CVE Vulnerabilities

CVE-2021-32739

Privilege Defined With Unsafe Actions

Published: Jul 15, 2021 | Modified: Nov 21, 2024
CVSS 3.x
8.8
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
6.5 MEDIUM
AV:N/AC:L/Au:S/C:P/I:P/A:P
RedHat/V2
RedHat/V3
Ubuntu
MEDIUM

Icinga is a monitoring system which checks the availability of network resources, notifies users of outages, and generates performance data for reporting. From version 2.4.0 through version 2.12.4, a vulnerability exists that may allow privilege escalation for authenticated API users. With a read-ony users credentials, an attacker can view most attributes of all config objects including ticket_salt of ApiListener. This salt is enough to compute a ticket for every possible common name (CN). A ticket, the master nodes certificate, and a self-signed certificate are enough to successfully request the desired certificate from Icinga. That certificate may in turn be used to steal an endpoint or API users identity. Versions 2.12.5 and 2.11.10 both contain a fix the vulnerability. As a workaround, one may either specify queryable types explicitly or filter out ApiListener objects.

Weakness

A particular privilege, role, capability, or right can be used to perform unsafe actions that were not intended, even when it is assigned to the correct entity.

Affected Software

Name Vendor Start Version End Version
Icinga Icinga 2.4.0 (including) 2.11.10 (excluding)
Icinga Icinga 2.12.0 (including) 2.12.5 (excluding)
Icinga2 Ubuntu bionic *
Icinga2 Ubuntu groovy *
Icinga2 Ubuntu hirsute *
Icinga2 Ubuntu impish *
Icinga2 Ubuntu kinetic *
Icinga2 Ubuntu lunar *
Icinga2 Ubuntu mantic *
Icinga2 Ubuntu trusty *
Icinga2 Ubuntu xenial *

Potential Mitigations

References