[Bug 1188263] New: VUL-0: CVE-2021-32746: icingaweb2: gain access to arbitrary files readable by the web-server user via the doc module
http://bugzilla.opensuse.org/show_bug.cgi?id=1188263 Bug ID: 1188263 Summary: VUL-0: CVE-2021-32746: icingaweb2: gain access to arbitrary files readable by the web-server user via the doc module Classification: openSUSE Product: openSUSE Distribution Version: Leap 15.2 Hardware: Other URL: https://smash.suse.de/issue/303775/ OS: Other Status: NEW Severity: Minor Priority: P5 - None Component: Basesystem Assignee: nix@opensuse.org Reporter: abergmann@suse.com QA Contact: security-team@suse.de Found By: Security Response Team Blocker: --- CVE-2021-32746 Icinga Web 2 is an open source monitoring web interface, framework and command-line interface. Between versions 2.3.0 and 2.8.2, the `doc` module of Icinga Web 2 allows to view documentation directly in the UI. It must be enabled manually by an administrator and users need explicit access permission to use it. Then, by visiting a certain route, it is possible to gain access to arbitrary files readable by the web-server user. The issue has been fixed in the 2.9.0, 2.8.3, and 2.7.5 releases. As a workaround, an administrator may disable the `doc` module or revoke permission to use it from all users. References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-32746 https://github.com/Icinga/icingaweb2/releases/tag/v2.7.5 https://github.com/Icinga/icingaweb2/releases/tag/v2.8.3 https://github.com/Icinga/icingaweb2/releases/tag/v2.9.0 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32746 https://github.com/Icinga/icingaweb2/security/advisories/GHSA-cmgc-h4cx-3v43 -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.opensuse.org/show_bug.cgi?id=1188263 Robert Munteanu <rombert@apache.org> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |rombert@apache.org -- You are receiving this mail because: You are on the CC list for the bug.
participants (1)
-
bugzilla_noreply@suse.com