CVE-2018-16145

The /etc/init.d/opsview-reporting-module script that runs at boot time in Opsview Monitor before 5.3.1 and 5.4.x before 5.4.2 invokes a file that can be edited by the nagios user, and would allow attackers to elevate their privileges to root after a system restart, hence obtaining full control of the appliance.
References
Link Resource
https://www.coresecurity.com/advisories/opsview-monitor-multiple-vulnerabilities Exploit Third Party Advisory
https://seclists.org/fulldisclosure/2018/Sep/3 Exploit Mailing List Third Party Advisory
https://knowledge.opsview.com/v5.4/docs/whats-new Release Notes Vendor Advisory
https://knowledge.opsview.com/v5.3/docs/whats-new Release Notes Vendor Advisory
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

OR cpe:2.3:a:opsview:opsview:*:*:*:*:*:*:*:*
cpe:2.3:a:opsview:opsview:*:*:*:*:*:*:*:*

Information

Published : 2018-09-05 14:29

Updated : 2019-10-02 17:03


NVD link : CVE-2018-16145

Mitre link : CVE-2018-16145


JSON object : View

CWE
CWE-732

Incorrect Permission Assignment for Critical Resource

Advertisement

dedicated server usa

Products Affected

opsview

  • opsview