-1-10-3-1-9-5-1-8-6" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1066578", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1066578" }, { "name": "65605", "refsource": "BID", "url": "http://www.securityfocus.com/bid/65605" }, { "name": "[debian-lts-announce] 20181224 [SECURITY] [DLA 1615-1] nagios3 security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2018/12/msg00014.html" }, { "name": "57024", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/57024" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-1878", "datePublished": "2014-02-28T15:00:00", "dateReserved": "2014-02-06T00:00:00", "dateUpdated": "2024-08-06T09:58:16.149Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-32747
Vulnerability from cvelistv5
Published
2021-07-12 22:50
Modified
2024-08-03 23:33
Severity ?
EPSS score ?
Summary
Icinga Web 2 is an open source monitoring web interface, framework, and command-line interface. A vulnerability in which custom variables are exposed to unauthorized users exists between versions 2.0.0 and 2.8.2. Custom variables are user-defined keys and values on configuration objects in Icinga 2. These are commonly used to reference secrets in other configurations such as check commands to be able to authenticate with a service being checked. Icinga Web 2 displays these custom variables to logged in users with access to said hosts or services. In order to protect the secrets from being visible to anyone, it's possible to setup protection rules and blacklists in a user's role. Protection rules result in `***` being shown instead of the original value, the key will remain. Backlists will hide a custom variable entirely from the user. Besides using the UI, custom variables can also be accessed differently by using an undocumented URL parameter. By adding a parameter to the affected routes, Icinga Web 2 will show these columns additionally in the respective list. This parameter is also respected when exporting to JSON or CSV. Protection rules and blacklists however have no effect in this case. Custom variables are shown as-is in the result. The issue has been fixed in the 2.9.0, 2.8.3, and 2.7.5 releases. As a workaround, one may set up a restriction to hide hosts and services with the custom variable in question.
References
▼ | URL | Tags |
---|---|---|
https://github.com/Icinga/icingaweb2/releases/tag/v2.7.5 | x_refsource_MISC | |
https://github.com/Icinga/icingaweb2/releases/tag/v2.8.3 | x_refsource_MISC | |
https://github.com/Icinga/icingaweb2/releases/tag/v2.9.0 | x_refsource_MISC | |
https://github.com/Icinga/icingaweb2/security/advisories/GHSA-2xv9-886q-p7xx | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Icinga | icingaweb2 |
Version: >= 2.0.0, <= 2.8.2 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:33:55.787Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/Icinga/icingaweb2/releases/tag/v2.7.5" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/Icinga/icingaweb2/releases/tag/v2.8.3" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/Icinga/icingaweb2/releases/tag/v2.9.0" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/Icinga/icingaweb2/security/advisories/GHSA-2xv9-886q-p7xx" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "icingaweb2", "vendor": "Icinga", "versions": [ { "status": "affected", "version": "\u003e= 2.0.0, \u003c= 2.8.2" } ] } ], "descriptions": [ { "lang": "en", "value": "Icinga Web 2 is an open source monitoring web interface, framework, and command-line interface. A vulnerability in which custom variables are exposed to unauthorized users exists between versions 2.0.0 and 2.8.2. Custom variables are user-defined keys and values on configuration objects in Icinga 2. These are commonly used to reference secrets in other configurations such as check commands to be able to authenticate with a service being checked. Icinga Web 2 displays these custom variables to logged in users with access to said hosts or services. In order to protect the secrets from being visible to anyone, it\u0027s possible to setup protection rules and blacklists in a user\u0027s role. Protection rules result in `***` being shown instead of the original value, the key will remain. Backlists will hide a custom variable entirely from the user. Besides using the UI, custom variables can also be accessed differently by using an undocumented URL parameter. By adding a parameter to the affected routes, Icinga Web 2 will show these columns additionally in the respective list. This parameter is also respected when exporting to JSON or CSV. Protection rules and blacklists however have no effect in this case. Custom variables are shown as-is in the result. The issue has been fixed in the 2.9.0, 2.8.3, and 2.7.5 releases. As a workaround, one may set up a restriction to hide hosts and services with the custom variable in question." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-07-12T22:50:11", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/Icinga/icingaweb2/releases/tag/v2.7.5" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/Icinga/icingaweb2/releases/tag/v2.8.3" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/Icinga/icingaweb2/releases/tag/v2.9.0" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/Icinga/icingaweb2/security/advisories/GHSA-2xv9-886q-p7xx" } ], "source": { "advisory": "GHSA-2xv9-886q-p7xx", "discovery": "UNKNOWN" }, "title": "Custom variable protection and blacklists can be circumvented", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-32747", "STATE": "PUBLIC", "TITLE": "Custom variable protection and blacklists can be circumvented" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "icingaweb2", "version": { "version_data": [ { "version_value": "\u003e= 2.0.0, \u003c= 2.8.2" } ] } } ] }, "vendor_name": "Icinga" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Icinga Web 2 is an open source monitoring web interface, framework, and command-line interface. A vulnerability in which custom variables are exposed to unauthorized users exists between versions 2.0.0 and 2.8.2. Custom variables are user-defined keys and values on configuration objects in Icinga 2. These are commonly used to reference secrets in other configurations such as check commands to be able to authenticate with a service being checked. Icinga Web 2 displays these custom variables to logged in users with access to said hosts or services. In order to protect the secrets from being visible to anyone, it\u0027s possible to setup protection rules and blacklists in a user\u0027s role. Protection rules result in `***` being shown instead of the original value, the key will remain. Backlists will hide a custom variable entirely from the user. Besides using the UI, custom variables can also be accessed differently by using an undocumented URL parameter. By adding a parameter to the affected routes, Icinga Web 2 will show these columns additionally in the respective list. This parameter is also respected when exporting to JSON or CSV. Protection rules and blacklists however have no effect in this case. Custom variables are shown as-is in the result. The issue has been fixed in the 2.9.0, 2.8.3, and 2.7.5 releases. As a workaround, one may set up a restriction to hide hosts and services with the custom variable in question." } ] }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-200: Exposure of Sensitive Information to an Unauthorized Actor" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/Icinga/icingaweb2/releases/tag/v2.7.5", "refsource": "MISC", "url": "https://github.com/Icinga/icingaweb2/releases/tag/v2.7.5" }, { "name": "https://github.com/Icinga/icingaweb2/releases/tag/v2.8.3", "refsource": "MISC", "url": "https://github.com/Icinga/icingaweb2/releases/tag/v2.8.3" }, { "name": "https://github.com/Icinga/icingaweb2/releases/tag/v2.9.0", "refsource": "MISC", "url": "https://github.com/Icinga/icingaweb2/releases/tag/v2.9.0" }, { "name": "https://github.com/Icinga/icingaweb2/security/advisories/GHSA-2xv9-886q-p7xx", "refsource": "CONFIRM", "url": "https://github.com/Icinga/icingaweb2/security/advisories/GHSA-2xv9-886q-p7xx" } ] }, "source": { "advisory": "GHSA-2xv9-886q-p7xx", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-32747", "datePublished": "2021-07-12T22:50:11", "dateReserved": "2021-05-12T00:00:00", "dateUpdated": "2024-08-03T23:33:55.787Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-7107
Vulnerability from cvelistv5
Published
2014-01-14 18:00
Modified
2024-08-06 18:01
Severity ?
EPSS score ?
Summary
Cross-site request forgery (CSRF) vulnerability in cmd.cgi in Icinga 1.8.5, 1.9.4, 1.10.2, and earlier allows remote attackers to hijack the authentication of users for unspecified commands via unspecified vectors, as demonstrated by bypassing authentication requirements for CVE-2013-7106.
References
▼ | URL | Tags |
---|---|---|
https://dev.icinga.org/issues/5346 | x_refsource_CONFIRM | |
http://lists.opensuse.org/opensuse-updates/2014-02/msg00061.html | vendor-advisory, x_refsource_SUSE | |
https://dev.icinga.org/issues/5250 | x_refsource_MISC | |
https://www.icinga.org/2013/12/17/icinga-security-releases-1-10-2-1-9-4-1-8-5/ | x_refsource_CONFIRM | |
http://www.openwall.com/lists/oss-security/2013/12/16/4 | mailing-list, x_refsource_MLIST |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T18:01:18.894Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://dev.icinga.org/issues/5346" }, { "name": "openSUSE-SU-2014:0269", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-02/msg00061.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://dev.icinga.org/issues/5250" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.icinga.org/2013/12/17/icinga-security-releases-1-10-2-1-9-4-1-8-5/" }, { "name": "[oss-security] 20131216 Fwd: Vulnerability (Buffer Overflow) in Icinga 1.8, 1.9 and 1.10 (Icinga Issue #5250) Vulnerability (Off-by-one memory access) in Icinga 1.8, 1.9 and 1.10 (Icinga Issue #5251)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2013/12/16/4" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-12-02T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site request forgery (CSRF) vulnerability in cmd.cgi in Icinga 1.8.5, 1.9.4, 1.10.2, and earlier allows remote attackers to hijack the authentication of users for unspecified commands via unspecified vectors, as demonstrated by bypassing authentication requirements for CVE-2013-7106." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2014-02-24T15:57:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://dev.icinga.org/issues/5346" }, { "name": "openSUSE-SU-2014:0269", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-02/msg00061.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://dev.icinga.org/issues/5250" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.icinga.org/2013/12/17/icinga-security-releases-1-10-2-1-9-4-1-8-5/" }, { "name": "[oss-security] 20131216 Fwd: Vulnerability (Buffer Overflow) in Icinga 1.8, 1.9 and 1.10 (Icinga Issue #5250) Vulnerability (Off-by-one memory access) in Icinga 1.8, 1.9 and 1.10 (Icinga Issue #5251)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2013/12/16/4" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2013-7107", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site request forgery (CSRF) vulnerability in cmd.cgi in Icinga 1.8.5, 1.9.4, 1.10.2, and earlier allows remote attackers to hijack the authentication of users for unspecified commands via unspecified vectors, as demonstrated by bypassing authentication requirements for CVE-2013-7106." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://dev.icinga.org/issues/5346", "refsource": "CONFIRM", "url": "https://dev.icinga.org/issues/5346" }, { "name": "openSUSE-SU-2014:0269", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2014-02/msg00061.html" }, { "name": "https://dev.icinga.org/issues/5250", "refsource": "MISC", "url": "https://dev.icinga.org/issues/5250" }, { "name": "https://www.icinga.org/2013/12/17/icinga-security-releases-1-10-2-1-9-4-1-8-5/", "refsource": "CONFIRM", "url": "https://www.icinga.org/2013/12/17/icinga-security-releases-1-10-2-1-9-4-1-8-5/" }, { "name": "[oss-security] 20131216 Fwd: Vulnerability (Buffer Overflow) in Icinga 1.8, 1.9 and 1.10 (Icinga Issue #5250) Vulnerability (Off-by-one memory access) in Icinga 1.8, 1.9 and 1.10 (Icinga Issue #5251)", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2013/12/16/4" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2013-7107", "datePublished": "2014-01-14T18:00:00", "dateReserved": "2013-12-15T00:00:00", "dateUpdated": "2024-08-06T18:01:18.894Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-16933
Vulnerability from cvelistv5
Published
2017-11-24 05:00
Modified
2024-08-05 20:43
Severity ?
EPSS score ?
Summary
etc/initsystem/prepare-dirs in Icinga 2.x through 2.8.1 has a chown call for a filename in a user-writable directory, which allows local users to gain privileges by leveraging access to the $ICINGA2_USER account for creation of a link.
References
▼ | URL | Tags |
---|---|---|
https://github.com/Icinga/icinga2/issues/5793 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T20:43:59.496Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/Icinga/icinga2/issues/5793" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2017-11-23T00:00:00", "descriptions": [ { "lang": "en", "value": "etc/initsystem/prepare-dirs in Icinga 2.x through 2.8.1 has a chown call for a filename in a user-writable directory, which allows local users to gain privileges by leveraging access to the $ICINGA2_USER account for creation of a link." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-03-14T13:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/Icinga/icinga2/issues/5793" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-16933", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "etc/initsystem/prepare-dirs in Icinga 2.x through 2.8.1 has a chown call for a filename in a user-writable directory, which allows local users to gain privileges by leveraging access to the $ICINGA2_USER account for creation of a link." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/Icinga/icinga2/issues/5793", "refsource": "MISC", "url": "https://github.com/Icinga/icinga2/issues/5793" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-16933", "datePublished": "2017-11-24T05:00:00", "dateReserved": "2017-11-23T00:00:00", "dateUpdated": "2024-08-05T20:43:59.496Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-7108
Vulnerability from cvelistv5
Published
2014-01-14 18:00
Modified
2024-08-06 18:01
Severity ?
EPSS score ?
Summary
Multiple off-by-one errors in Nagios Core 3.5.1, 4.0.2, and earlier, and Icinga before 1.8.5, 1.9 before 1.9.4, and 1.10 before 1.10.2 allow remote authenticated users to obtain sensitive information from process memory or cause a denial of service (crash) via a long string in the last key value in the variable list to the process_cgivars function in (1) avail.c, (2) cmd.c, (3) config.c, (4) extinfo.c, (5) histogram.c, (6) notifications.c, (7) outages.c, (8) status.c, (9) statusmap.c, (10) summary.c, and (11) trends.c in cgi/, which triggers a heap-based buffer over-read.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T18:01:19.334Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "MDVSA-2014:004", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:004" }, { "name": "openSUSE-SU-2014:0069", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00046.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://sourceforge.net/p/nagios/nagioscore/ci/d97e03f32741a7d851826b03ed73ff4c9612a866/" }, { "name": "56316", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/56316" }, { "name": "openSUSE-SU-2014:0097", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00068.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://dev.icinga.org/issues/5251" }, { "name": "[debian-lts-announce] 20181224 [SECURITY] [DLA 1615-1] nagios3 security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2018/12/msg00014.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.icinga.org/2013/12/17/icinga-security-releases-1-10-2-1-9-4-1-8-5/" }, { "name": "[oss-security] 20131224 Re: CVE request: denial of service in Nagios (process_cgivars())", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2013/12/24/1" }, { "name": "55976", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/55976" }, { "name": "64363", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/64363" }, { "name": "openSUSE-SU-2014:0016", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00010.html" }, { "name": "openSUSE-SU-2014:0039", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00028.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-12-02T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple off-by-one errors in Nagios Core 3.5.1, 4.0.2, and earlier, and Icinga before 1.8.5, 1.9 before 1.9.4, and 1.10 before 1.10.2 allow remote authenticated users to obtain sensitive information from process memory or cause a denial of service (crash) via a long string in the last key value in the variable list to the process_cgivars function in (1) avail.c, (2) cmd.c, (3) config.c, (4) extinfo.c, (5) histogram.c, (6) notifications.c, (7) outages.c, (8) status.c, (9) statusmap.c, (10) summary.c, and (11) trends.c in cgi/, which triggers a heap-based buffer over-read." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-12-25T10:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "MDVSA-2014:004", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:004" }, { "name": "openSUSE-SU-2014:0069", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00046.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://sourceforge.net/p/nagios/nagioscore/ci/d97e03f32741a7d851826b03ed73ff4c9612a866/" }, { "name": "56316", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/56316" }, { "name": "openSUSE-SU-2014:0097", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00068.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://dev.icinga.org/issues/5251" }, { "name": "[debian-lts-announce] 20181224 [SECURITY] [DLA 1615-1] nagios3 security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2018/12/msg00014.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.icinga.org/2013/12/17/icinga-security-releases-1-10-2-1-9-4-1-8-5/" }, { "name": "[oss-security] 20131224 Re: CVE request: denial of service in Nagios (process_cgivars())", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2013/12/24/1" }, { "name": "55976", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/55976" }, { "name": "64363", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/64363" }, { "name": "openSUSE-SU-2014:0016", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00010.html" }, { "name": "openSUSE-SU-2014:0039", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00028.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2013-7108", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple off-by-one errors in Nagios Core 3.5.1, 4.0.2, and earlier, and Icinga before 1.8.5, 1.9 before 1.9.4, and 1.10 before 1.10.2 allow remote authenticated users to obtain sensitive information from process memory or cause a denial of service (crash) via a long string in the last key value in the variable list to the process_cgivars function in (1) avail.c, (2) cmd.c, (3) config.c, (4) extinfo.c, (5) histogram.c, (6) notifications.c, (7) outages.c, (8) status.c, (9) statusmap.c, (10) summary.c, and (11) trends.c in cgi/, which triggers a heap-based buffer over-read." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "MDVSA-2014:004", "refsource": "MANDRIVA", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:004" }, { "name": "openSUSE-SU-2014:0069", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00046.html" }, { "name": "http://sourceforge.net/p/nagios/nagioscore/ci/d97e03f32741a7d851826b03ed73ff4c9612a866/", "refsource": "CONFIRM", "url": "http://sourceforge.net/p/nagios/nagioscore/ci/d97e03f32741a7d851826b03ed73ff4c9612a866/" }, { "name": "56316", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/56316" }, { "name": "openSUSE-SU-2014:0097", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00068.html" }, { "name": "https://dev.icinga.org/issues/5251", "refsource": "CONFIRM", "url": "https://dev.icinga.org/issues/5251" }, { "name": "[debian-lts-announce] 20181224 [SECURITY] [DLA 1615-1] nagios3 security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2018/12/msg00014.html" }, { "name": "https://www.icinga.org/2013/12/17/icinga-security-releases-1-10-2-1-9-4-1-8-5/", "refsource": "CONFIRM", "url": "https://www.icinga.org/2013/12/17/icinga-security-releases-1-10-2-1-9-4-1-8-5/" }, { "name": "[oss-security] 20131224 Re: CVE request: denial of service in Nagios (process_cgivars())", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2013/12/24/1" }, { "name": "55976", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/55976" }, { "name": "64363", "refsource": "BID", "url": "http://www.securityfocus.com/bid/64363" }, { "name": "openSUSE-SU-2014:0016", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00010.html" }, { "name": "openSUSE-SU-2014:0039", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00028.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2013-7108", "datePublished": "2014-01-14T18:00:00", "dateReserved": "2013-12-15T00:00:00", "dateUpdated": "2024-08-06T18:01:19.334Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-32746
Vulnerability from cvelistv5
Published
2021-07-12 22:25
Modified
2024-08-03 23:33
Severity ?
EPSS score ?
Summary
Icinga Web 2 is an open source monitoring web interface, framework and command-line interface. Between versions 2.3.0 and 2.8.2, the `doc` module of Icinga Web 2 allows to view documentation directly in the UI. It must be enabled manually by an administrator and users need explicit access permission to use it. Then, by visiting a certain route, it is possible to gain access to arbitrary files readable by the web-server user. The issue has been fixed in the 2.9.0, 2.8.3, and 2.7.5 releases. As a workaround, an administrator may disable the `doc` module or revoke permission to use it from all users.
References
▼ | URL | Tags |
---|---|---|
https://github.com/Icinga/icingaweb2/security/advisories/GHSA-cmgc-h4cx-3v43 | x_refsource_CONFIRM | |
https://github.com/Icinga/icingaweb2/releases/tag/v2.7.5 | x_refsource_MISC | |
https://github.com/Icinga/icingaweb2/releases/tag/v2.8.3 | x_refsource_MISC | |
https://github.com/Icinga/icingaweb2/releases/tag/v2.9.0 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Icinga | icingaweb2 |
Version: >= 2.3.0, <= 2.8.2 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:33:54.900Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/Icinga/icingaweb2/security/advisories/GHSA-cmgc-h4cx-3v43" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/Icinga/icingaweb2/releases/tag/v2.7.5" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/Icinga/icingaweb2/releases/tag/v2.8.3" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/Icinga/icingaweb2/releases/tag/v2.9.0" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "icingaweb2", "vendor": "Icinga", "versions": [ { "status": "affected", "version": "\u003e= 2.3.0, \u003c= 2.8.2" } ] } ], "descriptions": [ { "lang": "en", "value": "Icinga Web 2 is an open source monitoring web interface, framework and command-line interface. Between versions 2.3.0 and 2.8.2, the `doc` module of Icinga Web 2 allows to view documentation directly in the UI. It must be enabled manually by an administrator and users need explicit access permission to use it. Then, by visiting a certain route, it is possible to gain access to arbitrary files readable by the web-server user. The issue has been fixed in the 2.9.0, 2.8.3, and 2.7.5 releases. As a workaround, an administrator may disable the `doc` module or revoke permission to use it from all users." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-07-12T22:25:11", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/Icinga/icingaweb2/security/advisories/GHSA-cmgc-h4cx-3v43" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/Icinga/icingaweb2/releases/tag/v2.7.5" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/Icinga/icingaweb2/releases/tag/v2.8.3" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/Icinga/icingaweb2/releases/tag/v2.9.0" } ], "source": { "advisory": "GHSA-cmgc-h4cx-3v43", "discovery": "UNKNOWN" }, "title": "Possible path traversal by use of the `doc` module", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-32746", "STATE": "PUBLIC", "TITLE": "Possible path traversal by use of the `doc` module" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "icingaweb2", "version": { "version_data": [ { "version_value": "\u003e= 2.3.0, \u003c= 2.8.2" } ] } } ] }, "vendor_name": "Icinga" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Icinga Web 2 is an open source monitoring web interface, framework and command-line interface. Between versions 2.3.0 and 2.8.2, the `doc` module of Icinga Web 2 allows to view documentation directly in the UI. It must be enabled manually by an administrator and users need explicit access permission to use it. Then, by visiting a certain route, it is possible to gain access to arbitrary files readable by the web-server user. The issue has been fixed in the 2.9.0, 2.8.3, and 2.7.5 releases. As a workaround, an administrator may disable the `doc` module or revoke permission to use it from all users." } ] }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/Icinga/icingaweb2/security/advisories/GHSA-cmgc-h4cx-3v43", "refsource": "CONFIRM", "url": "https://github.com/Icinga/icingaweb2/security/advisories/GHSA-cmgc-h4cx-3v43" }, { "name": "https://github.com/Icinga/icingaweb2/releases/tag/v2.7.5", "refsource": "MISC", "url": "https://github.com/Icinga/icingaweb2/releases/tag/v2.7.5" }, { "name": "https://github.com/Icinga/icingaweb2/releases/tag/v2.8.3", "refsource": "MISC", "url": "https://github.com/Icinga/icingaweb2/releases/tag/v2.8.3" }, { "name": "https://github.com/Icinga/icingaweb2/releases/tag/v2.9.0", "refsource": "MISC", "url": "https://github.com/Icinga/icingaweb2/releases/tag/v2.9.0" } ] }, "source": { "advisory": "GHSA-cmgc-h4cx-3v43", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-32746", "datePublished": "2021-07-12T22:25:11", "dateReserved": "2021-05-12T00:00:00", "dateUpdated": "2024-08-03T23:33:54.900Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-24820
Vulnerability from cvelistv5
Published
2024-02-09 00:00
Modified
2024-08-01 23:28
Severity ?
