The /etc/init.d/opsview-reporting-module script that runs at boot time in Opsview Monitor before 5.3.1 and 5.4.x before 5.4.2 invokes a file that can be edited by the nagios user, and would allow attackers to elevate their privileges to root after a system restart, hence obtaining full control of the appliance.
References
Link | Resource |
---|---|
https://www.coresecurity.com/advisories/opsview-monitor-multiple-vulnerabilities | Exploit Third Party Advisory |
https://seclists.org/fulldisclosure/2018/Sep/3 | Exploit Mailing List Third Party Advisory |
https://knowledge.opsview.com/v5.4/docs/whats-new | Release Notes Vendor Advisory |
https://knowledge.opsview.com/v5.3/docs/whats-new | Release Notes Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2018-09-05 14:29
Updated : 2019-10-02 17:03
NVD link : CVE-2018-16145
Mitre link : CVE-2018-16145
JSON object : View
CWE
CWE-732
Incorrect Permission Assignment for Critical Resource
Products Affected
opsview
- opsview