CVE编号
CVE-2021-32743利用情况
暂无补丁情况
官方补丁披露时间
2021-07-16漏洞描述
Icinga is a monitoring system which checks the availability of network resources, notifies users of outages, and generates performance data for reporting. In versions prior to 2.11.10 and from version 2.12.0 through version 2.12.4, some of the Icinga 2 features that require credentials for external services expose those credentials through the API to authenticated API users with read permissions for the corresponding object types. IdoMysqlConnection and IdoPgsqlConnection (every released version) exposes the password of the user used to connect to the database. IcingaDB (added in 2.12.0) exposes the password used to connect to the Redis server. ElasticsearchWriter (added in 2.8.0)exposes the password used to connect to the Elasticsearch server. An attacker who obtains these credentials can impersonate Icinga to these services and add, modify and delete information there. If credentials with more permissions are in use, this increases the impact accordingly. Starting with the 2.11.10 and 2.12.5 releases, these passwords are no longer exposed via the API. As a workaround, API user permissions can be restricted to not allow querying of any affected objects, either by explicitly listing only the required object types for object query permissions, or by applying a filter rule.解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接 |
|
---|---|
https://github.com/Icinga/icinga2/security/advisories/GHSA-wrpw-pmr8-qgj7 | |
https://icinga.com/blog/2021/07/15/releasing-icinga-2-12-5-and-2-11-10/ | |
https://lists.debian.org/debian-lts-announce/2021/11/msg00010.html |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | icinga | icinga | * |
From (including) 2.0.0 |
Up to (excluding) 2.11.10 |
||||
运行在以下环境 | |||||||||
应用 | icinga | icinga | * |
From (including) 2.12.0 |
Up to (excluding) 2.12.5 |
||||
运行在以下环境 | |||||||||
系统 | debian_10 | icinga2 | * |
Up to (excluding) 2.10.3-2+deb10u1 |
|||||
运行在以下环境 | |||||||||
系统 | debian_11 | icinga2 | * |
Up to (excluding) 2.12.3-1 |
|||||
运行在以下环境 | |||||||||
系统 | debian_9 | icinga2 | * |
Up to (excluding) 2.6.0-2+deb9u2 |
|||||
运行在以下环境 | |||||||||
系统 | debian_sid | icinga2 | * |
Up to (excluding) 2.12.3-1 |
|||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_15.2 | icinga2 | * |
Up to (excluding) 2.12.5-bp153.2.5.1 |
|||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_15.3 | icinga2 | * |
Up to (excluding) 2.12.5-bp153.2.5.1 |
|||||
- 攻击路径 本地
- 攻击复杂度 容易
- 权限要求 无需权限
- 影响范围 有限影响
- EXP成熟度 未验证
- 补丁情况 官方补丁
- 数据保密性 无影响
- 数据完整性 无影响
- 服务器危害 无影响
- 全网数量 N/A
还没有评论,来说两句吧...