EPSS score ?
Summary
Icinga Director is a tool designed to make Icinga 2 configuration handling easy. Not any of Icinga Director's configuration forms used to manipulate the monitoring environment are protected against cross site request forgery (CSRF). It enables attackers to perform changes in the monitoring environment managed by Icinga Director without the awareness of the victim. Users of the map module in version 1.x, should immediately upgrade to v2.0. The mentioned XSS vulnerabilities in Icinga Web are already fixed as well and upgrades to the most recent release of the 2.9, 2.10 or 2.11 branch must be performed if not done yet. Any later major release is also suitable. Icinga Director will receive minor updates to the 1.8, 1.9, 1.10 and 1.11 branches to remedy this issue. Upgrade immediately to a patched release. If that is not feasible, disable the director module for the time being.
References
▼ | URL | Tags |
---|---|---|
https://github.com/Icinga/icingaweb2-module-director/security/advisories/GHSA-3mwp-5p5v-j6q3 | x_refsource_CONFIRM | |
https://github.com/nbuchwitz/icingaweb2-module-map/pull/86 | x_refsource_MISC | |
https://blog.mozilla.org/en/mozilla/firefox-rolls-out-total-cookie-protection-by-default-to-all-users-worldwide/ | x_refsource_MISC | |
https://github.com/Icinga/icingaweb2/issues?q=is%3Aissue++is%3Aclosed+4979+4960+4947 | x_refsource_MISC | |
https://support.apple.com/en-is/guide/safari/sfri11471/16.0 | x_refsource_MISC | |
https://www.chromium.org/updates/same-site/ | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Icinga | icingaweb2-module-director |
Version: >=1.0.0, < 1.8.2 Version: >= 1.9.0, < 1.9.2 Version: >= 1.10.0, < 1.10.3 Version: >= 1.11.0, < 1.11.1 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T23:28:12.840Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "https://github.com/Icinga/icingaweb2-module-director/security/advisories/GHSA-3mwp-5p5v-j6q3", "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/Icinga/icingaweb2-module-director/security/advisories/GHSA-3mwp-5p5v-j6q3" }, { "name": "https://github.com/nbuchwitz/icingaweb2-module-map/pull/86", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nbuchwitz/icingaweb2-module-map/pull/86" }, { "name": "https://blog.mozilla.org/en/mozilla/firefox-rolls-out-total-cookie-protection-by-default-to-all-users-worldwide/", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://blog.mozilla.org/en/mozilla/firefox-rolls-out-total-cookie-protection-by-default-to-all-users-worldwide/" }, { "name": "https://github.com/Icinga/icingaweb2/issues?q=is%3Aissue++is%3Aclosed+4979+4960+4947", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/Icinga/icingaweb2/issues?q=is%3Aissue++is%3Aclosed+4979+4960+4947" }, { "name": "https://support.apple.com/en-is/guide/safari/sfri11471/16.0", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://support.apple.com/en-is/guide/safari/sfri11471/16.0" }, { "name": "https://www.chromium.org/updates/same-site/", "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.chromium.org/updates/same-site/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "icingaweb2-module-director", "vendor": "Icinga", "versions": [ { "status": "affected", "version": "\u003e=1.0.0, \u003c 1.8.2" }, { "status": "affected", "version": "\u003e= 1.9.0, \u003c 1.9.2" }, { "status": "affected", "version": "\u003e= 1.10.0, \u003c 1.10.3" }, { "status": "affected", "version": "\u003e= 1.11.0, \u003c 1.11.1" } ] } ], "descriptions": [ { "lang": "en", "value": "Icinga Director is a tool designed to make Icinga 2 configuration handling easy. Not any of Icinga Director\u0027s configuration forms used to manipulate the monitoring environment are protected against cross site request forgery (CSRF). It enables attackers to perform changes in the monitoring environment managed by Icinga Director without the awareness of the victim. Users of the map module in version 1.x, should immediately upgrade to v2.0. The mentioned XSS vulnerabilities in Icinga Web are already fixed as well and upgrades to the most recent release of the 2.9, 2.10 or 2.11 branch must be performed if not done yet. Any later major release is also suitable. Icinga Director will receive minor updates to the 1.8, 1.9, 1.10 and 1.11 branches to remedy this issue. Upgrade immediately to a patched release. If that is not feasible, disable the director module for the time being." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:L", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-352", "description": "CWE-352: Cross-Site Request Forgery (CSRF)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-09T00:00:00.692Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/Icinga/icingaweb2-module-director/security/advisories/GHSA-3mwp-5p5v-j6q3", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/Icinga/icingaweb2-module-director/security/advisories/GHSA-3mwp-5p5v-j6q3" }, { "name": "https://github.com/nbuchwitz/icingaweb2-module-map/pull/86", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nbuchwitz/icingaweb2-module-map/pull/86" }, { "name": "https://blog.mozilla.org/en/mozilla/firefox-rolls-out-total-cookie-protection-by-default-to-all-users-worldwide/", "tags": [ "x_refsource_MISC" ], "url": "https://blog.mozilla.org/en/mozilla/firefox-rolls-out-total-cookie-protection-by-default-to-all-users-worldwide/" }, { "name": "https://github.com/Icinga/icingaweb2/issues?q=is%3Aissue++is%3Aclosed+4979+4960+4947", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/Icinga/icingaweb2/issues?q=is%3Aissue++is%3Aclosed+4979+4960+4947" }, { "name": "https://support.apple.com/en-is/guide/safari/sfri11471/16.0", "tags": [ "x_refsource_MISC" ], "url": "https://support.apple.com/en-is/guide/safari/sfri11471/16.0" }, { "name": "https://www.chromium.org/updates/same-site/", "tags": [ "x_refsource_MISC" ], "url": "https://www.chromium.org/updates/same-site/" } ], "source": { "advisory": "GHSA-3mwp-5p5v-j6q3", "discovery": "UNKNOWN" }, "title": "Icinga Director configuration is susceptible to Cross-Site Request Forgery" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-24820", "datePublished": "2024-02-09T00:00:00.692Z", "dateReserved": "2024-01-31T16:28:17.943Z", "dateUpdated": "2024-08-01T23:28:12.840Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-29663
Vulnerability from cvelistv5
Published
2020-12-15 22:15
Modified
2024-08-04 16:55
Severity ?
EPSS score ?
Summary
Icinga 2 v2.8.0 through v2.11.7 and v2.12.2 has an issue where revoked certificates due for renewal will automatically be renewed, ignoring the CRL. This issue is fixed in Icinga 2 v2.11.8 and v2.12.3.
References
▼ | URL | Tags |
---|---|---|
https://github.com/Icinga/icinga2/compare/v2.12.1...v2.12.2 | x_refsource_MISC | |
https://github.com/Icinga/icinga2/security/advisories/GHSA-pcmr-2p2f-r7j6 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T16:55:10.629Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/Icinga/icinga2/compare/v2.12.1...v2.12.2" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/Icinga/icinga2/security/advisories/GHSA-pcmr-2p2f-r7j6" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Icinga 2 v2.8.0 through v2.11.7 and v2.12.2 has an issue where revoked certificates due for renewal will automatically be renewed, ignoring the CRL. This issue is fixed in Icinga 2 v2.11.8 and v2.12.3." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-12-15T22:15:35", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/Icinga/icinga2/compare/v2.12.1...v2.12.2" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/Icinga/icinga2/security/advisories/GHSA-pcmr-2p2f-r7j6" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-29663", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Icinga 2 v2.8.0 through v2.11.7 and v2.12.2 has an issue where revoked certificates due for renewal will automatically be renewed, ignoring the CRL. This issue is fixed in Icinga 2 v2.11.8 and v2.12.3." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/Icinga/icinga2/compare/v2.12.1...v2.12.2", "refsource": "MISC", "url": "https://github.com/Icinga/icinga2/compare/v2.12.1...v2.12.2" }, { "name": "https://github.com/Icinga/icinga2/security/advisories/GHSA-pcmr-2p2f-r7j6", "refsource": "MISC", "url": "https://github.com/Icinga/icinga2/security/advisories/GHSA-pcmr-2p2f-r7j6" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-29663", "datePublished": "2020-12-15T22:15:35", "dateReserved": "2020-12-09T00:00:00", "dateUpdated": "2024-08-04T16:55:10.629Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2014-2386
Vulnerability from cvelistv5
Published
2014-03-25 15:00
Modified
2024-08-06 10:14
Severity ?
EPSS score ?
Summary
Multiple off-by-one errors in Icinga, possibly 1.10.2 and earlier, allow remote attackers to cause a denial of service (crash) via unspecified vectors to the (1) display_nav_table, (2) print_export_link, (3) page_num_selector, or (4) page_limit_selector function in cgi/cgiutils.c or (5) status_page_num_selector function in cgi/status.c, which triggers a stack-based buffer overflow.
References
▼ | URL | Tags |
---|---|---|
http://comments.gmane.org/gmane.comp.security.oss.general/12355 | mailing-list, x_refsource_MLIST | |
http://lists.opensuse.org/opensuse-updates/2014-03/msg00072.html | vendor-advisory, x_refsource_SUSE | |
https://dev.icinga.org/issues/5663 | x_refsource_CONFIRM | |
https://git.icinga.org/?p=icinga-core.git%3Ba=commitdiff%3Bh=73285093b71a5551abdaab0a042d3d6bae093b0d | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T10:14:26.019Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[oss-security] 20140313 CVE request for icinga 1 byte \\0 overflows", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://comments.gmane.org/gmane.comp.security.oss.general/12355" }, { "name": "openSUSE-SU-2014:0420", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-03/msg00072.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://dev.icinga.org/issues/5663" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://git.icinga.org/?p=icinga-core.git%3Ba=commitdiff%3Bh=73285093b71a5551abdaab0a042d3d6bae093b0d" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-02-18T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple off-by-one errors in Icinga, possibly 1.10.2 and earlier, allow remote attackers to cause a denial of service (crash) via unspecified vectors to the (1) display_nav_table, (2) print_export_link, (3) page_num_selector, or (4) page_limit_selector function in cgi/cgiutils.c or (5) status_page_num_selector function in cgi/status.c, which triggers a stack-based buffer overflow." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2014-03-25T14:57:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "[oss-security] 20140313 CVE request for icinga 1 byte \\0 overflows", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://comments.gmane.org/gmane.comp.security.oss.general/12355" }, { "name": "openSUSE-SU-2014:0420", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2014-03/msg00072.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://dev.icinga.org/issues/5663" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://git.icinga.org/?p=icinga-core.git%3Ba=commitdiff%3Bh=73285093b71a5551abdaab0a042d3d6bae093b0d" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-2386", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple off-by-one errors in Icinga, possibly 1.10.2 and earlier, allow remote attackers to cause a denial of service (crash) via unspecified vectors to the (1) display_nav_table, (2) print_export_link, (3) page_num_selector, or (4) page_limit_selector function in cgi/cgiutils.c or (5) status_page_num_selector function in cgi/status.c, which triggers a stack-based buffer overflow." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[oss-security] 20140313 CVE request for icinga 1 byte \\0 overflows", "refsource": "MLIST", "url": "http://comments.gmane.org/gmane.comp.security.oss.general/12355" }, { "name": "openSUSE-SU-2014:0420", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2014-03/msg00072.html" }, { "name": "https://dev.icinga.org/issues/5663", "refsource": "CONFIRM", "url": "https://dev.icinga.org/issues/5663" }, { "name": "https://git.icinga.org/?p=icinga-core.git;a=commitdiff;h=73285093b71a5551abdaab0a042d3d6bae093b0d", "refsource": "CONFIRM", "url": "https://git.icinga.org/?p=icinga-core.git;a=commitdiff;h=73285093b71a5551abdaab0a042d3d6bae093b0d" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-2386", "datePublished": "2014-03-25T15:00:00", "dateReserved": "2014-03-13T00:00:00", "dateUpdated": "2024-08-06T10:14:26.019Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2011-2477
Vulnerability from cvelistv5
Published
2011-06-14 17:00
Modified
2024-08-06 23:00
Severity ?
EPSS score ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in config.c in config.cgi in Icinga before 1.4.1, when escape_html_tags is disabled, allow remote attackers to inject arbitrary web script or HTML via a JavaScript expression, as demonstrated by the onload attribute of a BODY element located after a check-host-alive! sequence, a different vulnerability than CVE-2011-2179.
References
▼ | URL | Tags |
---|---|---|
https://dev.icinga.org/issues/1605 | x_refsource_CONFIRM | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/68056 | vdb-entry, x_refsource_XF |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T23:00:33.969Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://dev.icinga.org/issues/1605" }, { "name": "icinga-config-xss(68056)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68056" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-06-08T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in config.c in config.cgi in Icinga before 1.4.1, when escape_html_tags is disabled, allow remote attackers to inject arbitrary web script or HTML via a JavaScript expression, as demonstrated by the onload attribute of a BODY element located after a check-host-alive! sequence, a different vulnerability than CVE-2011-2179." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://dev.icinga.org/issues/1605" }, { "name": "icinga-config-xss(68056)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68056" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2011-2477", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple cross-site scripting (XSS) vulnerabilities in config.c in config.cgi in Icinga before 1.4.1, when escape_html_tags is disabled, allow remote attackers to inject arbitrary web script or HTML via a JavaScript expression, as demonstrated by the onload attribute of a BODY element located after a check-host-alive! sequence, a different vulnerability than CVE-2011-2179." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://dev.icinga.org/issues/1605", "refsource": "CONFIRM", "url": "https://dev.icinga.org/issues/1605" }, { "name": "icinga-config-xss(68056)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68056" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2011-2477", "datePublished": "2011-06-14T17:00:00", "dateReserved": "2011-06-14T00:00:00", "dateUpdated": "2024-08-06T23:00:33.969Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-6535
Vulnerability from cvelistv5
Published
2018-02-27 19:00
Modified
2024-08-05 06:10
Severity ?
EPSS score ?
Summary
An issue was discovered in Icinga 2.x through 2.8.1. The lack of a constant-time password comparison function can disclose the password to an attacker.
References
▼ | URL | Tags |
---|---|---|
https://github.com/Icinga/icinga2/pull/5715 | x_refsource_CONFIRM | |
https://github.com/Icinga/icinga2/issues/4920 | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T06:10:10.158Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/Icinga/icinga2/pull/5715" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/Icinga/icinga2/issues/4920" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2017-11-02T00:00:00", "descriptions": [ { "lang": "en", "value": "An issue was discovered in Icinga 2.x through 2.8.1. The lack of a constant-time password comparison function can disclose the password to an attacker." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-02-27T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/Icinga/icinga2/pull/5715" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/Icinga/icinga2/issues/4920" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-6535", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in Icinga 2.x through 2.8.1. The lack of a constant-time password comparison function can disclose the password to an attacker." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/Icinga/icinga2/pull/5715", "refsource": "CONFIRM", "url": "https://github.com/Icinga/icinga2/pull/5715" }, { "name": "https://github.com/Icinga/icinga2/issues/4920", "refsource": "CONFIRM", "url": "https://github.com/Icinga/icinga2/issues/4920" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-6535", "datePublished": "2018-02-27T19:00:00", "dateReserved": "2018-02-02T00:00:00", "dateUpdated": "2024-08-05T06:10:10.158Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-6096
Vulnerability from cvelistv5
Published
2013-01-22 23:00
Modified
2024-08-06 21:21
Severity ?
EPSS score ?
Summary
Multiple stack-based buffer overflows in the get_history function in history.cgi in Nagios Core before 3.4.4, and Icinga 1.6.x before 1.6.2, 1.7.x before 1.7.4, and 1.8.x before 1.8.4, might allow remote attackers to execute arbitrary code via a long (1) host_name variable (host parameter) or (2) svc_description variable.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T21:21:28.457Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20121209 Nagios Core 3.4.3: Stack based buffer overflow in web interface", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2012-December/089125.html" }, { "name": "DSA-2616", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2013/dsa-2616" }, { "name": "openSUSE-SU-2013:0188", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00077.html" }, { "name": "24084", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "http://www.exploit-db.com/exploits/24084" }, { "name": "openSUSE-SU-2013:0140", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00033.html" }, { "name": "51863", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/51863" }, { "name": "openSUSE-SU-2013:0206", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00088.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.nagios.org/projects/nagioscore/history/core-3x" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=893269" }, { "name": "24159", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "http://www.exploit-db.com/exploits/24159" }, { "name": "89170", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/89170" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.icinga.org/2013/01/14/icinga-1-6-2-1-7-4-1-8-4-released/" }, { "name": "openSUSE-SU-2013:0169", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00060.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://dev.icinga.org/issues/3532" }, { "name": "DSA-2653", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2013/dsa-2653" }, { "name": "56879", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/56879" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-12-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple stack-based buffer overflows in the get_history function in history.cgi in Nagios Core before 3.4.4, and Icinga 1.6.x before 1.6.2, 1.7.x before 1.7.4, and 1.8.x before 1.8.4, might allow remote attackers to execute arbitrary code via a long (1) host_name variable (host parameter) or (2) svc_description variable." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-02-02T10:00:00", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "20121209 Nagios Core 3.4.3: Stack based buffer overflow in web interface", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2012-December/089125.html" }, { "name": "DSA-2616", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2013/dsa-2616" }, { "name": "openSUSE-SU-2013:0188", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00077.html" }, { "name": "24084", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "http://www.exploit-db.com/exploits/24084" }, { "name": "openSUSE-SU-2013:0140", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00033.html" }, { "name": "51863", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/51863" }, { "name": "openSUSE-SU-2013:0206", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00088.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.nagios.org/projects/nagioscore/history/core-3x" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=893269" }, { "name": "24159", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "http://www.exploit-db.com/exploits/24159" }, { "name": "89170", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/89170" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.icinga.org/2013/01/14/icinga-1-6-2-1-7-4-1-8-4-released/" }, { "name": "openSUSE-SU-2013:0169", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00060.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://dev.icinga.org/issues/3532" }, { "name": "DSA-2653", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2013/dsa-2653" }, { "name": "56879", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/56879" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2012-6096", "datePublished": "2013-01-22T23:00:00", "dateReserved": "2012-12-06T00:00:00", "dateUpdated": "2024-08-06T21:21:28.457Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-14004
Vulnerability from cvelistv5
Published
2020-06-12 15:04
Modified
2024-08-04 12:32
Severity ?
EPSS score ?
Summary
An issue was discovered in Icinga2 before v2.12.0-rc1. The prepare-dirs script (run as part of the icinga2 systemd service) executes chmod 2750 /run/icinga2/cmd. /run/icinga2 is under control of an unprivileged user by default. If /run/icinga2/cmd is a symlink, then it will by followed and arbitrary files can be changed to mode 2750 by the unprivileged icinga2 user.
