All the vulnerabilites related to Icinga - icinga2
cve-2024-49369
Vulnerability from cvelistv5
Published
2024-11-12 16:44
Modified
2024-11-12 17:06
Severity ?
EPSS score ?
Summary
Icinga is a monitoring system which checks the availability of network resources, notifies users of outages, and generates performance data for reporting. The TLS certificate validation in all Icinga 2 versions starting from 2.4.0 was flawed, allowing an attacker to impersonate both trusted cluster nodes as well as any API users that use TLS client certificates for authentication (ApiUser objects with the client_cn attribute set). This vulnerability has been fixed in v2.14.3, v2.13.10, v2.12.11, and v2.11.12.
References
Impacted products
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:icinga:icinga_web_2:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "icinga_web_2", "vendor": "icinga", "versions": [ { "lessThan": "2.11.12", "status": "affected", "version": "2.4.0", "versionType": "custom" }, { "lessThan": "2.12.11", "status": "affected", "version": "2.12.0", "versionType": "custom" }, { "lessThan": "2.13.10", "status": "affected", "version": "2.13.0", "versionType": "custom" }, { "lessThan": "2.14.3", "status": "affected", "version": "2.14.0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-49369", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-12T17:01:31.893265Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-12T17:06:41.572Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "icinga2", "vendor": "Icinga", "versions": [ { "status": "affected", "version": "\u003e= 2.4.0, \u003c 2.11.12" }, { "status": "affected", "version": "\u003e= 2.12.0, \u003c 2.12.11" }, { "status": "affected", "version": "\u003e= 2.13.0, \u003c 2.13.10" }, { "status": "affected", "version": "\u003e= 2.14.0, \u003c 2.14.3" } ] } ], "descriptions": [ { "lang": "en", "value": "Icinga is a monitoring system which checks the availability of network resources, notifies users of outages, and generates performance data for reporting. The TLS certificate validation in all Icinga 2 versions starting from 2.4.0 was flawed, allowing an attacker to impersonate both trusted cluster nodes as well as any API users that use TLS client certificates for authentication (ApiUser objects with the client_cn attribute set). This vulnerability has been fixed in v2.14.3, v2.13.10, v2.12.11, and v2.11.12." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-295", "description": "CWE-295: Improper Certificate Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-12T16:44:01.713Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/Icinga/icinga2/security/advisories/GHSA-j7wq-r9mg-9wpv", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/Icinga/icinga2/security/advisories/GHSA-j7wq-r9mg-9wpv" }, { "name": "https://github.com/Icinga/icinga2/commit/0419a2c36de408e9a703aec0962061ec9a285d3c", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/Icinga/icinga2/commit/0419a2c36de408e9a703aec0962061ec9a285d3c" }, { "name": "https://github.com/Icinga/icinga2/commit/2febc5e18ae0c93d989e64ebc2a9fd90e7205ad8", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/Icinga/icinga2/commit/2febc5e18ae0c93d989e64ebc2a9fd90e7205ad8" }, { "name": "https://github.com/Icinga/icinga2/commit/3504fc7ed688c10d86988e2029a65efc311393fe", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/Icinga/icinga2/commit/3504fc7ed688c10d86988e2029a65efc311393fe" }, { "name": "https://github.com/Icinga/icinga2/commit/869a7d6f0fe38c748e67bacc1fbdd42c933030f6", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/Icinga/icinga2/commit/869a7d6f0fe38c748e67bacc1fbdd42c933030f6" }, { "name": "https://github.com/Icinga/icinga2/commit/8fed6608912c752b337d977f730547875a820831", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/Icinga/icinga2/commit/8fed6608912c752b337d977f730547875a820831" }, { "name": "https://icinga.com/blog/2024/11/12/critical-icinga-2-security-releases-2-14-3", "tags": [ "x_refsource_MISC" ], "url": "https://icinga.com/blog/2024/11/12/critical-icinga-2-security-releases-2-14-3" } ], "source": { "advisory": "GHSA-j7wq-r9mg-9wpv", "discovery": "UNKNOWN" }, "title": "Icinga 2 has a TLS Certificate Validation Bypass for JSON-RPC and HTTP API Connections" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2024-49369", "datePublished": "2024-11-12T16:44:01.713Z", "dateReserved": "2024-10-14T13:56:34.811Z", "dateUpdated": "2024-11-12T17:06:41.572Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-32743
Vulnerability from cvelistv5
Published
2021-07-15 16:05
Modified
2024-08-03 23:33
Severity ?
