GLSA-202208-05 : Icinga Web 2: Multiple Vulnerabilities

high Nessus Plugin ID 163842

Description

The remote host is affected by the vulnerability described in GLSA-202208-05 (Icinga Web 2: Multiple Vulnerabilities)

- Icinga Icinga Web2 2.0.0 through 2.6.4, 2.7.4 and 2.8.2 has a Directory Traversal vulnerability which allows an attacker to access arbitrary files that are readable by the process running Icinga Web 2. This issue is fixed in Icinga Web 2 in v2.6.4, v2.7.4 and v2.8.2. (CVE-2020-24368)

- Icinga Web 2 is an open source monitoring web interface, framework and command-line interface.
Installations of Icinga 2 with the IDO writer enabled are affected. If you use service custom variables in role restrictions, and you regularly decommission service objects, users with said roles may still have access to a collection of content. Note that this only applies if a role has implicitly permitted access to hosts, due to permitted access to at least one of their services. If access to a host is permitted by other means, no sensible information has been disclosed to unauthorized users. This issue has been resolved in versions 2.8.6, 2.9.6 and 2.10 of Icinga Web 2. (CVE-2022-24714)

- Icinga Web 2 is an open source monitoring web interface, framework and command-line interface.
Authenticated users, with access to the configuration, can create SSH resource files in unintended directories, leading to the execution of arbitrary code. This issue has been resolved in versions 2.8.6, 2.9.6 and 2.10 of Icinga Web 2. Users unable to upgrade should limit access to the Icinga Web 2 configuration. (CVE-2022-24715)

- Icinga Web 2 is an open source monitoring web interface, framework and command-line interface.
Unauthenticated users can leak the contents of files of the local system accessible to the web-server user, including `icingaweb2` configuration files with database credentials. This issue has been resolved in versions 2.9.6 and 2.10 of Icinga Web 2. Database credentials should be rotated. (CVE-2022-24716)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

All Icinga Web 2 users should upgrade to the latest version:

# emerge --sync # emerge --ask --oneshot --verbose >=www-apps/icingaweb2-2.9.6

See Also

https://security.gentoo.org/glsa/202208-05

https://bugs.gentoo.org/show_bug.cgi?id=738024

https://bugs.gentoo.org/show_bug.cgi?id=834802

Plugin Details

Severity: High

ID: 163842

File Name: gentoo_GLSA-202208-05.nasl

Version: 1.3

Type: local

Published: 8/4/2022

Updated: 10/16/2023

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Medium

Base Score: 6

Temporal Score: 4.7

Vector: CVSS2#AV:N/AC:M/Au:S/C:P/I:P/A:P

CVSS Score Source: CVE-2022-24715

CVSS v3

Risk Factor: High

Base Score: 8.8

Temporal Score: 7.9

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:gentoo:linux:icingaweb2, cpe:/o:gentoo:linux

Required KB Items: Host/local_checks_enabled, Host/Gentoo/release, Host/Gentoo/qpkg-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 8/4/2022

Vulnerability Publication Date: 8/19/2020

Reference Information

CVE: CVE-2020-24368, CVE-2022-24714, CVE-2022-24715, CVE-2022-24716