References
▼ | URL | Tags |
---|---|---|
https://bugzilla.suse.com/show_bug.cgi?id=CVE-2020-14004 | x_refsource_MISC | |
https://github.com/Icinga/icinga2/pull/8045/commits/2f0f2e8c355b75fa4407d23f85feea037d2bc4b6 | x_refsource_MISC | |
https://github.com/Icinga/icinga2/releases | x_refsource_MISC | |
http://www.openwall.com/lists/oss-security/2020/06/12/1 | x_refsource_CONFIRM | |
https://github.com/Icinga/icinga2/compare/v2.12.0-rc1...master | x_refsource_MISC | |
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00014.html | vendor-advisory, x_refsource_SUSE |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T12:32:14.733Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.suse.com/show_bug.cgi?id=CVE-2020-14004" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/Icinga/icinga2/pull/8045/commits/2f0f2e8c355b75fa4407d23f85feea037d2bc4b6" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/Icinga/icinga2/releases" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2020/06/12/1" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/Icinga/icinga2/compare/v2.12.0-rc1...master" }, { "name": "openSUSE-SU-2020:1820", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00014.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Icinga2 before v2.12.0-rc1. The prepare-dirs script (run as part of the icinga2 systemd service) executes chmod 2750 /run/icinga2/cmd. /run/icinga2 is under control of an unprivileged user by default. If /run/icinga2/cmd is a symlink, then it will by followed and arbitrary files can be changed to mode 2750 by the unprivileged icinga2 user." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-11-03T06:06:14", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.suse.com/show_bug.cgi?id=CVE-2020-14004" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/Icinga/icinga2/pull/8045/commits/2f0f2e8c355b75fa4407d23f85feea037d2bc4b6" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/Icinga/icinga2/releases" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.openwall.com/lists/oss-security/2020/06/12/1" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/Icinga/icinga2/compare/v2.12.0-rc1...master" }, { "name": "openSUSE-SU-2020:1820", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00014.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-14004", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in Icinga2 before v2.12.0-rc1. The prepare-dirs script (run as part of the icinga2 systemd service) executes chmod 2750 /run/icinga2/cmd. /run/icinga2 is under control of an unprivileged user by default. If /run/icinga2/cmd is a symlink, then it will by followed and arbitrary files can be changed to mode 2750 by the unprivileged icinga2 user." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.suse.com/show_bug.cgi?id=CVE-2020-14004", "refsource": "MISC", "url": "https://bugzilla.suse.com/show_bug.cgi?id=CVE-2020-14004" }, { "name": "https://github.com/Icinga/icinga2/pull/8045/commits/2f0f2e8c355b75fa4407d23f85feea037d2bc4b6", "refsource": "MISC", "url": "https://github.com/Icinga/icinga2/pull/8045/commits/2f0f2e8c355b75fa4407d23f85feea037d2bc4b6" }, { "name": "https://github.com/Icinga/icinga2/releases", "refsource": "MISC", "url": "https://github.com/Icinga/icinga2/releases" }, { "name": "http://www.openwall.com/lists/oss-security/2020/06/12/1", "refsource": "CONFIRM", "url": "http://www.openwall.com/lists/oss-security/2020/06/12/1" }, { "name": "https://github.com/Icinga/icinga2/compare/v2.12.0-rc1...master", "refsource": "MISC", "url": "https://github.com/Icinga/icinga2/compare/v2.12.0-rc1...master" }, { "name": "openSUSE-SU-2020:1820", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00014.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-14004", "datePublished": "2020-06-12T15:04:10", "dateReserved": "2020-06-10T00:00:00", "dateUpdated": "2024-08-04T12:32:14.733Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-32743
Vulnerability from cvelistv5
Published
2021-07-15 16:05
Modified
2024-08-03 23:33
Severity ?
EPSS score ?
Summary
Icinga is a monitoring system which checks the availability of network resources, notifies users of outages, and generates performance data for reporting. In versions prior to 2.11.10 and from version 2.12.0 through version 2.12.4, some of the Icinga 2 features that require credentials for external services expose those credentials through the API to authenticated API users with read permissions for the corresponding object types. IdoMysqlConnection and IdoPgsqlConnection (every released version) exposes the password of the user used to connect to the database. IcingaDB (added in 2.12.0) exposes the password used to connect to the Redis server. ElasticsearchWriter (added in 2.8.0)exposes the password used to connect to the Elasticsearch server. An attacker who obtains these credentials can impersonate Icinga to these services and add, modify and delete information there. If credentials with more permissions are in use, this increases the impact accordingly. Starting with the 2.11.10 and 2.12.5 releases, these passwords are no longer exposed via the API. As a workaround, API user permissions can be restricted to not allow querying of any affected objects, either by explicitly listing only the required object types for object query permissions, or by applying a filter rule.
References
▼ | URL | Tags |
---|---|---|
https://github.com/Icinga/icinga2/security/advisories/GHSA-wrpw-pmr8-qgj7 | x_refsource_CONFIRM | |
https://icinga.com/blog/2021/07/15/releasing-icinga-2-12-5-and-2-11-10/ | x_refsource_MISC | |
https://lists.debian.org/debian-lts-announce/2021/11/msg00010.html | mailing-list, x_refsource_MLIST |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:33:54.856Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/Icinga/icinga2/security/advisories/GHSA-wrpw-pmr8-qgj7" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://icinga.com/blog/2021/07/15/releasing-icinga-2-12-5-and-2-11-10/" }, { "name": "[debian-lts-announce] 20211110 [SECURITY] [DLA 2816-1] icinga2 security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00010.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "icinga2", "vendor": "Icinga", "versions": [ { "status": "affected", "version": "\u003c 2.11.10" }, { "status": "affected", "version": "\u003e= 2.12.0, \u003c= 2.12.4" } ] } ], "descriptions": [ { "lang": "en", "value": "Icinga is a monitoring system which checks the availability of network resources, notifies users of outages, and generates performance data for reporting. In versions prior to 2.11.10 and from version 2.12.0 through version 2.12.4, some of the Icinga 2 features that require credentials for external services expose those credentials through the API to authenticated API users with read permissions for the corresponding object types. IdoMysqlConnection and IdoPgsqlConnection (every released version) exposes the password of the user used to connect to the database. IcingaDB (added in 2.12.0) exposes the password used to connect to the Redis server. ElasticsearchWriter (added in 2.8.0)exposes the password used to connect to the Elasticsearch server. An attacker who obtains these credentials can impersonate Icinga to these services and add, modify and delete information there. If credentials with more permissions are in use, this increases the impact accordingly. Starting with the 2.11.10 and 2.12.5 releases, these passwords are no longer exposed via the API. As a workaround, API user permissions can be restricted to not allow querying of any affected objects, either by explicitly listing only the required object types for object query permissions, or by applying a filter rule." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-202", "description": "CWE-202: Exposure of Sensitive Information Through Data Queries", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-10T23:06:14", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/Icinga/icinga2/security/advisories/GHSA-wrpw-pmr8-qgj7" }, { "tags": [ "x_refsource_MISC" ], "url": "https://icinga.com/blog/2021/07/15/releasing-icinga-2-12-5-and-2-11-10/" }, { "name": "[debian-lts-announce] 20211110 [SECURITY] [DLA 2816-1] icinga2 security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00010.html" } ], "source": { "advisory": "GHSA-wrpw-pmr8-qgj7", "discovery": "UNKNOWN" }, "title": "Passwords used to access external services inadvertently exposed through API", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-32743", "STATE": "PUBLIC", "TITLE": "Passwords used to access external services inadvertently exposed through API" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "icinga2", "version": { "version_data": [ { "version_value": "\u003c 2.11.10" }, { "version_value": "\u003e= 2.12.0, \u003c= 2.12.4" } ] } } ] }, "vendor_name": "Icinga" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Icinga is a monitoring system which checks the availability of network resources, notifies users of outages, and generates performance data for reporting. In versions prior to 2.11.10 and from version 2.12.0 through version 2.12.4, some of the Icinga 2 features that require credentials for external services expose those credentials through the API to authenticated API users with read permissions for the corresponding object types. IdoMysqlConnection and IdoPgsqlConnection (every released version) exposes the password of the user used to connect to the database. IcingaDB (added in 2.12.0) exposes the password used to connect to the Redis server. ElasticsearchWriter (added in 2.8.0)exposes the password used to connect to the Elasticsearch server. An attacker who obtains these credentials can impersonate Icinga to these services and add, modify and delete information there. If credentials with more permissions are in use, this increases the impact accordingly. Starting with the 2.11.10 and 2.12.5 releases, these passwords are no longer exposed via the API. As a workaround, API user permissions can be restricted to not allow querying of any affected objects, either by explicitly listing only the required object types for object query permissions, or by applying a filter rule." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-202: Exposure of Sensitive Information Through Data Queries" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/Icinga/icinga2/security/advisories/GHSA-wrpw-pmr8-qgj7", "refsource": "CONFIRM", "url": "https://github.com/Icinga/icinga2/security/advisories/GHSA-wrpw-pmr8-qgj7" }, { "name": "https://icinga.com/blog/2021/07/15/releasing-icinga-2-12-5-and-2-11-10/", "refsource": "MISC", "url": "https://icinga.com/blog/2021/07/15/releasing-icinga-2-12-5-and-2-11-10/" }, { "name": "[debian-lts-announce] 20211110 [SECURITY] [DLA 2816-1] icinga2 security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00010.html" } ] }, "source": { "advisory": "GHSA-wrpw-pmr8-qgj7", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-32743", "datePublished": "2021-07-15T16:05:12", "dateReserved": "2021-05-12T00:00:00", "dateUpdated": "2024-08-03T23:33:54.856Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2013-7106
Vulnerability from cvelistv5
Published
2014-01-14 18:00
Modified
2024-08-06 18:01
Severity ?
EPSS score ?
Summary
Multiple stack-based buffer overflows in Icinga before 1.8.5, 1.9 before 1.9.4, and 1.10 before 1.10.2 allow remote authenticated users to cause a denial of service (crash) and possibly execute arbitrary code via a long string to the (1) display_nav_table, (2) page_limit_selector, (3) print_export_link, or (4) page_num_selector function in cgi/cgiutils.c; (5) status_page_num_selector function in cgi/status.c; or (6) display_command_expansion function in cgi/config.c. NOTE: this can be exploited without authentication by leveraging CVE-2013-7107.
References
▼ | URL | Tags |
---|---|---|
https://dev.icinga.org/issues/5250 | x_refsource_CONFIRM | |
https://www.icinga.org/2013/12/17/icinga-security-releases-1-10-2-1-9-4-1-8-5/ | x_refsource_CONFIRM | |
http://www.openwall.com/lists/oss-security/2013/12/16/4 | mailing-list, x_refsource_MLIST |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T18:01:19.482Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://dev.icinga.org/issues/5250" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.icinga.org/2013/12/17/icinga-security-releases-1-10-2-1-9-4-1-8-5/" }, { "name": "[oss-security] 20131216 Fwd: Vulnerability (Buffer Overflow) in Icinga 1.8, 1.9 and 1.10 (Icinga Issue #5250) Vulnerability (Off-by-one memory access) in Icinga 1.8, 1.9 and 1.10 (Icinga Issue #5251)", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2013/12/16/4" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2013-12-02T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple stack-based buffer overflows in Icinga before 1.8.5, 1.9 before 1.9.4, and 1.10 before 1.10.2 allow remote authenticated users to cause a denial of service (crash) and possibly execute arbitrary code via a long string to the (1) display_nav_table, (2) page_limit_selector, (3) print_export_link, or (4) page_num_selector function in cgi/cgiutils.c; (5) status_page_num_selector function in cgi/status.c; or (6) display_command_expansion function in cgi/config.c. NOTE: this can be exploited without authentication by leveraging CVE-2013-7107." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2014-01-14T17:57:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://dev.icinga.org/issues/5250" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.icinga.org/2013/12/17/icinga-security-releases-1-10-2-1-9-4-1-8-5/" }, { "name": "[oss-security] 20131216 Fwd: Vulnerability (Buffer Overflow) in Icinga 1.8, 1.9 and 1.10 (Icinga Issue #5250) Vulnerability (Off-by-one memory access) in Icinga 1.8, 1.9 and 1.10 (Icinga Issue #5251)", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2013/12/16/4" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2013-7106", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple stack-based buffer overflows in Icinga before 1.8.5, 1.9 before 1.9.4, and 1.10 before 1.10.2 allow remote authenticated users to cause a denial of service (crash) and possibly execute arbitrary code via a long string to the (1) display_nav_table, (2) page_limit_selector, (3) print_export_link, or (4) page_num_selector function in cgi/cgiutils.c; (5) status_page_num_selector function in cgi/status.c; or (6) display_command_expansion function in cgi/config.c. NOTE: this can be exploited without authentication by leveraging CVE-2013-7107." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://dev.icinga.org/issues/5250", "refsource": "CONFIRM", "url": "https://dev.icinga.org/issues/5250" }, { "name": "https://www.icinga.org/2013/12/17/icinga-security-releases-1-10-2-1-9-4-1-8-5/", "refsource": "CONFIRM", "url": "https://www.icinga.org/2013/12/17/icinga-security-releases-1-10-2-1-9-4-1-8-5/" }, { "name": "[oss-security] 20131216 Fwd: Vulnerability (Buffer Overflow) in Icinga 1.8, 1.9 and 1.10 (Icinga Issue #5250) Vulnerability (Off-by-one memory access) in Icinga 1.8, 1.9 and 1.10 (Icinga Issue #5251)", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2013/12/16/4" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2013-7106", "datePublished": "2014-01-14T18:00:00", "dateReserved": "2013-12-15T00:00:00", "dateUpdated": "2024-08-06T18:01:19.482Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2012-3441
Vulnerability from cvelistv5
Published
2012-08-25 10:00
Modified
2024-08-06 20:05
Severity ?
EPSS score ?
Summary
The database creation script (module/idoutils/db/scripts/create_mysqldb.sh) in Icinga 1.7.1 grants access to all databases to the icinga user, which allows icinga users to access other databases via unspecified vectors.
References
▼ | URL | Tags |
---|---|---|
http://www.openwall.com/lists/oss-security/2012/07/30/7 | mailing-list, x_refsource_MLIST | |
https://git.icinga.org/?p=icinga-core.git%3Ba=commitdiff%3Bh=dcd45fb6931c4abf710829bee21af09f842bc281 | x_refsource_CONFIRM | |
https://git.icinga.org/?p=icinga-core.git%3Ba=commitdiff%3Bh=712813d3118a5b9e5a496179cab81dbe91f69d63 | x_refsource_CONFIRM | |
http://www.openwall.com/lists/oss-security/2012/07/30/6 | mailing-list, x_refsource_MLIST | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/78874 | vdb-entry, x_refsource_XF | |
https://git.icinga.org/?p=icinga-doc.git%3Ba=commitdiff%3Bh=619a08ca1178144b8a3a5caafff32a2d3918edab | x_refsource_CONFIRM | |
http://lists.opensuse.org/opensuse-updates/2012-08/msg00012.html | vendor-advisory, x_refsource_SUSE | |
https://bugzilla.novell.com/show_bug.cgi?id=767319 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T20:05:12.554Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "[oss-security] 20120730 Re: CVE Request: icinga sample db creation scripts", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2012/07/30/7" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://git.icinga.org/?p=icinga-core.git%3Ba=commitdiff%3Bh=dcd45fb6931c4abf710829bee21af09f842bc281" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://git.icinga.org/?p=icinga-core.git%3Ba=commitdiff%3Bh=712813d3118a5b9e5a496179cab81dbe91f69d63" }, { "name": "[oss-security] 20120730 CVE Request: icinga sample db creation scripts", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2012/07/30/6" }, { "name": "icinga-database-sec-bypass(78874)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78874" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://git.icinga.org/?p=icinga-doc.git%3Ba=commitdiff%3Bh=619a08ca1178144b8a3a5caafff32a2d3918edab" }, { "name": "openSUSE-SU-2012:0968", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00012.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugzilla.novell.com/show_bug.cgi?id=767319" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2012-06-15T00:00:00", "descriptions": [ { "lang": "en", "value": "The database creation script (module/idoutils/db/scripts/create_mysqldb.sh) in Icinga 1.7.1 grants access to all databases to the icinga user, which allows icinga users to access other databases via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-28T12:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "[oss-security] 20120730 Re: CVE Request: icinga sample db creation scripts", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2012/07/30/7" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://git.icinga.org/?p=icinga-core.git%3Ba=commitdiff%3Bh=dcd45fb6931c4abf710829bee21af09f842bc281" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://git.icinga.org/?p=icinga-core.git%3Ba=commitdiff%3Bh=712813d3118a5b9e5a496179cab81dbe91f69d63" }, { "name": "[oss-security] 20120730 CVE Request: icinga sample db creation scripts", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2012/07/30/6" }, { "name": "icinga-database-sec-bypass(78874)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78874" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://git.icinga.org/?p=icinga-doc.git%3Ba=commitdiff%3Bh=619a08ca1178144b8a3a5caafff32a2d3918edab" }, { "name": "openSUSE-SU-2012:0968", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00012.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugzilla.novell.com/show_bug.cgi?id=767319" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2012-3441", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The database creation script (module/idoutils/db/scripts/create_mysqldb.sh) in Icinga 1.7.1 grants access to all databases to the icinga user, which allows icinga users to access other databases via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "[oss-security] 20120730 Re: CVE Request: icinga sample db creation scripts", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2012/07/30/7" }, { "name": "https://git.icinga.org/?p=icinga-core.git;a=commitdiff;h=dcd45fb6931c4abf710829bee21af09f842bc281", "refsource": "CONFIRM", "url": "https://git.icinga.org/?p=icinga-core.git;a=commitdiff;h=dcd45fb6931c4abf710829bee21af09f842bc281" }, { "name": "https://git.icinga.org/?p=icinga-core.git;a=commitdiff;h=712813d3118a5b9e5a496179cab81dbe91f69d63", "refsource": "CONFIRM", "url": "https://git.icinga.org/?p=icinga-core.git;a=commitdiff;h=712813d3118a5b9e5a496179cab81dbe91f69d63" }, { "name": "[oss-security] 20120730 CVE Request: icinga sample db creation scripts", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2012/07/30/6" }, { "name": "icinga-database-sec-bypass(78874)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78874" }, { "name": "https://git.icinga.org/?p=icinga-doc.git;a=commitdiff;h=619a08ca1178144b8a3a5caafff32a2d3918edab", "refsource": "CONFIRM", "url": "https://git.icinga.org/?p=icinga-doc.git;a=commitdiff;h=619a08ca1178144b8a3a5caafff32a2d3918edab" }, { "name": "openSUSE-SU-2012:0968", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00012.html" }, { "name": "https://bugzilla.novell.com/show_bug.cgi?id=767319", "refsource": "MISC", "url": "https://bugzilla.novell.com/show_bug.cgi?id=767319" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2012-3441", "datePublished": "2012-08-25T10:00:00", "dateReserved": "2012-06-14T00:00:00", "dateUpdated": "2024-08-06T20:05:12.554Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-6536
Vulnerability from cvelistv5
Published
2018-02-02 09:00
Modified
2024-08-05 06:10
Severity ?
EPSS score ?
Summary
An issue was discovered in Icinga 2.x through 2.8.1. The daemon creates an icinga2.pid file after dropping privileges to a non-root account, which might allow local users to kill arbitrary processes by leveraging access to this non-root account for icinga2.pid modification before a root script executes a "kill `cat /pathname/icinga2.pid`" command, as demonstrated by icinga2.init.d.cmake.
References
▼ | URL | Tags |
---|---|---|
https://github.com/Icinga/icinga2/issues/5991 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T06:10:10.303Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/Icinga/icinga2/issues/5991" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2018-02-02T00:00:00", "descriptions": [ { "lang": "en", "value": "An issue was discovered in Icinga 2.x through 2.8.1. The daemon creates an icinga2.pid file after dropping privileges to a non-root account, which might allow local users to kill arbitrary processes by leveraging access to this non-root account for icinga2.pid modification before a root script executes a \"kill `cat /pathname/icinga2.pid`\" command, as demonstrated by icinga2.init.d.cmake." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-02-02T08:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/Icinga/icinga2/issues/5991" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-6536", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in Icinga 2.x through 2.8.1. The daemon creates an icinga2.pid file after dropping privileges to a non-root account, which might allow local users to kill arbitrary processes by leveraging access to this non-root account for icinga2.pid modification before a root script executes a \"kill `cat /pathname/icinga2.pid`\" command, as demonstrated by icinga2.init.d.cmake." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/Icinga/icinga2/issues/5991", "refsource": "MISC", "url": "https://github.com/Icinga/icinga2/issues/5991" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2018-6536", "datePublished": "2018-02-02T09:00:00", "dateReserved": "2018-02-02T00:00:00", "dateUpdated": "2024-08-05T06:10:10.303Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2015-8010
Vulnerability from cvelistv5
Published
2017-03-27 17:00
Modified
2024-08-06 08:06
Severity ?
EPSS score ?
Summary
Cross-site scripting (XSS) vulnerability in the Classic-UI with the CSV export link and pagination feature in Icinga before 1.14 allows remote attackers to inject arbitrary web script or HTML via the query string to cgi-bin/status.cgi.