EPSS score ?
Summary
Icinga is a monitoring system which checks the availability of network resources, notifies users of outages, and generates performance data for reporting. In versions prior to 2.11.10 and from version 2.12.0 through version 2.12.4, some of the Icinga 2 features that require credentials for external services expose those credentials through the API to authenticated API users with read permissions for the corresponding object types. IdoMysqlConnection and IdoPgsqlConnection (every released version) exposes the password of the user used to connect to the database. IcingaDB (added in 2.12.0) exposes the password used to connect to the Redis server. ElasticsearchWriter (added in 2.8.0)exposes the password used to connect to the Elasticsearch server. An attacker who obtains these credentials can impersonate Icinga to these services and add, modify and delete information there. If credentials with more permissions are in use, this increases the impact accordingly. Starting with the 2.11.10 and 2.12.5 releases, these passwords are no longer exposed via the API. As a workaround, API user permissions can be restricted to not allow querying of any affected objects, either by explicitly listing only the required object types for object query permissions, or by applying a filter rule.
References
▼ | URL | Tags |
---|---|---|
https://github.com/Icinga/icinga2/security/advisories/GHSA-wrpw-pmr8-qgj7 | x_refsource_CONFIRM | |
https://icinga.com/blog/2021/07/15/releasing-icinga-2-12-5-and-2-11-10/ | x_refsource_MISC | |
https://lists.debian.org/debian-lts-announce/2021/11/msg00010.html | mailing-list, x_refsource_MLIST |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:33:54.856Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/Icinga/icinga2/security/advisories/GHSA-wrpw-pmr8-qgj7" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://icinga.com/blog/2021/07/15/releasing-icinga-2-12-5-and-2-11-10/" }, { "name": "[debian-lts-announce] 20211110 [SECURITY] [DLA 2816-1] icinga2 security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00010.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "icinga2", "vendor": "Icinga", "versions": [ { "status": "affected", "version": "\u003c 2.11.10" }, { "status": "affected", "version": "\u003e= 2.12.0, \u003c= 2.12.4" } ] } ], "descriptions": [ { "lang": "en", "value": "Icinga is a monitoring system which checks the availability of network resources, notifies users of outages, and generates performance data for reporting. In versions prior to 2.11.10 and from version 2.12.0 through version 2.12.4, some of the Icinga 2 features that require credentials for external services expose those credentials through the API to authenticated API users with read permissions for the corresponding object types. IdoMysqlConnection and IdoPgsqlConnection (every released version) exposes the password of the user used to connect to the database. IcingaDB (added in 2.12.0) exposes the password used to connect to the Redis server. ElasticsearchWriter (added in 2.8.0)exposes the password used to connect to the Elasticsearch server. An attacker who obtains these credentials can impersonate Icinga to these services and add, modify and delete information there. If credentials with more permissions are in use, this increases the impact accordingly. Starting with the 2.11.10 and 2.12.5 releases, these passwords are no longer exposed via the API. As a workaround, API user permissions can be restricted to not allow querying of any affected objects, either by explicitly listing only the required object types for object query permissions, or by applying a filter rule." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-202", "description": "CWE-202: Exposure of Sensitive Information Through Data Queries", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-10T23:06:14", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/Icinga/icinga2/security/advisories/GHSA-wrpw-pmr8-qgj7" }, { "tags": [ "x_refsource_MISC" ], "url": "https://icinga.com/blog/2021/07/15/releasing-icinga-2-12-5-and-2-11-10/" }, { "name": "[debian-lts-announce] 20211110 [SECURITY] [DLA 2816-1] icinga2 security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00010.html" } ], "source": { "advisory": "GHSA-wrpw-pmr8-qgj7", "discovery": "UNKNOWN" }, "title": "Passwords used to access external services inadvertently exposed through API", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-32743", "STATE": "PUBLIC", "TITLE": "Passwords used to access external services inadvertently exposed through API" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "icinga2", "version": { "version_data": [ { "version_value": "\u003c 2.11.10" }, { "version_value": "\u003e= 2.12.0, \u003c= 2.12.4" } ] } } ] }, "vendor_name": "Icinga" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Icinga is a monitoring system which checks the availability of network resources, notifies users of outages, and generates performance data for reporting. In versions prior to 2.11.10 and from version 2.12.0 through version 2.12.4, some of the Icinga 2 features that require credentials for external services expose those credentials through the API to authenticated API users with read permissions for the corresponding object types. IdoMysqlConnection and IdoPgsqlConnection (every released version) exposes the password of the user used to connect to the database. IcingaDB (added in 2.12.0) exposes the password used to connect to the Redis server. ElasticsearchWriter (added in 2.8.0)exposes the password used to connect to the Elasticsearch server. An attacker who obtains these credentials can impersonate Icinga to these services and add, modify and delete information there. If credentials with more permissions are in use, this increases the impact accordingly. Starting with the 2.11.10 and 2.12.5 releases, these passwords are no longer exposed via the API. As a workaround, API user permissions can be restricted to not allow querying of any affected objects, either by explicitly listing only the required object types for object query permissions, or by applying a filter rule." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-202: Exposure of Sensitive Information Through Data Queries" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/Icinga/icinga2/security/advisories/GHSA-wrpw-pmr8-qgj7", "refsource": "CONFIRM", "url": "https://github.com/Icinga/icinga2/security/advisories/GHSA-wrpw-pmr8-qgj7" }, { "name": "https://icinga.com/blog/2021/07/15/releasing-icinga-2-12-5-and-2-11-10/", "refsource": "MISC", "url": "https://icinga.com/blog/2021/07/15/releasing-icinga-2-12-5-and-2-11-10/" }, { "name": "[debian-lts-announce] 20211110 [SECURITY] [DLA 2816-1] icinga2 security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00010.html" } ] }, "source": { "advisory": "GHSA-wrpw-pmr8-qgj7", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-32743", "datePublished": "2021-07-15T16:05:12", "dateReserved": "2021-05-12T00:00:00", "dateUpdated": "2024-08-03T23:33:54.856Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-32739
Vulnerability from cvelistv5
Published
2021-07-15 14:55
Modified
2024-08-03 23:33
Severity ?
EPSS score ?
Summary
Icinga is a monitoring system which checks the availability of network resources, notifies users of outages, and generates performance data for reporting. From version 2.4.0 through version 2.12.4, a vulnerability exists that may allow privilege escalation for authenticated API users. With a read-ony user's credentials, an attacker can view most attributes of all config objects including `ticket_salt` of `ApiListener`. This salt is enough to compute a ticket for every possible common name (CN). A ticket, the master node's certificate, and a self-signed certificate are enough to successfully request the desired certificate from Icinga. That certificate may in turn be used to steal an endpoint or API user's identity. Versions 2.12.5 and 2.11.10 both contain a fix the vulnerability. As a workaround, one may either specify queryable types explicitly or filter out ApiListener objects.
References
▼ | URL | Tags |
---|---|---|
https://github.com/Icinga/icinga2/security/advisories/GHSA-98wp-jc6q-x5q5 | x_refsource_CONFIRM | |
https://icinga.com/blog/2021/07/02/releasing-icinga-2-12-5-2-11-10/ | x_refsource_MISC | |
https://lists.debian.org/debian-lts-announce/2021/11/msg00010.html | mailing-list, x_refsource_MLIST |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:33:55.502Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/Icinga/icinga2/security/advisories/GHSA-98wp-jc6q-x5q5" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://icinga.com/blog/2021/07/02/releasing-icinga-2-12-5-2-11-10/" }, { "name": "[debian-lts-announce] 20211110 [SECURITY] [DLA 2816-1] icinga2 security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00010.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "icinga2", "vendor": "Icinga", "versions": [ { "status": "affected", "version": "\u003e= 2.4.0, \u003c= 2.12.4" } ] } ], "descriptions": [ { "lang": "en", "value": "Icinga is a monitoring system which checks the availability of network resources, notifies users of outages, and generates performance data for reporting. From version 2.4.0 through version 2.12.4, a vulnerability exists that may allow privilege escalation for authenticated API users. With a read-ony user\u0027s credentials, an attacker can view most attributes of all config objects including `ticket_salt` of `ApiListener`. This salt is enough to compute a ticket for every possible common name (CN). A ticket, the master node\u0027s certificate, and a self-signed certificate are enough to successfully request the desired certificate from Icinga. That certificate may in turn be used to steal an endpoint or API user\u0027s identity. Versions 2.12.5 and 2.11.10 both contain a fix the vulnerability. As a workaround, one may either specify queryable types explicitly or filter out ApiListener objects." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-267", "description": "CWE-267: Privilege Defined With Unsafe Actions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-10T23:06:12", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/Icinga/icinga2/security/advisories/GHSA-98wp-jc6q-x5q5" }, { "tags": [ "x_refsource_MISC" ], "url": "https://icinga.com/blog/2021/07/02/releasing-icinga-2-12-5-2-11-10/" }, { "name": "[debian-lts-announce] 20211110 [SECURITY] [DLA 2816-1] icinga2 security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00010.html" } ], "source": { "advisory": "GHSA-98wp-jc6q-x5q5", "discovery": "UNKNOWN" }, "title": "Results of queries for ApiListener objects include the ticket salt which allows in turn to steal (more privileged) identities", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-32739", "STATE": "PUBLIC", "TITLE": "Results of queries for ApiListener objects include the ticket salt which allows in turn to steal (more privileged) identities" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "icinga2", "version": { "version_data": [ { "version_value": "\u003e= 2.4.0, \u003c= 2.12.4" } ] } } ] }, "vendor_name": "Icinga" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Icinga is a monitoring system which checks the availability of network resources, notifies users of outages, and generates performance data for reporting. From version 2.4.0 through version 2.12.4, a vulnerability exists that may allow privilege escalation for authenticated API users. With a read-ony user\u0027s credentials, an attacker can view most attributes of all config objects including `ticket_salt` of `ApiListener`. This salt is enough to compute a ticket for every possible common name (CN). A ticket, the master node\u0027s certificate, and a self-signed certificate are enough to successfully request the desired certificate from Icinga. That certificate may in turn be used to steal an endpoint or API user\u0027s identity. Versions 2.12.5 and 2.11.10 both contain a fix the vulnerability. As a workaround, one may either specify queryable types explicitly or filter out ApiListener objects." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-267: Privilege Defined With Unsafe Actions" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/Icinga/icinga2/security/advisories/GHSA-98wp-jc6q-x5q5", "refsource": "CONFIRM", "url": "https://github.com/Icinga/icinga2/security/advisories/GHSA-98wp-jc6q-x5q5" }, { "name": "https://icinga.com/blog/2021/07/02/releasing-icinga-2-12-5-2-11-10/", "refsource": "MISC", "url": "https://icinga.com/blog/2021/07/02/releasing-icinga-2-12-5-2-11-10/" }, { "name": "[debian-lts-announce] 20211110 [SECURITY] [DLA 2816-1] icinga2 security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00010.html" } ] }, "source": { "advisory": "GHSA-98wp-jc6q-x5q5", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-32739", "datePublished": "2021-07-15T14:55:11", "dateReserved": "2021-05-12T00:00:00", "dateUpdated": "2024-08-03T23:33:55.502Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-37698
Vulnerability from cvelistv5
Published
2021-08-19 13:55
Modified
2024-08-04 01:23
Severity ?
EPSS score ?
Summary
Icinga is a monitoring system which checks the availability of network resources, notifies users of outages, and generates performance data for reporting. In versions 2.5.0 through 2.13.0, ElasticsearchWriter, GelfWriter, InfluxdbWriter and Influxdb2Writer do not verify the server's certificate despite a certificate authority being specified. Icinga 2 instances which connect to any of the mentioned time series databases (TSDBs) using TLS over a spoofable infrastructure should immediately upgrade to version 2.13.1, 2.12.6, or 2.11.11 to patch the issue. Such instances should also change the credentials (if any) used by the TSDB writer feature to authenticate against the TSDB. There are no workarounds aside from upgrading.
References
▼ | URL | Tags |
---|---|---|
https://github.com/Icinga/icinga2/security/advisories/GHSA-cxfm-8j5v-5qr2 | x_refsource_CONFIRM | |
https://github.com/Icinga/icinga2/releases/tag/v2.11.11 | x_refsource_MISC | |
https://github.com/Icinga/icinga2/releases/tag/v2.12.6 | x_refsource_MISC | |
https://github.com/Icinga/icinga2/releases/tag/v2.13.1 | x_refsource_MISC | |
https://lists.debian.org/debian-lts-announce/2021/11/msg00010.html | mailing-list, x_refsource_MLIST |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T01:23:01.505Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/Icinga/icinga2/security/advisories/GHSA-cxfm-8j5v-5qr2" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/Icinga/icinga2/releases/tag/v2.11.11" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/Icinga/icinga2/releases/tag/v2.12.6" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/Icinga/icinga2/releases/tag/v2.13.1" }, { "name": "[debian-lts-announce] 20211110 [SECURITY] [DLA 2816-1] icinga2 security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00010.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "icinga2", "vendor": "Icinga", "versions": [ { "status": "affected", "version": "\u003e= 2.5.0, \u003c= 2.13.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Icinga is a monitoring system which checks the availability of network resources, notifies users of outages, and generates performance data for reporting. In versions 2.5.0 through 2.13.0, ElasticsearchWriter, GelfWriter, InfluxdbWriter and Influxdb2Writer do not verify the server\u0027s certificate despite a certificate authority being specified. Icinga 2 instances which connect to any of the mentioned time series databases (TSDBs) using TLS over a spoofable infrastructure should immediately upgrade to version 2.13.1, 2.12.6, or 2.11.11 to patch the issue. Such instances should also change the credentials (if any) used by the TSDB writer feature to authenticate against the TSDB. There are no workarounds aside from upgrading." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-295", "description": "CWE-295: Improper Certificate Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-10T23:06:10", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/Icinga/icinga2/security/advisories/GHSA-cxfm-8j5v-5qr2" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/Icinga/icinga2/releases/tag/v2.11.11" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/Icinga/icinga2/releases/tag/v2.12.6" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/Icinga/icinga2/releases/tag/v2.13.1" }, { "name": "[debian-lts-announce] 20211110 [SECURITY] [DLA 2816-1] icinga2 security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00010.html" } ], "source": { "advisory": "GHSA-cxfm-8j5v-5qr2", "discovery": "UNKNOWN" }, "title": "Missing TLS service certificate validation in GelfWriter, ElasticsearchWriter, InfluxdbWriter and Influxdb2Writer", "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security-advisories@github.com", "ID": "CVE-2021-37698", "STATE": "PUBLIC", "TITLE": "Missing TLS service certificate validation in GelfWriter, ElasticsearchWriter, InfluxdbWriter and Influxdb2Writer" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "icinga2", "version": { "version_data": [ { "version_value": "\u003e= 2.5.0, \u003c= 2.13.0" } ] } } ] }, "vendor_name": "Icinga" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Icinga is a monitoring system which checks the availability of network resources, notifies users of outages, and generates performance data for reporting. In versions 2.5.0 through 2.13.0, ElasticsearchWriter, GelfWriter, InfluxdbWriter and Influxdb2Writer do not verify the server\u0027s certificate despite a certificate authority being specified. Icinga 2 instances which connect to any of the mentioned time series databases (TSDBs) using TLS over a spoofable infrastructure should immediately upgrade to version 2.13.1, 2.12.6, or 2.11.11 to patch the issue. Such instances should also change the credentials (if any) used by the TSDB writer feature to authenticate against the TSDB. There are no workarounds aside from upgrading." } ] }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-295: Improper Certificate Validation" } ] } ] }, "references": { "reference_data": [ { "name": "https://github.com/Icinga/icinga2/security/advisories/GHSA-cxfm-8j5v-5qr2", "refsource": "CONFIRM", "url": "https://github.com/Icinga/icinga2/security/advisories/GHSA-cxfm-8j5v-5qr2" }, { "name": "https://github.com/Icinga/icinga2/releases/tag/v2.11.11", "refsource": "MISC", "url": "https://github.com/Icinga/icinga2/releases/tag/v2.11.11" }, { "name": "https://github.com/Icinga/icinga2/releases/tag/v2.12.6", "refsource": "MISC", "url": "https://github.com/Icinga/icinga2/releases/tag/v2.12.6" }, { "name": "https://github.com/Icinga/icinga2/releases/tag/v2.13.1", "refsource": "MISC", "url": "https://github.com/Icinga/icinga2/releases/tag/v2.13.1" }, { "name": "[debian-lts-announce] 20211110 [SECURITY] [DLA 2816-1] icinga2 security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/11/msg00010.html" } ] }, "source": { "advisory": "GHSA-cxfm-8j5v-5qr2", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2021-37698", "datePublished": "2021-08-19T13:55:10", "dateReserved": "2021-07-29T00:00:00", "dateUpdated": "2024-08-04T01:23:01.505Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }