Icinga

Icinga

30 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.61%
  • Veröffentlicht 12.07.2021 23:15:07
  • Zuletzt bearbeitet 21.11.2024 06:07:39

Icinga Web 2 is an open source monitoring web interface, framework and command-line interface. Between versions 2.3.0 and 2.8.2, the `doc` module of Icinga Web 2 allows to view documentation directly in the UI. It must be enabled manually by an admin...

  • EPSS 0.17%
  • Veröffentlicht 15.12.2020 23:15:12
  • Zuletzt bearbeitet 21.11.2024 05:24:23

Icinga 2 v2.8.0 through v2.11.7 and v2.12.2 has an issue where revoked certificates due for renewal will automatically be renewed, ignoring the CRL. This issue is fixed in Icinga 2 v2.11.8 and v2.12.3.

Exploit
  • EPSS 0.32%
  • Veröffentlicht 12.06.2020 16:15:10
  • Zuletzt bearbeitet 21.11.2024 05:02:19

An issue was discovered in Icinga2 before v2.12.0-rc1. The prepare-dirs script (run as part of the icinga2 systemd service) executes chmod 2750 /run/icinga2/cmd. /run/icinga2 is under control of an unprivileged user by default. If /run/icinga2/cmd is...

  • EPSS 0.44%
  • Veröffentlicht 27.02.2018 19:29:00
  • Zuletzt bearbeitet 21.11.2024 04:10:51

An issue was discovered in Icinga 2.x through 2.8.1. By sending specially crafted messages, an attacker can cause a NULL pointer dereference, which can cause the product to crash.

  • EPSS 0.38%
  • Veröffentlicht 27.02.2018 19:29:00
  • Zuletzt bearbeitet 21.11.2024 04:10:51

An issue was discovered in Icinga 2.x through 2.8.1. The lack of a constant-time password comparison function can disclose the password to an attacker.

  • EPSS 0.05%
  • Veröffentlicht 27.02.2018 19:29:00
  • Zuletzt bearbeitet 21.11.2024 04:10:51

An issue was discovered in Icinga 2.x through 2.8.1. By editing the init.conf file, Icinga 2 can be run as root. Following this the program can be used to run arbitrary code as root. This was fixed by no longer using init.conf to determine account in...

  • EPSS 0.71%
  • Veröffentlicht 27.02.2018 19:29:00
  • Zuletzt bearbeitet 21.11.2024 04:10:50

An issue was discovered in Icinga 2.x through 2.8.1. By sending specially crafted (authenticated and unauthenticated) requests, an attacker can exhaust a lot of memory on the server side, triggering the OOM killer.

  • EPSS 0.03%
  • Veröffentlicht 02.02.2018 09:29:00
  • Zuletzt bearbeitet 21.11.2024 04:10:51

An issue was discovered in Icinga 2.x through 2.8.1. The daemon creates an icinga2.pid file after dropping privileges to a non-root account, which might allow local users to kill arbitrary processes by leveraging access to this non-root account for i...

Exploit
  • EPSS 0.03%
  • Veröffentlicht 24.11.2017 05:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

etc/initsystem/prepare-dirs in Icinga 2.x through 2.8.1 has a chown call for a filename in a user-writable directory, which allows local users to gain privileges by leveraging access to the $ICINGA2_USER account for creation of a link.

  • EPSS 0.04%
  • Veröffentlicht 18.11.2017 18:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

Icinga Core through 1.14.0 initially executes bin/icinga as root but supports configuration options in which this file is owned by a non-root account (and similarly can have etc/icinga.cfg owned by a non-root account), which allows local users to gai...