References
▼ | URL | Tags |
---|---|---|
https://github.com/Icinga/icinga-core/issues/1563 | x_refsource_CONFIRM | |
http://www.openwall.com/lists/oss-security/2015/10/29/15 | mailing-list, x_refsource_MLIST | |
http://lists.opensuse.org/opensuse-security-announce/2017-01/msg00019.html | vendor-advisory, x_refsource_SUSE | |
http://www.securityfocus.com/bid/97145 | vdb-entry, x_refsource_BID | |
http://www.openwall.com/lists/oss-security/2015/10/23/15 | mailing-list, x_refsource_MLIST |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T08:06:31.609Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/Icinga/icinga-core/issues/1563" }, { "name": "[oss-security] 20151029 Re: CVE request - Icinga 1.13.3 and older are vulnerable to XSS", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2015/10/29/15" }, { "name": "openSUSE-SU-2017:0146", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2017-01/msg00019.html" }, { "name": "97145", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/97145" }, { "name": "[oss-security] 20151023 CVE request - Icinga 1.13.3 and older are vulnerable to XSS", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2015/10/23/15" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-10-23T00:00:00", "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in the Classic-UI with the CSV export link and pagination feature in Icinga before 1.14 allows remote attackers to inject arbitrary web script or HTML via the query string to cgi-bin/status.cgi." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-03-29T09:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/Icinga/icinga-core/issues/1563" }, { "name": "[oss-security] 20151029 Re: CVE request - Icinga 1.13.3 and older are vulnerable to XSS", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2015/10/29/15" }, { "name": "openSUSE-SU-2017:0146", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2017-01/msg00019.html" }, { "name": "97145", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/97145" }, { "name": "[oss-security] 20151023 CVE request - Icinga 1.13.3 and older are vulnerable to XSS", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2015/10/23/15" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-8010", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Cross-site scripting (XSS) vulnerability in the Classic-UI with the CSV export link and pagination feature in Icinga before 1.14 allows remote attackers to inject arbitrary web script or HTML via the query string to cgi-bin/status.cgi." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/Icinga/icinga-core/issues/1563", "refsource": "CONFIRM", "url": "https://github.com/Icinga/icinga-core/issues/1563" }, { "name": "[oss-security] 20151029 Re: CVE request - Icinga 1.13.3 and older are vulnerable to XSS", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2015/10/29/15" }, { "name": "openSUSE-SU-2017:0146", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2017-01/msg00019.html" }, { "name": "97145", "refsource": "BID", "url": "http://www.securityfocus.com/bid/97145" }, { "name": "[oss-security] 20151023 CVE request - Icinga 1.13.3 and older are vulnerable to XSS", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2015/10/23/15" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-8010", "datePublished": "2017-03-27T17:00:00", "dateReserved": "2015-10-28T00:00:00", "dateUpdated": "2024-08-06T08:06:31.609Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2017-11-24 05:29
Modified
2024-11-21 03:17
Severity ?
Summary
etc/initsystem/prepare-dirs in Icinga 2.x through 2.8.1 has a chown call for a filename in a user-writable directory, which allows local users to gain privileges by leveraging access to the $ICINGA2_USER account for creation of a link.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://github.com/Icinga/icinga2/issues/5793 | Exploit, Issue Tracking, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/Icinga/icinga2/issues/5793 | Exploit, Issue Tracking, Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:icinga:icinga:*:*:*:*:*:*:*:*", "matchCriteriaId": "C5BD6EE3-A926-4109-AD1F-32D89291FEA5", "versionEndIncluding": "2.8.0", "versionStartIncluding": "2.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "etc/initsystem/prepare-dirs in Icinga 2.x through 2.8.1 has a chown call for a filename in a user-writable directory, which allows local users to gain privileges by leveraging access to the $ICINGA2_USER account for creation of a link." }, { "lang": "es", "value": "etc/initsystem/prepare-dirs en Icinga en versiones 2.x hasta la 2.8.1 tiene una llamada chown para un nombre de usuario en un directorio que puede ser escrito por el usuario. Esto permite que usuarios locales ganen privilegios aprovechando el acceso a la cuenta $ICINGA2_USER para crear un enlace." } ], "id": "CVE-2017-16933", "lastModified": "2024-11-21T03:17:16.223", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.9, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.0, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-11-24T05:29:00.253", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Icinga/icinga2/issues/5793" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Icinga/icinga2/issues/5793" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-732" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-06-12 16:15
Modified
2024-11-21 05:02
Severity ?
Summary
An issue was discovered in Icinga2 before v2.12.0-rc1. The prepare-dirs script (run as part of the icinga2 systemd service) executes chmod 2750 /run/icinga2/cmd. /run/icinga2 is under control of an unprivileged user by default. If /run/icinga2/cmd is a symlink, then it will by followed and arbitrary files can be changed to mode 2750 by the unprivileged icinga2 user.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:icinga:icinga:*:*:*:*:*:*:*:*", "matchCriteriaId": "66E96E02-882A-42E1-9759-2D8564AAF3F5", "versionEndIncluding": "2.11.3", "versionStartIncluding": "2.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:2.12.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "3FFEBFED-F9FE-4F80-9EEF-11722D357AC1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:opensuse:backports_sle:15.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "40513095-7E6E-46B3-B604-C926F1BA3568", "vulnerable": true }, { "criteria": "cpe:2.3:a:opensuse:backports_sle:15.0:sp2:*:*:*:*:*:*", "matchCriteriaId": "67E82302-4B77-44F3-97B1-24C18AC4A35D", "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493", "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*", "matchCriteriaId": "B009C22E-30A4-4288-BCF6-C3E81DEAF45A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Icinga2 before v2.12.0-rc1. The prepare-dirs script (run as part of the icinga2 systemd service) executes chmod 2750 /run/icinga2/cmd. /run/icinga2 is under control of an unprivileged user by default. If /run/icinga2/cmd is a symlink, then it will by followed and arbitrary files can be changed to mode 2750 by the unprivileged icinga2 user." }, { "lang": "es", "value": "Se detect\u00f3 un problema en Icinga2 versiones anteriores a v2.12.0-rc1. El script prepare-dirs (ejecutado como parte del servicio icinga2 systemd) ejecuta chmod 2750 /run/icinga2/cmd. /run/icinga2 est\u00e1 bajo el control de un usuario no privilegiado por defecto. Si /run/icinga2/cmd es un enlace simb\u00f3lico, entonces ser\u00e1 seguido y los archivos arbitrarios pueden ser cambiados al modo 2750 por el usuario icinga2 no privilegiado" } ], "id": "CVE-2020-14004", "lastModified": "2024-11-21T05:02:19.887", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-06-12T16:15:10.387", "references": [ { "source": "cve@mitre.org", "tags": [ "Broken Link", "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00014.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2020/06/12/1" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "Issue Tracking" ], "url": "https://bugzilla.suse.com/show_bug.cgi?id=CVE-2020-14004" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Icinga/icinga2/compare/v2.12.0-rc1...master" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Icinga/icinga2/pull/8045/commits/2f0f2e8c355b75fa4407d23f85feea037d2bc4b6" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/Icinga/icinga2/releases" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00014.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2020/06/12/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Issue Tracking" ], "url": "https://bugzilla.suse.com/show_bug.cgi?id=CVE-2020-14004" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Icinga/icinga2/compare/v2.12.0-rc1...master" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Icinga/icinga2/pull/8045/commits/2f0f2e8c355b75fa4407d23f85feea037d2bc4b6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/Icinga/icinga2/releases" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-59" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-07-15 15:15
Modified
2024-11-21 06:07
Severity ?
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
Icinga is a monitoring system which checks the availability of network resources, notifies users of outages, and generates performance data for reporting. From version 2.4.0 through version 2.12.4, a vulnerability exists that may allow privilege escalation for authenticated API users. With a read-ony user's credentials, an attacker can view most attributes of all config objects including `ticket_salt` of `ApiListener`. This salt is enough to compute a ticket for every possible common name (CN). A ticket, the master node's certificate, and a self-signed certificate are enough to successfully request the desired certificate from Icinga. That certificate may in turn be used to steal an endpoint or API user's identity. Versions 2.12.5 and 2.11.10 both contain a fix the vulnerability. As a workaround, one may either specify queryable types explicitly or filter out ApiListener objects.
References
▼ | URL | Tags | |
---|---|---|---|
security-advisories@github.com | https://github.com/Icinga/icinga2/security/advisories/GHSA-98wp-jc6q-x5q5 | Exploit, Third Party Advisory | |
security-advisories@github.com | https://icinga.com/blog/2021/07/02/releasing-icinga-2-12-5-2-11-10/ | Broken Link, Vendor Advisory | |
security-advisories@github.com | https://lists.debian.org/debian-lts-announce/2021/11/msg00010.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/Icinga/icinga2/security/advisories/GHSA-98wp-jc6q-x5q5 | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://icinga.com/blog/2021/07/02/releasing-icinga-2-12-5-2-11-10/ | Broken Link, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2021/11/msg00010.html | Mailing List, Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:icinga:icinga:*:*:*:*:*:*:*:*", "matchCriteriaId": "F174C03E-CED0-469C-A3E7-7EE760244F7D", "versionEndExcluding": "2.11.10", "versionStartIncluding": "2.4.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:*:*:*:*:*:*:*:*", "matchCriteriaId": "0FC541DF-0A24-4C5F-90EF-A7D40EFFDB5D", "versionEndExcluding": "2.12.5", "versionStartIncluding": "2.12.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Icinga is a monitoring system which checks the availability of network resources, notifies users of outages, and generates performance data for reporting. From version 2.4.0 through version 2.12.4, a vulnerability exists that may allow privilege escalation for authenticated API users. With a read-ony user\u0027s credentials, an attacker can view most attributes of all config objects including `ticket_salt` of `ApiListener`. This salt is enough to compute a ticket for every possible common name (CN). A ticket, the master node\u0027s certificate, and a self-signed certificate are enough to successfully request the desired certificate from Icinga. That certificate may in turn be used to steal an endpoint or API user\u0027s identity. Versions 2.12.5 and 2.11.10 both contain a fix the vulnerability. As a workaround, one may either specify queryable types explicitly or filter out ApiListener objects." }, { "lang": "es", "value": "Icinga es un sistema de monitorizaci\u00f3n que comprueba la disponibilidad de los recursos de red, notifica a usuarios de las interrupciones y genera datos de rendimiento para informes. Desde versi\u00f3n 2.4.0 hasta versi\u00f3n 2.12.4, se presenta una vulnerabilidad que puede permitir una escalada de privilegios para usuarios autenticados de la API. Con las credenciales de un usuario de solo lectura, un atacante puede ver la mayor\u00eda de los atributos de todos los objetos de configuraci\u00f3n, incluyendo \"ticket_salt\" de \"ApiListener\". Este salt es suficiente para calcular un ticket para cada nombre com\u00fan (CN) posible. Un ticket, el certificado del nodo maestro y un certificado autofirmado son suficientes para solicitar con \u00e9xito el certificado deseado de Icinga. Ese certificado puede usarse a su vez para robar la identidad de un endpoint o de un usuario de la API. Las versiones 2.12.5 y 2.11.10 contienen una correcci\u00f3n de la vulnerabilidad. Como soluci\u00f3n, se pueden especificar expl\u00edcitamente los tipos consultables o filtrar los objetos ApiListener" } ], "id": "CVE-2021-32739", "lastModified": "2024-11-21T06:07:38.810", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-07-15T15:15:08.567", "references": [ { "source": "security-advisories@github.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Icinga/icinga2/security/advisories/GHSA-98wp-jc6q-x5q5" }, { "source": "security-advisories@github.com", "tags": [ "Broken Link", "Vendor Advisory" ], "url": "https://icinga.com/blog/2021/07/02/releasing-icinga-2-12-5-2-11-10/" }, { "source": "security-advisories@github.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00010.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Icinga/icinga2/security/advisories/GHSA-98wp-jc6q-x5q5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Vendor Advisory" ], "url": "https://icinga.com/blog/2021/07/02/releasing-icinga-2-12-5-2-11-10/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00010.html" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-267" } ], "source": "security-advisories@github.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-269" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-02-27 19:29
Modified
2024-11-21 04:10
Severity ?
Summary
An issue was discovered in Icinga 2.x through 2.8.1. By sending specially crafted (authenticated and unauthenticated) requests, an attacker can exhaust a lot of memory on the server side, triggering the OOM killer.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://github.com/Icinga/icinga2/pull/6103 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/Icinga/icinga2/pull/6103 | Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:icinga:icinga:*:*:*:*:*:*:*:*", "matchCriteriaId": "C5BD6EE3-A926-4109-AD1F-32D89291FEA5", "versionEndIncluding": "2.8.0", "versionStartIncluding": "2.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Icinga 2.x through 2.8.1. By sending specially crafted (authenticated and unauthenticated) requests, an attacker can exhaust a lot of memory on the server side, triggering the OOM killer." }, { "lang": "es", "value": "Se ha descubierto un problema en Icinga, en versiones 2.x hasta la 2.8.1. Mediante el env\u00edo de peticiones (autenticadas y no autenticadas) especialmente manipuladas, un atacante puede agotar mucha memoria del lado del servidor, desencadenando el killer OOM." } ], "id": "CVE-2018-6532", "lastModified": "2024-11-21T04:10:50.850", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-02-27T19:29:00.403", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Icinga/icinga2/pull/6103" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Icinga/icinga2/pull/6103" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-400" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-01-15 16:08
Modified
2024-11-21 02:00
Severity ?
Summary
Cross-site request forgery (CSRF) vulnerability in cmd.cgi in Icinga 1.8.5, 1.9.4, 1.10.2, and earlier allows remote attackers to hijack the authentication of users for unspecified commands via unspecified vectors, as demonstrated by bypassing authentication requirements for CVE-2013-7106.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
icinga | icinga | * | |
icinga | icinga | 0.8.0 | |
icinga | icinga | 0.8.1 | |
icinga | icinga | 0.8.2 | |
icinga | icinga | 0.8.3 | |
icinga | icinga | 0.8.4 | |
icinga | icinga | 1.0 | |
icinga | icinga | 1.0 | |
icinga | icinga | 1.0.1 | |
icinga | icinga | 1.0.2 | |
icinga | icinga | 1.0.3 | |
icinga | icinga | 1.2.0 | |
icinga | icinga | 1.2.1 | |
icinga | icinga | 1.3.0 | |
icinga | icinga | 1.3.1 | |
icinga | icinga | 1.4.0 | |
icinga | icinga | 1.4.1 | |
icinga | icinga | 1.6.0 | |
icinga | icinga | 1.6.1 | |
icinga | icinga | 1.6.2 | |
icinga | icinga | 1.7.0 | |
icinga | icinga | 1.7.1 | |
icinga | icinga | 1.7.2 | |
icinga | icinga | 1.7.3 | |
icinga | icinga | 1.7.4 | |
icinga | icinga | 1.8.0 | |
icinga | icinga | 1.8.1 | |
icinga | icinga | 1.8.2 | |
icinga | icinga | 1.8.3 | |
icinga | icinga | 1.8.4 | |
icinga | icinga | 1.8.5 | |
icinga | icinga | 1.9.0 | |
icinga | icinga | 1.9.1 | |
icinga | icinga | 1.9.2 | |
icinga | icinga | 1.9.3 | |
icinga | icinga | 1.9.4 | |
icinga | icinga | 1.10.0 | |
icinga | icinga | 1.10.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:icinga:icinga:*:*:*:*:*:*:*:*", "matchCriteriaId": "2ACE5C1A-6B4F-4997-95EE-A136688872D0", "versionEndIncluding": "1.10.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:0.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "1D65D942-0560-42B0-BAF8-D6B8C4237558", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:0.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "0CF3E50F-0DF1-44C1-9E7D-E3AE9BBAC5C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:0.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "F87DFD18-B038-4E18-889A-FCADDC7E9C23", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:0.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "B9B482D1-BB5D-41CC-A330-214F1EC9BD43", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:0.8.4:*:*:*:*:*:*:*", "matchCriteriaId": "6EB99BAF-6CF9-4F61-A86B-91F4DAE20F58", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "B65BD554-2D66-4237-8829-EC5CFD374E4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "51CBC3F4-EB90-462D-B840-71DB9E8E3667", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "719B37F6-4D3A-4922-B58D-536A775D42D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "7890303A-21C3-47B8-86AF-1B07A01C9AE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "CED3BF83-92C3-4324-BC6E-722309A8787B", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "A5F7F451-E7AA-4C84-874D-7C7E5C162DEA", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "D5250AED-B86C-4415-A274-7DD9659F40D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "C6E333C3-C264-41C9-B358-97A3F62C649D", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "BEAD9B4E-66B1-4E82-8A6F-B46A4F0A61D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "0166CAEF-0126-4B6E-BE57-5398375C17EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "11406052-8C4C-4CA4-9A73-82135D236741", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "29CC0581-0AE1-43FE-8F98-CB2E7204A7E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "246A0425-A4D6-478D-AADB-07A0D3610FED", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "2D7488AD-C2CA-491E-B4E4-322A275EE13A", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "01476892-42B5-44F6-91D2-8C9F680A2F02", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "A830CEA4-06F7-46FB-8216-0D18796F7BF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "EB9B0C24-D65D-4406-B5F7-5EA60F701872", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "5260A6FA-C393-4AD5-B5C8-73616F21FEA7", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.7.4:*:*:*:*:*:*:*", "matchCriteriaId": "94C19BC7-55B5-4D0D-96CC-1C9C40F7829F", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "3C1DE372-E2A4-4C4B-B85C-104D84696090", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "D2B3410C-6FF8-4485-AC06-BBA15A4BC9E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "27F6ACDE-05A0-4688-97FF-EB4C23E8F52D", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "6333E91A-6315-437C-A600-0B824976FBB8", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.8.4:*:*:*:*:*:*:*", "matchCriteriaId": "332D5DB3-58A3-41BD-907B-6959B07F643B", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.8.5:*:*:*:*:*:*:*", "matchCriteriaId": "7E49EB78-5292-44FF-844C-076198E55A25", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.9.0:*:*:*:*:*:*:*", "matchCriteriaId": "D8BCA88C-5AA9-4C0D-9FA3-80BA8FBBD521", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "821C9240-E41E-4BCC-910E-63304F8E3790", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "ADFD2677-6BF6-4985-B915-A9395B4A620E", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "FCF96645-E8B6-443A-8761-6F879042F689", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "1912AB1A-C7A5-403A-873A-52FF7D2C5BDE", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.10.0:*:*:*:*:*:*:*", "matchCriteriaId": "21460019-53D0-440D-A0A6-4B778B478B4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.10.1:*:*:*:*:*:*:*", "matchCriteriaId": "30895AD2-198A-4329-9987-347AABDD7C10", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site request forgery (CSRF) vulnerability in cmd.cgi in Icinga 1.8.5, 1.9.4, 1.10.2, and earlier allows remote attackers to hijack the authentication of users for unspecified commands via unspecified vectors, as demonstrated by bypassing authentication requirements for CVE-2013-7106." }, { "lang": "es", "value": "Vulnerabilidad de cross-site request forgery (CSRF) en cmd.cgi en Icinga 1.8.5, 1.9.4, 1.10.2 y anteriores, permite a atacantes secuestrar la autenticaci\u00f3n de usuarios en comandos no especificados a trav\u00e9s de vectores no especificados, como se muestra sorteando requisitos de autenticaci\u00f3n para el CVE-2013-7106." } ], "id": "CVE-2013-7107", "lastModified": "2024-11-21T02:00:21.843", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2014-01-15T16:08:03.907", "references": [ { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-updates/2014-02/msg00061.html" }, { "source": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2013/12/16/4" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://dev.icinga.org/issues/5250" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://dev.icinga.org/issues/5346" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.icinga.org/2013/12/17/icinga-security-releases-1-10-2-1-9-4-1-8-5/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2014-02/msg00061.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2013/12/16/4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://dev.icinga.org/issues/5250" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://dev.icinga.org/issues/5346" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.icinga.org/2013/12/17/icinga-security-releases-1-10-2-1-9-4-1-8-5/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-352" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-02-27 19:29
Modified
2024-11-21 04:10
Severity ?
Summary
An issue was discovered in Icinga 2.x through 2.8.1. By sending specially crafted messages, an attacker can cause a NULL pointer dereference, which can cause the product to crash.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://github.com/Icinga/icinga2/pull/6104 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/Icinga/icinga2/pull/6104 | Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:icinga:icinga:*:*:*:*:*:*:*:*", "matchCriteriaId": "1FDB0B7D-0832-4827-A0A5-B2356027FEA1", "versionEndIncluding": "2.8.1", "versionStartIncluding": "2.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Icinga 2.x through 2.8.1. By sending specially crafted messages, an attacker can cause a NULL pointer dereference, which can cause the product to crash." }, { "lang": "es", "value": "Se ha descubierto un problema en Icinga, en versiones 2.x hasta la 2.8.1. Al enviar mensajes especialmente manipulados, un atacante puede provocar una desreferencia de puntero NULL, lo que puede hacer que el producto se cierre inesperadamente." } ], "id": "CVE-2018-6534", "lastModified": "2024-11-21T04:10:51.170", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-02-27T19:29:00.513", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Icinga/icinga2/pull/6104" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Icinga/icinga2/pull/6104" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-476" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-06-14 17:55
Modified
2024-11-21 01:28
Severity ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in config.c in config.cgi in Icinga before 1.4.1, when escape_html_tags is disabled, allow remote attackers to inject arbitrary web script or HTML via a JavaScript expression, as demonstrated by the onload attribute of a BODY element located after a check-host-alive! sequence, a different vulnerability than CVE-2011-2179.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
icinga | icinga | * | |
icinga | icinga | 0.8.0 | |
icinga | icinga | 0.8.1 | |
icinga | icinga | 0.8.2 | |
icinga | icinga | 0.8.3 | |
icinga | icinga | 0.8.4 | |
icinga | icinga | 1.0 | |
icinga | icinga | 1.0 | |
icinga | icinga | 1.0.1 | |
icinga | icinga | 1.0.2 | |
icinga | icinga | 1.0.3 | |
icinga | icinga | 1.2.0 | |
icinga | icinga | 1.2.1 | |
icinga | icinga | 1.3.0 | |
icinga | icinga | 1.3.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:icinga:icinga:*:*:*:*:*:*:*:*", "matchCriteriaId": "10436D2F-3CCB-4ED6-9327-3CD6BA5E43D5", "versionEndIncluding": "1.4.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:0.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "1D65D942-0560-42B0-BAF8-D6B8C4237558", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:0.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "0CF3E50F-0DF1-44C1-9E7D-E3AE9BBAC5C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:0.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "F87DFD18-B038-4E18-889A-FCADDC7E9C23", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:0.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "B9B482D1-BB5D-41CC-A330-214F1EC9BD43", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:0.8.4:*:*:*:*:*:*:*", "matchCriteriaId": "6EB99BAF-6CF9-4F61-A86B-91F4DAE20F58", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "B65BD554-2D66-4237-8829-EC5CFD374E4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "51CBC3F4-EB90-462D-B840-71DB9E8E3667", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "719B37F6-4D3A-4922-B58D-536A775D42D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "7890303A-21C3-47B8-86AF-1B07A01C9AE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "CED3BF83-92C3-4324-BC6E-722309A8787B", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "A5F7F451-E7AA-4C84-874D-7C7E5C162DEA", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "D5250AED-B86C-4415-A274-7DD9659F40D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "C6E333C3-C264-41C9-B358-97A3F62C649D", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "BEAD9B4E-66B1-4E82-8A6F-B46A4F0A61D9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in config.c in config.cgi in Icinga before 1.4.1, when escape_html_tags is disabled, allow remote attackers to inject arbitrary web script or HTML via a JavaScript expression, as demonstrated by the onload attribute of a BODY element located after a check-host-alive! sequence, a different vulnerability than CVE-2011-2179." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades de ejecuci\u00f3n de secuencias de comandos en sitios cruzados (XSS) en config.c en config.cgi en Icinga antes de v1.4.1, cuando escape_html_tags est\u00e1 desactivado, permite a atacantes remotos inyectar secuencias de comandos web o HTML a trav\u00e9s de una expresi\u00f3n JavaScript, como lo demuestra el atributo onload de un elemento BODY localizado despu\u00e9s de un check-host-alive! secuencia, una vulnerabilidad diferente de CVE-2011-2179." } ], "id": "CVE-2011-2477", "lastModified": "2024-11-21T01:28:21.923", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.6, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 4.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-06-14T17:55:06.517", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://dev.icinga.org/issues/1605" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68056" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://dev.icinga.org/issues/1605" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/68056" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-01-15 16:08
Modified
2024-11-21 02:00
Severity ?
Summary
Multiple stack-based buffer overflows in Icinga before 1.8.5, 1.9 before 1.9.4, and 1.10 before 1.10.2 allow remote authenticated users to cause a denial of service (crash) and possibly execute arbitrary code via a long string to the (1) display_nav_table, (2) page_limit_selector, (3) print_export_link, or (4) page_num_selector function in cgi/cgiutils.c; (5) status_page_num_selector function in cgi/status.c; or (6) display_command_expansion function in cgi/config.c. NOTE: this can be exploited without authentication by leveraging CVE-2013-7107.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
icinga | icinga | * | |
icinga | icinga | 0.8.0 | |
icinga | icinga | 0.8.1 | |
icinga | icinga | 0.8.2 | |
icinga | icinga | 0.8.3 | |
icinga | icinga | 0.8.4 | |
icinga | icinga | 1.0 | |
icinga | icinga | 1.0 | |
icinga | icinga | 1.0.1 | |
icinga | icinga | 1.0.2 | |
icinga | icinga | 1.0.3 | |
icinga | icinga | 1.2.0 | |
icinga | icinga | 1.2.1 | |
icinga | icinga | 1.3.0 | |
icinga | icinga | 1.3.1 | |
icinga | icinga | 1.4.0 | |
icinga | icinga | 1.4.1 | |
icinga | icinga | 1.6.0 | |
icinga | icinga | 1.6.1 | |
icinga | icinga | 1.6.2 | |
icinga | icinga | 1.7.0 | |
icinga | icinga | 1.7.1 | |
icinga | icinga | 1.7.2 | |
icinga | icinga | 1.7.3 | |
icinga | icinga | 1.7.4 | |
icinga | icinga | 1.8.0 | |
icinga | icinga | 1.8.1 | |
icinga | icinga | 1.8.2 | |
icinga | icinga | 1.8.3 | |
icinga | icinga | 1.9.0 | |
icinga | icinga | 1.9.1 | |
icinga | icinga | 1.9.2 | |
icinga | icinga | 1.9.3 | |
icinga | icinga | 1.10.0 | |
icinga | icinga | 1.10.1 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:icinga:icinga:*:*:*:*:*:*:*:*", "matchCriteriaId": "3BD88897-2A40-4127-B8B6-A4DEAF4BE166", "versionEndIncluding": "1.8.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:0.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "1D65D942-0560-42B0-BAF8-D6B8C4237558", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:0.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "0CF3E50F-0DF1-44C1-9E7D-E3AE9BBAC5C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:0.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "F87DFD18-B038-4E18-889A-FCADDC7E9C23", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:0.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "B9B482D1-BB5D-41CC-A330-214F1EC9BD43", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:0.8.4:*:*:*:*:*:*:*", "matchCriteriaId": "6EB99BAF-6CF9-4F61-A86B-91F4DAE20F58", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "B65BD554-2D66-4237-8829-EC5CFD374E4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "51CBC3F4-EB90-462D-B840-71DB9E8E3667", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "719B37F6-4D3A-4922-B58D-536A775D42D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "7890303A-21C3-47B8-86AF-1B07A01C9AE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "CED3BF83-92C3-4324-BC6E-722309A8787B", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "A5F7F451-E7AA-4C84-874D-7C7E5C162DEA", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "D5250AED-B86C-4415-A274-7DD9659F40D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "C6E333C3-C264-41C9-B358-97A3F62C649D", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "BEAD9B4E-66B1-4E82-8A6F-B46A4F0A61D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "0166CAEF-0126-4B6E-BE57-5398375C17EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "11406052-8C4C-4CA4-9A73-82135D236741", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "29CC0581-0AE1-43FE-8F98-CB2E7204A7E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "246A0425-A4D6-478D-AADB-07A0D3610FED", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "2D7488AD-C2CA-491E-B4E4-322A275EE13A", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "01476892-42B5-44F6-91D2-8C9F680A2F02", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "A830CEA4-06F7-46FB-8216-0D18796F7BF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "EB9B0C24-D65D-4406-B5F7-5EA60F701872", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "5260A6FA-C393-4AD5-B5C8-73616F21FEA7", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.7.4:*:*:*:*:*:*:*", "matchCriteriaId": "94C19BC7-55B5-4D0D-96CC-1C9C40F7829F", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "3C1DE372-E2A4-4C4B-B85C-104D84696090", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "D2B3410C-6FF8-4485-AC06-BBA15A4BC9E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "27F6ACDE-05A0-4688-97FF-EB4C23E8F52D", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "6333E91A-6315-437C-A600-0B824976FBB8", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.9.0:*:*:*:*:*:*:*", "matchCriteriaId": "D8BCA88C-5AA9-4C0D-9FA3-80BA8FBBD521", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "821C9240-E41E-4BCC-910E-63304F8E3790", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "ADFD2677-6BF6-4985-B915-A9395B4A620E", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "FCF96645-E8B6-443A-8761-6F879042F689", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.10.0:*:*:*:*:*:*:*", "matchCriteriaId": "21460019-53D0-440D-A0A6-4B778B478B4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.10.1:*:*:*:*:*:*:*", "matchCriteriaId": "30895AD2-198A-4329-9987-347AABDD7C10", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple stack-based buffer overflows in Icinga before 1.8.5, 1.9 before 1.9.4, and 1.10 before 1.10.2 allow remote authenticated users to cause a denial of service (crash) and possibly execute arbitrary code via a long string to the (1) display_nav_table, (2) page_limit_selector, (3) print_export_link, or (4) page_num_selector function in cgi/cgiutils.c; (5) status_page_num_selector function in cgi/status.c; or (6) display_command_expansion function in cgi/config.c. NOTE: this can be exploited without authentication by leveraging CVE-2013-7107." }, { "lang": "es", "value": "M\u00faltiples desbordamientos de buffer basados en pila en Icinga anteriores a 1.8.5, 1.9 anteriores a 1.9.4, y 1.10 anteriores a 1.10.2 permite a atacantes autenticados remotamente causar denegaci\u00f3n de servicio (ca\u00edda) y posiblemente ejecutar c\u00f3digo arbitrario a trav\u00e9s de una cadena larga a las funciones en cgi/cgiutils.c (1) display_nav_table, (2) page_limit_selector, (3) print_export_link, o (4) page_num_selector; (5) la funci\u00f3n status_page_num_selector en cgi/status.c; o (6) la funci\u00f3n display_command_expansion en cgi/config.c. NOTA: este problema puede ser explotado sin autenticaci\u00f3n aprovechando la vulnerabilidad CVE-2013-7107." } ], "id": "CVE-2013-7106", "lastModified": "2024-11-21T02:00:21.693", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-01-15T16:08:03.877", "references": [ { "source": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2013/12/16/4" }, { "source": "cve@mitre.org", "url": "https://dev.icinga.org/issues/5250" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.icinga.org/2013/12/17/icinga-security-releases-1-10-2-1-9-4-1-8-5/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2013/12/16/4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://dev.icinga.org/issues/5250" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.icinga.org/2013/12/17/icinga-security-releases-1-10-2-1-9-4-1-8-5/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-02-09 00:15
Modified
2024-11-21 08:59
Severity ?
8.3 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:L
8.3 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L
8.3 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L
Summary
Icinga Director is a tool designed to make Icinga 2 configuration handling easy. Not any of Icinga Director's configuration forms used to manipulate the monitoring environment are protected against cross site request forgery (CSRF). It enables attackers to perform changes in the monitoring environment managed by Icinga Director without the awareness of the victim. Users of the map module in version 1.x, should immediately upgrade to v2.0. The mentioned XSS vulnerabilities in Icinga Web are already fixed as well and upgrades to the most recent release of the 2.9, 2.10 or 2.11 branch must be performed if not done yet. Any later major release is also suitable. Icinga Director will receive minor updates to the 1.8, 1.9, 1.10 and 1.11 branches to remedy this issue. Upgrade immediately to a patched release. If that is not feasible, disable the director module for the time being.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:icinga:icinga:*:*:*:*:*:*:*:*", "matchCriteriaId": "0B846BE2-8F30-4A4A-A62B-F5205F5623D3", "versionEndExcluding": "1.8.2", "versionStartIncluding": "1.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:*:*:*:*:*:*:*:*", "matchCriteriaId": "365FE35F-72DF-4287-9FDF-6D7E987C9534", "versionEndExcluding": "1.9.2", "versionStartIncluding": "1.9.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:*:*:*:*:*:*:*:*", "matchCriteriaId": "D59D8750-4A96-4F59-9C75-EF57F9ABD2ED", "versionEndExcluding": "1.10.3", "versionStartIncluding": "1.10.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:*:*:*:*:*:*:*:*", "matchCriteriaId": "87E0A7CE-F6C5-4931-BE94-D36DC69A4005", "versionEndExcluding": "1.11.3", "versionStartIncluding": "1.11.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Icinga Director is a tool designed to make Icinga 2 configuration handling easy. Not any of Icinga Director\u0027s configuration forms used to manipulate the monitoring environment are protected against cross site request forgery (CSRF). It enables attackers to perform changes in the monitoring environment managed by Icinga Director without the awareness of the victim. Users of the map module in version 1.x, should immediately upgrade to v2.0. The mentioned XSS vulnerabilities in Icinga Web are already fixed as well and upgrades to the most recent release of the 2.9, 2.10 or 2.11 branch must be performed if not done yet. Any later major release is also suitable. Icinga Director will receive minor updates to the 1.8, 1.9, 1.10 and 1.11 branches to remedy this issue. Upgrade immediately to a patched release. If that is not feasible, disable the director module for the time being." }, { "lang": "es", "value": "Icinga Director es una herramienta manipulada para facilitar el manejo de la configuraci\u00f3n de Icinga 2. Ninguno de los formularios de configuraci\u00f3n de Icinga Director utilizados para manipular el entorno de monitoreo est\u00e1 protegido contra cross site request forgery (CSRF). Permite a los atacantes realizar cambios en el entorno de monitoreo administrado por Icinga Director sin el conocimiento de la v\u00edctima. Los usuarios del m\u00f3dulo de mapas en la versi\u00f3n 1.x deben actualizar inmediatamente a la versi\u00f3n 2.0. Las vulnerabilidades XSS mencionadas en Icinga Web tambi\u00e9n ya est\u00e1n solucionadas y se deben realizar actualizaciones a la versi\u00f3n m\u00e1s reciente de la rama 2.9, 2.10 o 2.11 si a\u00fan no se han hecho. Cualquier versi\u00f3n importante posterior tambi\u00e9n es adecuada. Icinga Director recibir\u00e1 actualizaciones menores para las ramas 1.8, 1.9, 1.10 y 1.11 para solucionar este problema. Actualice inmediatamente a una versi\u00f3n parcheada. Si eso no es posible, desactive el m\u00f3dulo director por el momento." } ], "id": "CVE-2024-24820", "lastModified": "2024-11-21T08:59:47.043", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:L", "version": "3.1" }, "exploitabilityScore": 1.7, "impactScore": 6.0, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 8.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.5, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-02-09T00:15:08.437", "references": [ { "source": "security-advisories@github.com", "tags": [ "Press/Media Coverage" ], "url": "https://blog.mozilla.org/en/mozilla/firefox-rolls-out-total-cookie-protection-by-default-to-all-users-worldwide/" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Icinga/icingaweb2-module-director/security/advisories/GHSA-3mwp-5p5v-j6q3" }, { "source": "security-advisories@github.com", "tags": [ "Issue Tracking" ], "url": "https://github.com/Icinga/icingaweb2/issues?q=is%3Aissue++is%3Aclosed+4979+4960+4947" }, { "source": "security-advisories@github.com", "tags": [ "Exploit" ], "url": "https://github.com/nbuchwitz/icingaweb2-module-map/pull/86" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/en-is/guide/safari/sfri11471/16.0" }, { "source": "security-advisories@github.com", "tags": [ "Issue Tracking" ], "url": "https://www.chromium.org/updates/same-site/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Press/Media Coverage" ], "url": "https://blog.mozilla.org/en/mozilla/firefox-rolls-out-total-cookie-protection-by-default-to-all-users-worldwide/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Icinga/icingaweb2-module-director/security/advisories/GHSA-3mwp-5p5v-j6q3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking" ], "url": "https://github.com/Icinga/icingaweb2/issues?q=is%3Aissue++is%3Aclosed+4979+4960+4947" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "https://github.com/nbuchwitz/icingaweb2-module-map/pull/86" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.apple.com/en-is/guide/safari/sfri11471/16.0" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking" ], "url": "https://www.chromium.org/updates/same-site/" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-352" } ], "source": "security-advisories@github.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-352" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-08-19 16:15
Modified
2024-11-21 06:15
Severity ?
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Summary
Icinga is a monitoring system which checks the availability of network resources, notifies users of outages, and generates performance data for reporting. In versions 2.5.0 through 2.13.0, ElasticsearchWriter, GelfWriter, InfluxdbWriter and Influxdb2Writer do not verify the server's certificate despite a certificate authority being specified. Icinga 2 instances which connect to any of the mentioned time series databases (TSDBs) using TLS over a spoofable infrastructure should immediately upgrade to version 2.13.1, 2.12.6, or 2.11.11 to patch the issue. Such instances should also change the credentials (if any) used by the TSDB writer feature to authenticate against the TSDB. There are no workarounds aside from upgrading.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:icinga:icinga:*:*:*:*:*:*:*:*", "matchCriteriaId": "F3D2866E-53F4-4990-92EA-B9234946CED9", "versionEndExcluding": "2.11.10", "versionStartIncluding": "2.5.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:*:*:*:*:*:*:*:*", "matchCriteriaId": "5AD97DAA-C4A6-4BC2-BD67-9F3D038C2B05", "versionEndExcluding": "2.12.6", "versionStartIncluding": "2.12.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:*:*:*:*:*:*:*:*", "matchCriteriaId": "1D1FD0A6-747B-4A8E-A130-0BE3C20AECA0", "versionEndExcluding": "2.13.1", "versionStartIncluding": "2.13.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Icinga is a monitoring system which checks the availability of network resources, notifies users of outages, and generates performance data for reporting. In versions 2.5.0 through 2.13.0, ElasticsearchWriter, GelfWriter, InfluxdbWriter and Influxdb2Writer do not verify the server\u0027s certificate despite a certificate authority being specified. Icinga 2 instances which connect to any of the mentioned time series databases (TSDBs) using TLS over a spoofable infrastructure should immediately upgrade to version 2.13.1, 2.12.6, or 2.11.11 to patch the issue. Such instances should also change the credentials (if any) used by the TSDB writer feature to authenticate against the TSDB. There are no workarounds aside from upgrading." }, { "lang": "es", "value": "Icinga es un sistema de monitorizaci\u00f3n que comprueba la disponibilidad de los recursos de red, notifica a usuarios de las interrupciones y genera datos de rendimiento para la elaboraci\u00f3n de informes. En las versiones 2.5.0 a 2.13.0, los par\u00e1metros ElasticsearchWriter, GelfWriter, InfluxdbWriter e Influxdb2Writer no verifican el certificado del servidor a pesar de que se haya especificado una autoridad de certificaci\u00f3n. Las instancias de Icinga 2 que se conectan a cualquiera de las bases de datos de series temporales (TSDB) mencionadas usando TLS sobre una infraestructura falsificable deben actualizar inmediatamente a versiones 2.13.1, 2.12.6 o 2.11.11 para solucionar el problema. Dichas instancias tambi\u00e9n deben cambiar las credenciales (si las presenta) usadas por la funcionalidad TSDB writer para autenticarse contra la TSDB. No se presentan soluciones aparte de la actualizaci\u00f3n." } ], "id": "CVE-2021-37698", "lastModified": "2024-11-21T06:15:43.943", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-08-19T16:15:12.420", "references": [ { "source": "security-advisories@github.com", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/Icinga/icinga2/releases/tag/v2.11.11" }, { "source": "security-advisories@github.com", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/Icinga/icinga2/releases/tag/v2.12.6" }, { "source": "security-advisories@github.com", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/Icinga/icinga2/releases/tag/v2.13.1" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Icinga/icinga2/security/advisories/GHSA-cxfm-8j5v-5qr2" }, { "source": "security-advisories@github.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00010.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/Icinga/icinga2/releases/tag/v2.11.11" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/Icinga/icinga2/releases/tag/v2.12.6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/Icinga/icinga2/releases/tag/v2.13.1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Icinga/icinga2/security/advisories/GHSA-cxfm-8j5v-5qr2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00010.html" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-295" } ], "source": "security-advisories@github.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-295" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-11-18 18:29
Modified
2024-11-21 03:17
Severity ?
Summary
Icinga Core through 1.14.0 initially executes bin/icinga as root but supports configuration options in which this file is owned by a non-root account (and similarly can have etc/icinga.cfg owned by a non-root account), which allows local users to gain privileges by leveraging access to this non-root account, a related issue to CVE-2017-14312. This also affects bin/icingastats, bin/ido2db, and bin/log2ido.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:icinga:icinga:*:*:*:*:*:*:*:*", "matchCriteriaId": "8B9C2B74-B6C4-4B46-AF41-14EF9D58D674", "versionEndIncluding": "1.14.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Icinga Core through 1.14.0 initially executes bin/icinga as root but supports configuration options in which this file is owned by a non-root account (and similarly can have etc/icinga.cfg owned by a non-root account), which allows local users to gain privileges by leveraging access to this non-root account, a related issue to CVE-2017-14312. This also affects bin/icingastats, bin/ido2db, and bin/log2ido." }, { "lang": "es", "value": "Icinga Core hasta la versi\u00f3n 1.14.0 ejecuta inicialmente bin/icinga como root, pero es compatible con opciones de configuraci\u00f3n en las cuales este archivo es propiedad de una cuenta sin root (y, de forma similar, puede poseer etc/icinga.cfg sin root), lo que permite que usuarios locales obtengan privilegios aprovechando el acceso a esta cuenta sin root. Este problema est\u00e1 relacionado con CVE-2017-14312. Esto tambi\u00e9n afecta a bin/icingastats, bin/ido2db y bin/log2ido." } ], "id": "CVE-2017-16882", "lastModified": "2024-11-21T03:17:10.197", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-11-18T18:29:00.233", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Icinga/icinga-core/issues/1601" }, { "source": "cve@mitre.org", "url": "https://security.gentoo.org/glsa/202007-31" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Icinga/icinga-core/issues/1601" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/202007-31" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-732" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-03-27 17:59
Modified
2024-11-21 02:37
Severity ?
Summary
Cross-site scripting (XSS) vulnerability in the Classic-UI with the CSV export link and pagination feature in Icinga before 1.14 allows remote attackers to inject arbitrary web script or HTML via the query string to cgi-bin/status.cgi.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:icinga:icinga:*:*:*:*:*:*:*:*", "matchCriteriaId": "A783EDF9-B375-4F7A-BA5A-15FA3B90F846", "versionEndIncluding": "1.13.4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:leap:42.2:*:*:*:*:*:*:*", "matchCriteriaId": "1EA337A3-B9A3-4962-B8BD-8E0C7C5B28EB", "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse_project:leap:42.1:*:*:*:*:*:*:*", "matchCriteriaId": "CF605E46-ADCE-45B3-BBBA-E593D3CEE2A6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Cross-site scripting (XSS) vulnerability in the Classic-UI with the CSV export link and pagination feature in Icinga before 1.14 allows remote attackers to inject arbitrary web script or HTML via the query string to cgi-bin/status.cgi." }, { "lang": "es", "value": "Vulnerabilidad de XSS en el Classic-UI con el enlace de exportaci\u00f3n CSV y la funcionalidad de paginaci\u00f3n en Icinga en versiones anteriores a 1.14 permite a atacantes remotos inyectar secuencias de comandos web o HTML arbitrarios a trav\u00e9s de la cadena de consulta a cgi-bin/status.cgi." } ], "id": "CVE-2015-8010", "lastModified": "2024-11-21T02:37:50.593", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-03-27T17:59:00.257", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2017-01/msg00019.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2015/10/23/15" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2015/10/29/15" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/97145" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Icinga/icinga-core/issues/1563" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2017-01/msg00019.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2015/10/23/15" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2015/10/29/15" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/97145" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Icinga/icinga-core/issues/1563" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-02-02 09:29
Modified
2024-11-21 04:10
Severity ?
Summary
An issue was discovered in Icinga 2.x through 2.8.1. The daemon creates an icinga2.pid file after dropping privileges to a non-root account, which might allow local users to kill arbitrary processes by leveraging access to this non-root account for icinga2.pid modification before a root script executes a "kill `cat /pathname/icinga2.pid`" command, as demonstrated by icinga2.init.d.cmake.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://github.com/Icinga/icinga2/issues/5991 | Issue Tracking, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/Icinga/icinga2/issues/5991 | Issue Tracking, Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:icinga:icinga:*:*:*:*:*:*:*:*", "matchCriteriaId": "1FDB0B7D-0832-4827-A0A5-B2356027FEA1", "versionEndIncluding": "2.8.1", "versionStartIncluding": "2.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Icinga 2.x through 2.8.1. The daemon creates an icinga2.pid file after dropping privileges to a non-root account, which might allow local users to kill arbitrary processes by leveraging access to this non-root account for icinga2.pid modification before a root script executes a \"kill `cat /pathname/icinga2.pid`\" command, as demonstrated by icinga2.init.d.cmake." }, { "lang": "es", "value": "Se ha descubierto un problema en Icinga hasta la versi\u00f3n 2.8.1. El demonio crea un archivo icinga2.pid tras eliminar privilegios a una cuenta no root, lo que podr\u00eda permitir que usuarios locales terminen procesos arbitrarios aprovechando el acceso a esta cuenta no root para modificar el archivo icinga2.pid antes de que un script root ejecute un comando \"kill `cat /pathname/icinga2.pid`\". Esto se ha demostrado con etc/init.d/icinga2.init.d.cmake." } ], "id": "CVE-2018-6536", "lastModified": "2024-11-21T04:10:51.467", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-02-02T09:29:00.367", "references": [ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Icinga/icinga2/issues/5991" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Icinga/icinga2/issues/5991" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-732" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2011-06-14 17:55
Modified
2024-11-21 01:27
Severity ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in config.c in config.cgi in (1) Nagios 3.2.3 and (2) Icinga before 1.4.1 allow remote attackers to inject arbitrary web script or HTML via the expand parameter, as demonstrated by an (a) command action or a (b) hosts action.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
icinga | icinga | * | |
icinga | icinga | 0.8.0 | |
icinga | icinga | 0.8.1 | |
icinga | icinga | 0.8.2 | |
icinga | icinga | 0.8.3 | |
icinga | icinga | 0.8.4 | |
icinga | icinga | 1.0 | |
icinga | icinga | 1.0 | |
icinga | icinga | 1.0.1 | |
icinga | icinga | 1.0.2 | |
icinga | icinga | 1.0.3 | |
icinga | icinga | 1.2.0 | |
icinga | icinga | 1.2.1 | |
icinga | icinga | 1.3.0 | |
icinga | icinga | 1.3.1 | |
nagios | nagios | 3.2.3 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:icinga:icinga:*:*:*:*:*:*:*:*", "matchCriteriaId": "10436D2F-3CCB-4ED6-9327-3CD6BA5E43D5", "versionEndIncluding": "1.4.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:0.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "1D65D942-0560-42B0-BAF8-D6B8C4237558", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:0.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "0CF3E50F-0DF1-44C1-9E7D-E3AE9BBAC5C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:0.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "F87DFD18-B038-4E18-889A-FCADDC7E9C23", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:0.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "B9B482D1-BB5D-41CC-A330-214F1EC9BD43", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:0.8.4:*:*:*:*:*:*:*", "matchCriteriaId": "6EB99BAF-6CF9-4F61-A86B-91F4DAE20F58", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "B65BD554-2D66-4237-8829-EC5CFD374E4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "51CBC3F4-EB90-462D-B840-71DB9E8E3667", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "719B37F6-4D3A-4922-B58D-536A775D42D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "7890303A-21C3-47B8-86AF-1B07A01C9AE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "CED3BF83-92C3-4324-BC6E-722309A8787B", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "A5F7F451-E7AA-4C84-874D-7C7E5C162DEA", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "D5250AED-B86C-4415-A274-7DD9659F40D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "C6E333C3-C264-41C9-B358-97A3F62C649D", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "BEAD9B4E-66B1-4E82-8A6F-B46A4F0A61D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:nagios:nagios:3.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "4584E0CD-A0F9-4AD1-ACC5-800E38F5DD59", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in config.c in config.cgi in (1) Nagios 3.2.3 and (2) Icinga before 1.4.1 allow remote attackers to inject arbitrary web script or HTML via the expand parameter, as demonstrated by an (a) command action or a (b) hosts action." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades de ejecuci\u00f3n de secuencias de comandos en sitios cruzados (XSS) en config.c en config.cgi en (1) Nagios v3.2.3 y (2) Icinga antes de v1.4.1 permite a atacantes remotos inyectar secuencias de comandos web o HTML a trav\u00e9s del par\u00e1metro expand, como se demuestra por (a) la acci\u00f3n command o (b) una acci\u00f3n hosts." } ], "id": "CVE-2011-2179", "lastModified": "2024-11-21T01:27:45.740", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2011-06-14T17:55:06.437", "references": [ { "source": "secalert@redhat.com", "url": "http://archives.neohapsis.com/archives/bugtraq/2011-06/0017.html" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Patch" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2011-06/0018.html" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/44974" }, { "source": "secalert@redhat.com", "url": "http://securityreason.com/securityalert/8274" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://tracker.nagios.org/view.php?id=224" }, { "source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2011/06/01/10" }, { "source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2011/06/02/6" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Patch" ], "url": "http://www.rul3z.de/advisories/SSCHADV2011-005.txt" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Patch" ], "url": "http://www.rul3z.de/advisories/SSCHADV2011-006.txt" }, { "source": "secalert@redhat.com", "url": "http://www.securityfocus.com/bid/48087" }, { "source": "secalert@redhat.com", "url": "http://www.ubuntu.com/usn/USN-1151-1" }, { "source": "secalert@redhat.com", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=709871" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "https://dev.icinga.org/issues/1605" }, { "source": "secalert@redhat.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67797" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://archives.neohapsis.com/archives/bugtraq/2011-06/0017.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2011-06/0018.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/44974" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/8274" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://tracker.nagios.org/view.php?id=224" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2011/06/01/10" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2011/06/02/6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "http://www.rul3z.de/advisories/SSCHADV2011-005.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch" ], "url": "http://www.rul3z.de/advisories/SSCHADV2011-006.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/48087" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ubuntu.com/usn/USN-1151-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=709871" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "https://dev.icinga.org/issues/1605" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67797" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-02-28 15:13
Modified
2024-11-21 02:05
Severity ?
Summary
Stack-based buffer overflow in the cmd_submitf function in cgi/cmd.c in Nagios Core, possibly 4.0.3rc1 and earlier, and Icinga before 1.8.6, 1.9 before 1.9.5, and 1.10 before 1.10.3 allows remote attackers to cause a denial of service (segmentation fault) via a long message to cmd.cgi.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
icinga | icinga | * | |
icinga | icinga | 1.8.0 | |
icinga | icinga | 1.8.1 | |
icinga | icinga | 1.8.2 | |
icinga | icinga | 1.8.3 | |
icinga | icinga | 1.8.4 | |
icinga | icinga | 1.9.0 | |
icinga | icinga | 1.9.1 | |
icinga | icinga | 1.9.2 | |
icinga | icinga | 1.9.3 | |
icinga | icinga | 1.9.4 | |
icinga | icinga | 1.10.0 | |
icinga | icinga | 1.10.1 | |
icinga | icinga | 1.10.2 | |
nagios | nagios | * | |
nagios | nagios | 4.0.0 | |
nagios | nagios | 4.0.0 | |
nagios | nagios | 4.0.0 | |
nagios | nagios | 4.0.0 | |
nagios | nagios | 4.0.2 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:icinga:icinga:*:*:*:*:*:*:*:*", "matchCriteriaId": "8E3B5ADE-C251-4A5B-A3E1-323BD96F1242", "versionEndIncluding": "1.8.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "3C1DE372-E2A4-4C4B-B85C-104D84696090", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "D2B3410C-6FF8-4485-AC06-BBA15A4BC9E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "27F6ACDE-05A0-4688-97FF-EB4C23E8F52D", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "6333E91A-6315-437C-A600-0B824976FBB8", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.8.4:*:*:*:*:*:*:*", "matchCriteriaId": "332D5DB3-58A3-41BD-907B-6959B07F643B", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.9.0:*:*:*:*:*:*:*", "matchCriteriaId": "D8BCA88C-5AA9-4C0D-9FA3-80BA8FBBD521", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "821C9240-E41E-4BCC-910E-63304F8E3790", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "ADFD2677-6BF6-4985-B915-A9395B4A620E", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "FCF96645-E8B6-443A-8761-6F879042F689", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.9.4:*:*:*:*:*:*:*", "matchCriteriaId": "1912AB1A-C7A5-403A-873A-52FF7D2C5BDE", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.10.0:*:*:*:*:*:*:*", "matchCriteriaId": "21460019-53D0-440D-A0A6-4B778B478B4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.10.1:*:*:*:*:*:*:*", "matchCriteriaId": "30895AD2-198A-4329-9987-347AABDD7C10", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.10.2:*:*:*:*:*:*:*", "matchCriteriaId": "2179AA2D-8FAF-4E1E-8F1F-64BBDEFABB4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:nagios:nagios:*:rc1:*:*:*:*:*:*", "matchCriteriaId": "188CC315-C3B3-467E-BDEC-2C4CAA4B6470", "versionEndIncluding": "4.0.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:nagios:nagios:4.0.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "834089CF-70FA-4785-9CE0-01CCD5707C19", "vulnerable": true }, { "criteria": "cpe:2.3:a:nagios:nagios:4.0.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "E610186F-91AC-41A6-AC3F-DBFF8EC17316", "vulnerable": true }, { "criteria": "cpe:2.3:a:nagios:nagios:4.0.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "F8911118-ABD8-4698-9E2D-80059F3A5B32", "vulnerable": true }, { "criteria": "cpe:2.3:a:nagios:nagios:4.0.0:beta4:*:*:*:*:*:*", "matchCriteriaId": "B737174D-CA20-4DE4-8147-6317E7A51396", "vulnerable": true }, { "criteria": "cpe:2.3:a:nagios:nagios:4.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "DEE550BE-D6A7-4DB8-9CF1-A265085EC388", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in the cmd_submitf function in cgi/cmd.c in Nagios Core, possibly 4.0.3rc1 and earlier, and Icinga before 1.8.6, 1.9 before 1.9.5, and 1.10 before 1.10.3 allows remote attackers to cause a denial of service (segmentation fault) via a long message to cmd.cgi." }, { "lang": "es", "value": "Desbordamiento de buffer basado en pila en la funci\u00f3n cmd_submitf en cgi/cmd.c en Nagios Core, posiblemente 4.0.3rc1 y anteriores e Icinga anterior a 1.8.6, 1.9 anterior a 1.9.5 y 1.10 anterior a 1.10.3 permite a atacantes remotos causar una denegaci\u00f3n de servicio (fallo de segmentaci\u00f3n) a trav\u00e9s de un mensaje largo hacia cmd.cgi." } ], "id": "CVE-2014-1878", "lastModified": "2024-11-21T02:05:11.617", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-02-28T15:13:04.063", "references": [ { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-updates/2014-04/msg00033.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/57024" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/65605" }, { "source": "cve@mitre.org", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1066578" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "https://dev.icinga.org/issues/5434" }, { "source": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2018/12/msg00014.html" }, { "source": "cve@mitre.org", "url": "https://www.icinga.org/2014/02/11/bugfix-releases-1-10-3-1-9-5-1-8-6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2014-04/msg00033.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/57024" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/65605" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1066578" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "https://dev.icinga.org/issues/5434" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.debian.org/debian-lts-announce/2018/12/msg00014.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.icinga.org/2014/02/11/bugfix-releases-1-10-3-1-9-5-1-8-6" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2012-08-25 10:29
Modified
2024-11-21 01:40
Severity ?
Summary
The database creation script (module/idoutils/db/scripts/create_mysqldb.sh) in Icinga 1.7.1 grants access to all databases to the icinga user, which allows icinga users to access other databases via unspecified vectors.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:icinga:icinga:1.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "A830CEA4-06F7-46FB-8216-0D18796F7BF0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The database creation script (module/idoutils/db/scripts/create_mysqldb.sh) in Icinga 1.7.1 grants access to all databases to the icinga user, which allows icinga users to access other databases via unspecified vectors." }, { "lang": "es", "value": "El script de creaci\u00f3n de base de datos (module/idoutils/db/scripts/create_mysqldb.sh) en Icinga v1.7.1 garantiza el acceso a todas las bases de datos para el usuario icinga, lo que permite a los usuarios acceder a otras bases de datos icinga a trav\u00e9s de vectores no especificados." } ], "id": "CVE-2012-3441", "lastModified": "2024-11-21T01:40:53.023", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-08-25T10:29:51.160", "references": [ { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00012.html" }, { "source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2012/07/30/6" }, { "source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2012/07/30/7" }, { "source": "secalert@redhat.com", "url": "https://bugzilla.novell.com/show_bug.cgi?id=767319" }, { "source": "secalert@redhat.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78874" }, { "source": "secalert@redhat.com", "url": "https://git.icinga.org/?p=icinga-core.git%3Ba=commitdiff%3Bh=712813d3118a5b9e5a496179cab81dbe91f69d63" }, { "source": "secalert@redhat.com", "url": "https://git.icinga.org/?p=icinga-core.git%3Ba=commitdiff%3Bh=dcd45fb6931c4abf710829bee21af09f842bc281" }, { "source": "secalert@redhat.com", "url": "https://git.icinga.org/?p=icinga-doc.git%3Ba=commitdiff%3Bh=619a08ca1178144b8a3a5caafff32a2d3918edab" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2012-08/msg00012.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2012/07/30/6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2012/07/30/7" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.novell.com/show_bug.cgi?id=767319" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/78874" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://git.icinga.org/?p=icinga-core.git%3Ba=commitdiff%3Bh=712813d3118a5b9e5a496179cab81dbe91f69d63" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://git.icinga.org/?p=icinga-core.git%3Ba=commitdiff%3Bh=dcd45fb6931c4abf710829bee21af09f842bc281" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://git.icinga.org/?p=icinga-doc.git%3Ba=commitdiff%3Bh=619a08ca1178144b8a3a5caafff32a2d3918edab" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-264" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2013-01-22 23:55
Modified
2024-11-21 01:45
Severity ?
Summary
Multiple stack-based buffer overflows in the get_history function in history.cgi in Nagios Core before 3.4.4, and Icinga 1.6.x before 1.6.2, 1.7.x before 1.7.4, and 1.8.x before 1.8.4, might allow remote attackers to execute arbitrary code via a long (1) host_name variable (host parameter) or (2) svc_description variable.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
nagios | nagios | * | |
nagios | nagios | 3.0 | |
nagios | nagios | 3.0 | |
nagios | nagios | 3.0 | |
nagios | nagios | 3.0 | |
nagios | nagios | 3.0 | |
nagios | nagios | 3.0 | |
nagios | nagios | 3.0 | |
nagios | nagios | 3.0 | |
nagios | nagios | 3.0 | |
nagios | nagios | 3.0 | |
nagios | nagios | 3.0 | |
nagios | nagios | 3.0 | |
nagios | nagios | 3.0 | |
nagios | nagios | 3.0 | |
nagios | nagios | 3.0 | |
nagios | nagios | 3.0 | |
nagios | nagios | 3.0.1 | |
nagios | nagios | 3.0.2 | |
nagios | nagios | 3.0.3 | |
nagios | nagios | 3.0.4 | |
nagios | nagios | 3.0.5 | |
nagios | nagios | 3.0.6 | |
nagios | nagios | 3.1.0 | |
nagios | nagios | 3.1.1 | |
nagios | nagios | 3.1.2 | |
nagios | nagios | 3.2.0 | |
nagios | nagios | 3.2.1 | |
nagios | nagios | 3.2.2 | |
nagios | nagios | 3.2.3 | |
nagios | nagios | 3.3.1 | |
nagios | nagios | 3.4.0 | |
nagios | nagios | 3.4.1 | |
nagios | nagios | 3.4.2 | |
icinga | icinga | 1.6.0 | |
icinga | icinga | 1.6.1 | |
icinga | icinga | 1.7.0 | |
icinga | icinga | 1.7.1 | |
icinga | icinga | 1.7.2 | |
icinga | icinga | 1.7.3 | |
icinga | icinga | 1.8.0 | |
icinga | icinga | 1.8.1 | |
icinga | icinga | 1.8.2 | |
icinga | icinga | 1.8.3 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nagios:nagios:*:*:*:*:*:*:*:*", "matchCriteriaId": "BB2E98B5-7093-4713-BD68-4873F81937A2", "versionEndIncluding": "3.4.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:nagios:nagios:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "DDCA77EF-1020-4068-9CDC-5CF3B0CD66A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:nagios:nagios:3.0:alpha1:*:*:*:*:*:*", "matchCriteriaId": "751C46D5-877F-454B-8488-BBCA10CA4930", "vulnerable": true }, { "criteria": "cpe:2.3:a:nagios:nagios:3.0:alpha2:*:*:*:*:*:*", "matchCriteriaId": "F4754494-17BE-496E-A7B8-453B3028CC45", "vulnerable": true }, { "criteria": "cpe:2.3:a:nagios:nagios:3.0:alpha3:*:*:*:*:*:*", "matchCriteriaId": "CD15E8FA-04D3-4625-BEA5-9F5CC0337699", "vulnerable": true }, { "criteria": "cpe:2.3:a:nagios:nagios:3.0:alpha4:*:*:*:*:*:*", "matchCriteriaId": "713C5F3E-AA57-4F52-AC0A-9B1F25C25580", "vulnerable": true }, { "criteria": "cpe:2.3:a:nagios:nagios:3.0:alpha5:*:*:*:*:*:*", "matchCriteriaId": "690EA084-9E58-4226-B490-2969E6C6BEBC", "vulnerable": true }, { "criteria": "cpe:2.3:a:nagios:nagios:3.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "0AFABA9F-4A45-4150-AED1-897267076A32", "vulnerable": true }, { "criteria": "cpe:2.3:a:nagios:nagios:3.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "830BB564-82FD-4519-A8EA-DCDF74F2BC54", "vulnerable": true }, { "criteria": "cpe:2.3:a:nagios:nagios:3.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "9A975310-9591-4EBF-B987-CA43433B4C54", "vulnerable": true }, { "criteria": "cpe:2.3:a:nagios:nagios:3.0:beta4:*:*:*:*:*:*", "matchCriteriaId": "8653D6A2-4B5B-4F1D-A898-8F81F29C6FC2", "vulnerable": true }, { "criteria": "cpe:2.3:a:nagios:nagios:3.0:beta5:*:*:*:*:*:*", "matchCriteriaId": "D18649FF-8838-432E-93B8-3F8B82B0DEA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:nagios:nagios:3.0:beta6:*:*:*:*:*:*", "matchCriteriaId": "9375EA90-0763-4817-8C7D-2D7E116E043F", "vulnerable": true }, { "criteria": "cpe:2.3:a:nagios:nagios:3.0:beta7:*:*:*:*:*:*", "matchCriteriaId": "C02C2F95-2AC2-4E0C-B5D0-785CDF1EDB85", "vulnerable": true }, { "criteria": "cpe:2.3:a:nagios:nagios:3.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "12E7BC34-65F0-4DD6-8809-F05320955479", "vulnerable": true }, { "criteria": "cpe:2.3:a:nagios:nagios:3.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "390CFA92-68AE-4DE9-A199-1B7290A82168", "vulnerable": true }, { "criteria": "cpe:2.3:a:nagios:nagios:3.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "1E56F249-3E6A-4764-8CAE-D3E5B6A86AB3", "vulnerable": true }, { "criteria": "cpe:2.3:a:nagios:nagios:3.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "953745B7-1381-47F5-8012-E699EFA065CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:nagios:nagios:3.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "87A8A3DA-61AF-4369-ACB0-7D54EEB1DAA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:nagios:nagios:3.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "40B7525F-EEE1-4537-BCE6-15DF3E348FEF", "vulnerable": true }, { "criteria": "cpe:2.3:a:nagios:nagios:3.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "6B831C72-C932-4B8C-8B16-C3BC2672AF98", "vulnerable": true }, { "criteria": "cpe:2.3:a:nagios:nagios:3.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "FC5BB3C9-BBC6-43D8-830A-38020F50B148", "vulnerable": true }, { "criteria": "cpe:2.3:a:nagios:nagios:3.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "BC9E1C24-9907-44F4-9166-5C679F05DF12", "vulnerable": true }, { "criteria": "cpe:2.3:a:nagios:nagios:3.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "A8BE6777-6CA9-443E-A2A5-CCD3ED7EAECF", "vulnerable": true }, { "criteria": "cpe:2.3:a:nagios:nagios:3.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "9F8F3B76-7443-437E-B908-95D0EF0214C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:nagios:nagios:3.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "EF23E8B9-6F07-471A-8332-E6B35DFCE37A", "vulnerable": true }, { "criteria": "cpe:2.3:a:nagios:nagios:3.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "4EEFF0B7-60B4-4022-9EF5-101B707BAC6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:nagios:nagios:3.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "7BC14996-78F9-4A95-9750-1229E57C19C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:nagios:nagios:3.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "C4C3195A-7B72-45BA-8F83-6B0FE00D3B8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:nagios:nagios:3.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "4584E0CD-A0F9-4AD1-ACC5-800E38F5DD59", "vulnerable": true }, { "criteria": "cpe:2.3:a:nagios:nagios:3.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "166D983D-2D1B-45D4-8ACF-68ED11BBF5BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:nagios:nagios:3.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "68D2FFFD-9A12-4230-90F6-AC5E3676FD04", "vulnerable": true }, { "criteria": "cpe:2.3:a:nagios:nagios:3.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "21A1C2E3-9E5C-4F00-8393-33DAC6765332", "vulnerable": true }, { "criteria": "cpe:2.3:a:nagios:nagios:3.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "F2C8C695-EBA7-4FD0-BBD0-F339757559EE", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:icinga:icinga:1.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "29CC0581-0AE1-43FE-8F98-CB2E7204A7E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "246A0425-A4D6-478D-AADB-07A0D3610FED", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "01476892-42B5-44F6-91D2-8C9F680A2F02", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "A830CEA4-06F7-46FB-8216-0D18796F7BF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "EB9B0C24-D65D-4406-B5F7-5EA60F701872", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "5260A6FA-C393-4AD5-B5C8-73616F21FEA7", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "3C1DE372-E2A4-4C4B-B85C-104D84696090", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "D2B3410C-6FF8-4485-AC06-BBA15A4BC9E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "27F6ACDE-05A0-4688-97FF-EB4C23E8F52D", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "6333E91A-6315-437C-A600-0B824976FBB8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple stack-based buffer overflows in the get_history function in history.cgi in Nagios Core before 3.4.4, and Icinga 1.6.x before 1.6.2, 1.7.x before 1.7.4, and 1.8.x before 1.8.4, might allow remote attackers to execute arbitrary code via a long (1) host_name variable (host parameter) or (2) svc_description variable." }, { "lang": "es", "value": "M\u00faltiples desbordamientos de b\u00fafer basado en pila en la funci\u00f3n get_history en history.cgi en Nagios core anterior a v3.4.4, y Icinga v1.6.x anterior a v1.6.2, v1.7.x anterior a v1.7.4, y v1.8.x anterior a v1.8.4, permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de una variable (1) host_name de gran longitud o (2) de la variable svc_description." } ], "id": "CVE-2012-6096", "lastModified": "2024-11-21T01:45:48.840", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2013-01-22T23:55:03.247", "references": [ { "source": "secalert@redhat.com", "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2012-December/089125.html" }, { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00033.html" }, { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00060.html" }, { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00077.html" }, { "source": "secalert@redhat.com", "url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00088.html" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/51863" }, { "source": "secalert@redhat.com", "url": "http://www.debian.org/security/2013/dsa-2616" }, { "source": "secalert@redhat.com", "url": "http://www.debian.org/security/2013/dsa-2653" }, { "source": "secalert@redhat.com", "tags": [ "Exploit" ], "url": "http://www.exploit-db.com/exploits/24084" }, { "source": "secalert@redhat.com", "tags": [ "Exploit" ], "url": "http://www.exploit-db.com/exploits/24159" }, { "source": "secalert@redhat.com", "url": "http://www.nagios.org/projects/nagioscore/history/core-3x" }, { "source": "secalert@redhat.com", "url": "http://www.osvdb.org/89170" }, { "source": "secalert@redhat.com", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/56879" }, { "source": "secalert@redhat.com", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=893269" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "https://dev.icinga.org/issues/3532" }, { "source": "secalert@redhat.com", "url": "https://www.icinga.org/2013/01/14/icinga-1-6-2-1-7-4-1-8-4-released/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2012-December/089125.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00033.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00060.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00077.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2013-01/msg00088.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/51863" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2013/dsa-2616" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2013/dsa-2653" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.exploit-db.com/exploits/24084" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.exploit-db.com/exploits/24159" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.nagios.org/projects/nagioscore/history/core-3x" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/89170" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.securityfocus.com/bid/56879" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=893269" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://dev.icinga.org/issues/3532" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.icinga.org/2013/01/14/icinga-1-6-2-1-7-4-1-8-4-released/" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-03-25 16:55
Modified
2024-11-21 02:06
Severity ?
Summary
Multiple off-by-one errors in Icinga, possibly 1.10.2 and earlier, allow remote attackers to cause a denial of service (crash) via unspecified vectors to the (1) display_nav_table, (2) print_export_link, (3) page_num_selector, or (4) page_limit_selector function in cgi/cgiutils.c or (5) status_page_num_selector function in cgi/status.c, which triggers a stack-based buffer overflow.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:icinga:icinga:*:*:*:*:*:*:*:*", "matchCriteriaId": "2ACE5C1A-6B4F-4997-95EE-A136688872D0", "versionEndIncluding": "1.10.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.10.0:*:*:*:*:*:*:*", "matchCriteriaId": "21460019-53D0-440D-A0A6-4B778B478B4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.10.1:*:*:*:*:*:*:*", "matchCriteriaId": "30895AD2-198A-4329-9987-347AABDD7C10", "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*", "matchCriteriaId": "DFBF430B-0832-44B0-AA0E-BA9E467F7668", "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*", "matchCriteriaId": "A10BC294-9196-425F-9FB0-B1625465B47F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple off-by-one errors in Icinga, possibly 1.10.2 and earlier, allow remote attackers to cause a denial of service (crash) via unspecified vectors to the (1) display_nav_table, (2) print_export_link, (3) page_num_selector, or (4) page_limit_selector function in cgi/cgiutils.c or (5) status_page_num_selector function in cgi/status.c, which triggers a stack-based buffer overflow." }, { "lang": "es", "value": "M\u00faltiples errores de superaci\u00f3n de l\u00edmite (off-by-one) en Icinga, posiblemente 1.10.2 y anteriores, permiten a atacantes remotos causar una denegaci\u00f3n de servicio (ca\u00edda) a trav\u00e9s de vectores no especificados hacia la funci\u00f3n (1) display_nav_table, (2) print_export_link, (3) page_num_selector o (4) page_limit_selector en cgi/cgiutils.c or la funci\u00f3n (5) status_page_num_selector en cgi/status.c, lo que provoca un desbordamiento de buffer basado en pila." } ], "id": "CVE-2014-2386", "lastModified": "2024-11-21T02:06:11.570", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-03-25T16:55:28.630", "references": [ { "source": "cve@mitre.org", "url": "http://comments.gmane.org/gmane.comp.security.oss.general/12355" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-updates/2014-03/msg00072.html" }, { "source": "cve@mitre.org", "url": "https://dev.icinga.org/issues/5663" }, { "source": "cve@mitre.org", "url": "https://git.icinga.org/?p=icinga-core.git%3Ba=commitdiff%3Bh=73285093b71a5551abdaab0a042d3d6bae093b0d" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://comments.gmane.org/gmane.comp.security.oss.general/12355" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2014-03/msg00072.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://dev.icinga.org/issues/5663" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://git.icinga.org/?p=icinga-core.git%3Ba=commitdiff%3Bh=73285093b71a5551abdaab0a042d3d6bae093b0d" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-189" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-01-15 16:08
Modified
2024-11-21 02:00
Severity ?
Summary
Multiple off-by-one errors in Nagios Core 3.5.1, 4.0.2, and earlier, and Icinga before 1.8.5, 1.9 before 1.9.4, and 1.10 before 1.10.2 allow remote authenticated users to obtain sensitive information from process memory or cause a denial of service (crash) via a long string in the last key value in the variable list to the process_cgivars function in (1) avail.c, (2) cmd.c, (3) config.c, (4) extinfo.c, (5) histogram.c, (6) notifications.c, (7) outages.c, (8) status.c, (9) statusmap.c, (10) summary.c, and (11) trends.c in cgi/, which triggers a heap-based buffer over-read.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nagios:nagios:*:*:*:*:*:*:*:*", "matchCriteriaId": "D6B3FCCE-CD72-42D2-9ED4-DE7E0F7D5770", "versionEndIncluding": "4.0.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:nagios:nagios:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "DDCA77EF-1020-4068-9CDC-5CF3B0CD66A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:nagios:nagios:3.0:alpha1:*:*:*:*:*:*", "matchCriteriaId": "751C46D5-877F-454B-8488-BBCA10CA4930", "vulnerable": true }, { "criteria": "cpe:2.3:a:nagios:nagios:3.0:alpha2:*:*:*:*:*:*", "matchCriteriaId": "F4754494-17BE-496E-A7B8-453B3028CC45", "vulnerable": true }, { "criteria": "cpe:2.3:a:nagios:nagios:3.0:alpha3:*:*:*:*:*:*", "matchCriteriaId": "CD15E8FA-04D3-4625-BEA5-9F5CC0337699", "vulnerable": true }, { "criteria": "cpe:2.3:a:nagios:nagios:3.0:alpha4:*:*:*:*:*:*", "matchCriteriaId": "713C5F3E-AA57-4F52-AC0A-9B1F25C25580", "vulnerable": true }, { "criteria": "cpe:2.3:a:nagios:nagios:3.0:alpha5:*:*:*:*:*:*", "matchCriteriaId": "690EA084-9E58-4226-B490-2969E6C6BEBC", "vulnerable": true }, { "criteria": "cpe:2.3:a:nagios:nagios:3.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "0AFABA9F-4A45-4150-AED1-897267076A32", "vulnerable": true }, { "criteria": "cpe:2.3:a:nagios:nagios:3.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "830BB564-82FD-4519-A8EA-DCDF74F2BC54", "vulnerable": true }, { "criteria": "cpe:2.3:a:nagios:nagios:3.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "9A975310-9591-4EBF-B987-CA43433B4C54", "vulnerable": true }, { "criteria": "cpe:2.3:a:nagios:nagios:3.0:beta4:*:*:*:*:*:*", "matchCriteriaId": "8653D6A2-4B5B-4F1D-A898-8F81F29C6FC2", "vulnerable": true }, { "criteria": "cpe:2.3:a:nagios:nagios:3.0:beta5:*:*:*:*:*:*", "matchCriteriaId": "D18649FF-8838-432E-93B8-3F8B82B0DEA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:nagios:nagios:3.0:beta6:*:*:*:*:*:*", "matchCriteriaId": "9375EA90-0763-4817-8C7D-2D7E116E043F", "vulnerable": true }, { "criteria": "cpe:2.3:a:nagios:nagios:3.0:beta7:*:*:*:*:*:*", "matchCriteriaId": "C02C2F95-2AC2-4E0C-B5D0-785CDF1EDB85", "vulnerable": true }, { "criteria": "cpe:2.3:a:nagios:nagios:3.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "12E7BC34-65F0-4DD6-8809-F05320955479", "vulnerable": true }, { "criteria": "cpe:2.3:a:nagios:nagios:3.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "390CFA92-68AE-4DE9-A199-1B7290A82168", "vulnerable": true }, { "criteria": "cpe:2.3:a:nagios:nagios:3.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "1E56F249-3E6A-4764-8CAE-D3E5B6A86AB3", "vulnerable": true }, { "criteria": "cpe:2.3:a:nagios:nagios:3.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "953745B7-1381-47F5-8012-E699EFA065CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:nagios:nagios:3.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "87A8A3DA-61AF-4369-ACB0-7D54EEB1DAA1", "vulnerable": true }, { "criteria": "cpe:2.3:a:nagios:nagios:3.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "40B7525F-EEE1-4537-BCE6-15DF3E348FEF", "vulnerable": true }, { "criteria": "cpe:2.3:a:nagios:nagios:3.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "6B831C72-C932-4B8C-8B16-C3BC2672AF98", "vulnerable": true }, { "criteria": "cpe:2.3:a:nagios:nagios:3.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "FC5BB3C9-BBC6-43D8-830A-38020F50B148", "vulnerable": true }, { "criteria": "cpe:2.3:a:nagios:nagios:3.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "BC9E1C24-9907-44F4-9166-5C679F05DF12", "vulnerable": true }, { "criteria": "cpe:2.3:a:nagios:nagios:3.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "A8BE6777-6CA9-443E-A2A5-CCD3ED7EAECF", "vulnerable": true }, { "criteria": "cpe:2.3:a:nagios:nagios:3.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "9F8F3B76-7443-437E-B908-95D0EF0214C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:nagios:nagios:3.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "EF23E8B9-6F07-471A-8332-E6B35DFCE37A", "vulnerable": true }, { "criteria": "cpe:2.3:a:nagios:nagios:3.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "4EEFF0B7-60B4-4022-9EF5-101B707BAC6C", "vulnerable": true }, { "criteria": "cpe:2.3:a:nagios:nagios:3.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "7BC14996-78F9-4A95-9750-1229E57C19C7", "vulnerable": true }, { "criteria": "cpe:2.3:a:nagios:nagios:3.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "C4C3195A-7B72-45BA-8F83-6B0FE00D3B8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:nagios:nagios:3.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "4584E0CD-A0F9-4AD1-ACC5-800E38F5DD59", "vulnerable": true }, { "criteria": "cpe:2.3:a:nagios:nagios:3.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "166D983D-2D1B-45D4-8ACF-68ED11BBF5BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:nagios:nagios:3.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "68D2FFFD-9A12-4230-90F6-AC5E3676FD04", "vulnerable": true }, { "criteria": "cpe:2.3:a:nagios:nagios:3.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "21A1C2E3-9E5C-4F00-8393-33DAC6765332", "vulnerable": true }, { "criteria": "cpe:2.3:a:nagios:nagios:3.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "F2C8C695-EBA7-4FD0-BBD0-F339757559EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:nagios:nagios:3.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "B06E7504-A5C5-42F3-B325-EE9905A9783A", "vulnerable": true }, { "criteria": "cpe:2.3:a:nagios:nagios:3.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "4594D8DC-97C7-4D8A-8CF8-56BD11C85733", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:icinga:icinga:*:*:*:*:*:*:*:*", "matchCriteriaId": "3BD88897-2A40-4127-B8B6-A4DEAF4BE166", "versionEndIncluding": "1.8.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:0.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "1D65D942-0560-42B0-BAF8-D6B8C4237558", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:0.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "0CF3E50F-0DF1-44C1-9E7D-E3AE9BBAC5C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:0.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "F87DFD18-B038-4E18-889A-FCADDC7E9C23", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:0.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "B9B482D1-BB5D-41CC-A330-214F1EC9BD43", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:0.8.4:*:*:*:*:*:*:*", "matchCriteriaId": "6EB99BAF-6CF9-4F61-A86B-91F4DAE20F58", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "B65BD554-2D66-4237-8829-EC5CFD374E4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "51CBC3F4-EB90-462D-B840-71DB9E8E3667", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "719B37F6-4D3A-4922-B58D-536A775D42D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "7890303A-21C3-47B8-86AF-1B07A01C9AE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "CED3BF83-92C3-4324-BC6E-722309A8787B", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "A5F7F451-E7AA-4C84-874D-7C7E5C162DEA", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "D5250AED-B86C-4415-A274-7DD9659F40D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "C6E333C3-C264-41C9-B358-97A3F62C649D", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "BEAD9B4E-66B1-4E82-8A6F-B46A4F0A61D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "0166CAEF-0126-4B6E-BE57-5398375C17EC", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "11406052-8C4C-4CA4-9A73-82135D236741", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "29CC0581-0AE1-43FE-8F98-CB2E7204A7E7", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "246A0425-A4D6-478D-AADB-07A0D3610FED", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "2D7488AD-C2CA-491E-B4E4-322A275EE13A", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "01476892-42B5-44F6-91D2-8C9F680A2F02", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "A830CEA4-06F7-46FB-8216-0D18796F7BF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "EB9B0C24-D65D-4406-B5F7-5EA60F701872", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "5260A6FA-C393-4AD5-B5C8-73616F21FEA7", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.7.4:*:*:*:*:*:*:*", "matchCriteriaId": "94C19BC7-55B5-4D0D-96CC-1C9C40F7829F", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "3C1DE372-E2A4-4C4B-B85C-104D84696090", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "D2B3410C-6FF8-4485-AC06-BBA15A4BC9E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "27F6ACDE-05A0-4688-97FF-EB4C23E8F52D", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "6333E91A-6315-437C-A600-0B824976FBB8", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.9.0:*:*:*:*:*:*:*", "matchCriteriaId": "D8BCA88C-5AA9-4C0D-9FA3-80BA8FBBD521", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "821C9240-E41E-4BCC-910E-63304F8E3790", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "ADFD2677-6BF6-4985-B915-A9395B4A620E", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "FCF96645-E8B6-443A-8761-6F879042F689", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.10.0:*:*:*:*:*:*:*", "matchCriteriaId": "21460019-53D0-440D-A0A6-4B778B478B4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:1.10.1:*:*:*:*:*:*:*", "matchCriteriaId": "30895AD2-198A-4329-9987-347AABDD7C10", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple off-by-one errors in Nagios Core 3.5.1, 4.0.2, and earlier, and Icinga before 1.8.5, 1.9 before 1.9.4, and 1.10 before 1.10.2 allow remote authenticated users to obtain sensitive information from process memory or cause a denial of service (crash) via a long string in the last key value in the variable list to the process_cgivars function in (1) avail.c, (2) cmd.c, (3) config.c, (4) extinfo.c, (5) histogram.c, (6) notifications.c, (7) outages.c, (8) status.c, (9) statusmap.c, (10) summary.c, and (11) trends.c in cgi/, which triggers a heap-based buffer over-read." }, { "lang": "es", "value": "M\u00faltiples errores de superaci\u00f3n de l\u00edmite (off-by-one) en Nagios Core 3.5.1, 4.0.2 y anteriores, e Icinga anteriores a 1.8.5, 1.9 anteriores a 1.9.4 y 1.10 anteriores a 1.10.2 permite a usuarios autenticados remotamente obtener informaci\u00f3n sensible de procesos de memoria o causar denegaci\u00f3n de servicio (ca\u00edda) a trav\u00e9s de una adena larga en el valor de la \u00faltima clave en la lista de variables de la funci\u00f3n process_cgivars en (1) avail.c, (2) cmd.c, (3) config.c, 84) extinfo.c, (5) histogram.c, (6) notifications.c, (7) outages.c, (8) status.c, (9) statusmap.c, (10) summary.c, y (11) trends.c en cgi/, lo cual lanza una sobre-lectura de buffer basado en memoria din\u00e1mica." } ], "id": "CVE-2013-7108", "lastModified": "2024-11-21T02:00:22.007", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 5.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-01-15T16:08:04.017", "references": [ { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00010.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00028.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00046.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00068.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/55976" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/56316" }, { "source": "cve@mitre.org", "url": "http://sourceforge.net/p/nagios/nagioscore/ci/d97e03f32741a7d851826b03ed73ff4c9612a866/" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:004" }, { "source": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2013/12/24/1" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/64363" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://dev.icinga.org/issues/5251" }, { "source": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2018/12/msg00014.html" }, { "source": "cve@mitre.org", "url": "https://www.icinga.org/2013/12/17/icinga-security-releases-1-10-2-1-9-4-1-8-5/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00010.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00028.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00046.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-updates/2014-01/msg00068.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/55976" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/56316" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://sourceforge.net/p/nagios/nagioscore/ci/d97e03f32741a7d851826b03ed73ff4c9612a866/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:004" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2013/12/24/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/64363" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://dev.icinga.org/issues/5251" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.debian.org/debian-lts-announce/2018/12/msg00014.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.icinga.org/2013/12/17/icinga-security-releases-1-10-2-1-9-4-1-8-5/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-07-12 23:15
Modified
2024-11-21 06:07
Severity ?
5.3 (Medium) - CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
5.3 (Medium) - CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
5.3 (Medium) - CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
Summary
Icinga Web 2 is an open source monitoring web interface, framework and command-line interface. Between versions 2.3.0 and 2.8.2, the `doc` module of Icinga Web 2 allows to view documentation directly in the UI. It must be enabled manually by an administrator and users need explicit access permission to use it. Then, by visiting a certain route, it is possible to gain access to arbitrary files readable by the web-server user. The issue has been fixed in the 2.9.0, 2.8.3, and 2.7.5 releases. As a workaround, an administrator may disable the `doc` module or revoke permission to use it from all users.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:icinga:icinga:*:*:*:*:*:*:*:*", "matchCriteriaId": "D7366836-AA23-42BA-BF2E-00722915893D", "versionEndExcluding": "2.7.5", "versionStartIncluding": "2.3.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:*:*:*:*:*:*:*:*", "matchCriteriaId": "67125902-BF14-40DA-B319-88903781FA12", "versionEndExcluding": "2.8.3", "versionStartIncluding": "2.8.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Icinga Web 2 is an open source monitoring web interface, framework and command-line interface. Between versions 2.3.0 and 2.8.2, the `doc` module of Icinga Web 2 allows to view documentation directly in the UI. It must be enabled manually by an administrator and users need explicit access permission to use it. Then, by visiting a certain route, it is possible to gain access to arbitrary files readable by the web-server user. The issue has been fixed in the 2.9.0, 2.8.3, and 2.7.5 releases. As a workaround, an administrator may disable the `doc` module or revoke permission to use it from all users." }, { "lang": "es", "value": "Icinga Web 2 es una interfaz web de monitorizaci\u00f3n de c\u00f3digo abierto, un framework y una interfaz de l\u00ednea de comandos. Entre las versiones 2.3.0 y 2.8.2, el m\u00f3dulo \"doc\" de Icinga Web 2 permite ver la documentaci\u00f3n directamente en la UI. Debe ser habilitado manualmente por un administrador y los usuarios necesitan un permiso de acceso expl\u00edcito para utilizarlo. Entonces, al visitar una determinada ruta, es posible obtener acceso a archivos arbitrarios legibles por el usuario del servidor web. El problema se ha corregido en las versiones 2.9.0, 2.8.3 y 2.7.5. Como soluci\u00f3n alternativa, un administrador puede desactivar el m\u00f3dulo \"doc\" o revocar el permiso de uso a todos los usuarios" } ], "id": "CVE-2021-32746", "lastModified": "2024-11-21T06:07:39.610", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.6, "impactScore": 3.6, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.6, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-07-12T23:15:07.710", "references": [ { "source": "security-advisories@github.com", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/Icinga/icingaweb2/releases/tag/v2.7.5" }, { "source": "security-advisories@github.com", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/Icinga/icingaweb2/releases/tag/v2.8.3" }, { "source": "security-advisories@github.com", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/Icinga/icingaweb2/releases/tag/v2.9.0" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Icinga/icingaweb2/security/advisories/GHSA-cmgc-h4cx-3v43" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/Icinga/icingaweb2/releases/tag/v2.7.5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/Icinga/icingaweb2/releases/tag/v2.8.3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/Icinga/icingaweb2/releases/tag/v2.9.0" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Icinga/icingaweb2/security/advisories/GHSA-cmgc-h4cx-3v43" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "security-advisories@github.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-07-12 23:15
Modified
2024-11-21 06:07
Severity ?
5.3 (Medium) - CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Summary
Icinga Web 2 is an open source monitoring web interface, framework, and command-line interface. A vulnerability in which custom variables are exposed to unauthorized users exists between versions 2.0.0 and 2.8.2. Custom variables are user-defined keys and values on configuration objects in Icinga 2. These are commonly used to reference secrets in other configurations such as check commands to be able to authenticate with a service being checked. Icinga Web 2 displays these custom variables to logged in users with access to said hosts or services. In order to protect the secrets from being visible to anyone, it's possible to setup protection rules and blacklists in a user's role. Protection rules result in `***` being shown instead of the original value, the key will remain. Backlists will hide a custom variable entirely from the user. Besides using the UI, custom variables can also be accessed differently by using an undocumented URL parameter. By adding a parameter to the affected routes, Icinga Web 2 will show these columns additionally in the respective list. This parameter is also respected when exporting to JSON or CSV. Protection rules and blacklists however have no effect in this case. Custom variables are shown as-is in the result. The issue has been fixed in the 2.9.0, 2.8.3, and 2.7.5 releases. As a workaround, one may set up a restriction to hide hosts and services with the custom variable in question.
References
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:icinga:icinga:*:*:*:*:*:*:*:*", "matchCriteriaId": "6F5B4A77-A5AA-4417-8274-55784B0964D8", "versionEndExcluding": "2.7.5", "versionStartIncluding": "2.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:*:*:*:*:*:*:*:*", "matchCriteriaId": "67125902-BF14-40DA-B319-88903781FA12", "versionEndExcluding": "2.8.3", "versionStartIncluding": "2.8.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Icinga Web 2 is an open source monitoring web interface, framework, and command-line interface. A vulnerability in which custom variables are exposed to unauthorized users exists between versions 2.0.0 and 2.8.2. Custom variables are user-defined keys and values on configuration objects in Icinga 2. These are commonly used to reference secrets in other configurations such as check commands to be able to authenticate with a service being checked. Icinga Web 2 displays these custom variables to logged in users with access to said hosts or services. In order to protect the secrets from being visible to anyone, it\u0027s possible to setup protection rules and blacklists in a user\u0027s role. Protection rules result in `***` being shown instead of the original value, the key will remain. Backlists will hide a custom variable entirely from the user. Besides using the UI, custom variables can also be accessed differently by using an undocumented URL parameter. By adding a parameter to the affected routes, Icinga Web 2 will show these columns additionally in the respective list. This parameter is also respected when exporting to JSON or CSV. Protection rules and blacklists however have no effect in this case. Custom variables are shown as-is in the result. The issue has been fixed in the 2.9.0, 2.8.3, and 2.7.5 releases. As a workaround, one may set up a restriction to hide hosts and services with the custom variable in question." }, { "lang": "es", "value": "Icinga Web 2 es una interfaz web de monitoreo de c\u00f3digo abierto, un marco de trabajo y una interfaz de l\u00ednea de comandos. Una vulnerabilidad entre las versiones 2.0.0 y 2.8.2, se presenta en la que las variables personalizadas son expuestas a usuarios no autorizados. Las variables personalizadas son claves y valores definidos por el usuario en los objetos de configuraci\u00f3n de Icinga 2. Estas son com\u00fanmente usadas para referenciar secretos en otras configuraciones tales como comandos de comprobaci\u00f3n para poder autenticarse con un servicio que est\u00e1 siendo comprobado. Icinga Web 2 muestra estas variables personalizadas a los usuarios registrados con acceso a dichos hosts o servicios. Para proteger que los secretos sean visibles para cualquiera, es posible configurar reglas de protecci\u00f3n y listas negras en el rol de un usuario. Las reglas de protecci\u00f3n resultan en que se muestre \"***\" en lugar del valor original, la clave permanecer\u00e1. Unas listas negras ocultar\u00e1n una variable personalizada por completo al usuario. Adem\u00e1s de utilizar la interfaz de usuario, tambi\u00e9n se puede acceder a las variables personalizadas de forma diferente usando un par\u00e1metro de URL no documentado. Al a\u00f1adir un par\u00e1metro a las rutas afectadas, Icinga Web 2 mostrar\u00e1 estas columnas adicionalmente en la lista respectiva. Este par\u00e1metro es tambi\u00e9n respetado al exportar a JSON o CSV. Sin embargo, las reglas de protecci\u00f3n y las listas negras no tienen efecto en este caso. Las variables personalizadas se muestran tal cual en el resultado. Este problema ha sido corregido en las versiones 2.9.0, 2.8.3 y 2.7.5. Como soluci\u00f3n alternativa, se puede ajustar una restricci\u00f3n para ocultar hosts y servicios con la variable personalizada en cuesti\u00f3n" } ], "id": "CVE-2021-32747", "lastModified": "2024-11-21T06:07:39.730", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.6, "impactScore": 3.6, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-07-12T23:15:07.807", "references": [ { "source": "security-advisories@github.com", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/Icinga/icingaweb2/releases/tag/v2.7.5" }, { "source": "security-advisories@github.com", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/Icinga/icingaweb2/releases/tag/v2.8.3" }, { "source": "security-advisories@github.com", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/Icinga/icingaweb2/releases/tag/v2.9.0" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Icinga/icingaweb2/security/advisories/GHSA-2xv9-886q-p7xx" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/Icinga/icingaweb2/releases/tag/v2.7.5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/Icinga/icingaweb2/releases/tag/v2.8.3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/Icinga/icingaweb2/releases/tag/v2.9.0" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Icinga/icingaweb2/security/advisories/GHSA-2xv9-886q-p7xx" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "security-advisories@github.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-02-27 19:29
Modified
2024-11-21 04:10
Severity ?
Summary
An issue was discovered in Icinga 2.x through 2.8.1. By editing the init.conf file, Icinga 2 can be run as root. Following this the program can be used to run arbitrary code as root. This was fixed by no longer using init.conf to determine account information for any root-executed code (a larger issue than CVE-2017-16933).
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://github.com/Icinga/icinga2/pull/5850 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/Icinga/icinga2/pull/5850 | Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:icinga:icinga:*:*:*:*:*:*:*:*", "matchCriteriaId": "1FDB0B7D-0832-4827-A0A5-B2356027FEA1", "versionEndIncluding": "2.8.1", "versionStartIncluding": "2.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Icinga 2.x through 2.8.1. By editing the init.conf file, Icinga 2 can be run as root. Following this the program can be used to run arbitrary code as root. This was fixed by no longer using init.conf to determine account information for any root-executed code (a larger issue than CVE-2017-16933)." }, { "lang": "es", "value": "Se ha descubierto un problema en Icinga, en versiones 2.x hasta la 2.8.1. Al editar el archivo init.conf, Icinga 2 puede ejecutarse como root. A partir de esto, el programa puede emplearse para ejecutar c\u00f3digo arbitrario como root. Esto se ha solucionado al no emplear m\u00e1s init.conf para determinar la informaci\u00f3n de la cuenta para cualquier c\u00f3digo ejecutado como root. Este problema es mayor que CVE-2017-16933." } ], "id": "CVE-2018-6533", "lastModified": "2024-11-21T04:10:51.017", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-02-27T19:29:00.450", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Icinga/icinga2/pull/5850" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Icinga/icinga2/pull/5850" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-02-27 19:29
Modified
2024-11-21 04:10
Severity ?
Summary
An issue was discovered in Icinga 2.x through 2.8.1. The lack of a constant-time password comparison function can disclose the password to an attacker.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://github.com/Icinga/icinga2/issues/4920 | Third Party Advisory | |
cve@mitre.org | https://github.com/Icinga/icinga2/pull/5715 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/Icinga/icinga2/issues/4920 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/Icinga/icinga2/pull/5715 | Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:icinga:icinga:*:*:*:*:*:*:*:*", "matchCriteriaId": "1FDB0B7D-0832-4827-A0A5-B2356027FEA1", "versionEndIncluding": "2.8.1", "versionStartIncluding": "2.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Icinga 2.x through 2.8.1. The lack of a constant-time password comparison function can disclose the password to an attacker." }, { "lang": "es", "value": "Se ha descubierto un problema en Icinga, en versiones 2.x hasta la 2.8.1. La falta de una funci\u00f3n de comparaci\u00f3n de contrase\u00f1a en tiempo constante (constant-time) puede revelar la contrase\u00f1a a un atacante." } ], "id": "CVE-2018-6535", "lastModified": "2024-11-21T04:10:51.320", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-02-27T19:29:00.543", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Icinga/icinga2/issues/4920" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Icinga/icinga2/pull/5715" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Icinga/icinga2/issues/4920" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Icinga/icinga2/pull/5715" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-12-15 23:15
Modified
2024-11-21 05:24
Severity ?
Summary
Icinga 2 v2.8.0 through v2.11.7 and v2.12.2 has an issue where revoked certificates due for renewal will automatically be renewed, ignoring the CRL. This issue is fixed in Icinga 2 v2.11.8 and v2.12.3.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://github.com/Icinga/icinga2/compare/v2.12.1...v2.12.2 | Patch, Third Party Advisory | |
cve@mitre.org | https://github.com/Icinga/icinga2/security/advisories/GHSA-pcmr-2p2f-r7j6 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/Icinga/icinga2/compare/v2.12.1...v2.12.2 | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/Icinga/icinga2/security/advisories/GHSA-pcmr-2p2f-r7j6 | Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:icinga:icinga:*:*:*:*:*:*:*:*", "matchCriteriaId": "44D41D7C-A345-45EB-8614-6AA652C283FC", "versionEndIncluding": "2.11.7", "versionStartIncluding": "2.8.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:2.12.2:*:*:*:*:*:*:*", "matchCriteriaId": "741BA635-D264-457A-8B20-01D19EDD612C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Icinga 2 v2.8.0 through v2.11.7 and v2.12.2 has an issue where revoked certificates due for renewal will automatically be renewed, ignoring the CRL. This issue is fixed in Icinga 2 v2.11.8 and v2.12.3." }, { "lang": "es", "value": "Icinga versiones 2 v2.8.0 hasta v2.11.7 y versi\u00f3n v2.12.2, presenta un problema en donde los certificados revocados que deben renovarse ser\u00e1n renovados autom\u00e1ticamente, ignorando la CRL.\u0026#xa0;Este problema es corregido en Icinga versiones 2 v2.11.8 y v2.12.3" } ], "id": "CVE-2020-29663", "lastModified": "2024-11-21T05:24:23.457", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 6.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-12-15T23:15:12.780", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Icinga/icinga2/compare/v2.12.1...v2.12.2" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Icinga/icinga2/security/advisories/GHSA-pcmr-2p2f-r7j6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Icinga/icinga2/compare/v2.12.1...v2.12.2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/Icinga/icinga2/security/advisories/GHSA-pcmr-2p2f-r7j6" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-295" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-07-15 16:15
Modified
2024-11-21 06:07
Severity ?
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
Icinga is a monitoring system which checks the availability of network resources, notifies users of outages, and generates performance data for reporting. In versions prior to 2.11.10 and from version 2.12.0 through version 2.12.4, some of the Icinga 2 features that require credentials for external services expose those credentials through the API to authenticated API users with read permissions for the corresponding object types. IdoMysqlConnection and IdoPgsqlConnection (every released version) exposes the password of the user used to connect to the database. IcingaDB (added in 2.12.0) exposes the password used to connect to the Redis server. ElasticsearchWriter (added in 2.8.0)exposes the password used to connect to the Elasticsearch server. An attacker who obtains these credentials can impersonate Icinga to these services and add, modify and delete information there. If credentials with more permissions are in use, this increases the impact accordingly. Starting with the 2.11.10 and 2.12.5 releases, these passwords are no longer exposed via the API. As a workaround, API user permissions can be restricted to not allow querying of any affected objects, either by explicitly listing only the required object types for object query permissions, or by applying a filter rule.
References
▼ | URL | Tags | |
---|---|---|---|
security-advisories@github.com | https://github.com/Icinga/icinga2/security/advisories/GHSA-wrpw-pmr8-qgj7 | Exploit, Third Party Advisory | |
security-advisories@github.com | https://icinga.com/blog/2021/07/15/releasing-icinga-2-12-5-and-2-11-10/ | Exploit, Vendor Advisory | |
security-advisories@github.com | https://lists.debian.org/debian-lts-announce/2021/11/msg00010.html | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://github.com/Icinga/icinga2/security/advisories/GHSA-wrpw-pmr8-qgj7 | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://icinga.com/blog/2021/07/15/releasing-icinga-2-12-5-and-2-11-10/ | Exploit, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2021/11/msg00010.html | Mailing List, Third Party Advisory |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:icinga:icinga:*:*:*:*:*:*:*:*", "matchCriteriaId": "ED80D98A-D84D-453B-8324-92AC03F5AE14", "versionEndExcluding": "2.11.10", "versionStartIncluding": "2.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:icinga:icinga:*:*:*:*:*:*:*:*", "matchCriteriaId": "0FC541DF-0A24-4C5F-90EF-A7D40EFFDB5D", "versionEndExcluding": "2.12.5", "versionStartIncluding": "2.12.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Icinga is a monitoring system which checks the availability of network resources, notifies users of outages, and generates performance data for reporting. In versions prior to 2.11.10 and from version 2.12.0 through version 2.12.4, some of the Icinga 2 features that require credentials for external services expose those credentials through the API to authenticated API users with read permissions for the corresponding object types. IdoMysqlConnection and IdoPgsqlConnection (every released version) exposes the password of the user used to connect to the database. IcingaDB (added in 2.12.0) exposes the password used to connect to the Redis server. ElasticsearchWriter (added in 2.8.0)exposes the password used to connect to the Elasticsearch server. An attacker who obtains these credentials can impersonate Icinga to these services and add, modify and delete information there. If credentials with more permissions are in use, this increases the impact accordingly. Starting with the 2.11.10 and 2.12.5 releases, these passwords are no longer exposed via the API. As a workaround, API user permissions can be restricted to not allow querying of any affected objects, either by explicitly listing only the required object types for object query permissions, or by applying a filter rule." }, { "lang": "es", "value": "Icinga es un sistema de monitorizaci\u00f3n que comprueba la disponibilidad de los recursos de la red, notifica a los usuarios de las interrupciones y genera datos de rendimiento para informes. En las versiones anteriores a 2.11.10 y desde versi\u00f3n 2.12.0 hasta versi\u00f3n 2.12.4, algunas de las funcionalidades de Icinga 2 que requieren credenciales para servicios externos exponen dichas credenciales mediante la API a los usuarios autenticados de la API con permisos de lectura para los tipos de objetos correspondientes. IdoMysqlConnection y IdoPgsqlConnection (cada versi\u00f3n liberada) expone la contrase\u00f1a del usuario usado para conectarse a la base de datos. IcingaDB (a\u00f1adido en versi\u00f3n 2.12.0) expone la contrase\u00f1a usada para conectarse al servidor Redis. ElasticsearchWriter (a\u00f1adido en versi\u00f3n 2.8.0) expone la contrase\u00f1a usada para conectarse al servidor Elasticsearch. Un atacante que obtenga estas credenciales puede hacerse pasar por Icinga a estos servicios y a\u00f1adir, modificar y eliminar informaci\u00f3n all\u00ed. Si las credenciales con m\u00e1s permisos est\u00e1n en uso, el impacto aumenta acorde. A partir de las versiones 2.11.10 y 2.12.5, estas contrase\u00f1as ya no est\u00e1n expuestas por medio de la API. Como soluci\u00f3n, los permisos de usuario de la API pueden restringirse para no permitir la consulta de los objetos afectados, ya sea enumerando expl\u00edcitamente s\u00f3lo los tipos de objetos requeridos para los permisos de consulta de objetos o aplicando una regla de filtro" } ], "id": "CVE-2021-32743", "lastModified": "2024-11-21T06:07:39.243", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-07-15T16:15:09.620", "references": [ { "source": "security-advisories@github.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Icinga/icinga2/security/advisories/GHSA-wrpw-pmr8-qgj7" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://icinga.com/blog/2021/07/15/releasing-icinga-2-12-5-and-2-11-10/" }, { "source": "security-advisories@github.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00010.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/Icinga/icinga2/security/advisories/GHSA-wrpw-pmr8-qgj7" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Vendor Advisory" ], "url": "https://icinga.com/blog/2021/07/15/releasing-icinga-2-12-5-and-2-11-10/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00010.html" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-202" } ], "source": "security-advisories@github.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }