An issue was discovered in Icinga2 before v2.12.0-rc1. The prepare-dirs script (run as part of the icinga2 systemd service) executes chmod 2750 /run/icinga2/cmd. /run/icinga2 is under control of an unprivileged user by default. If /run/icinga2/cmd is a symlink, then it will by followed and arbitrary files can be changed to mode 2750 by the unprivileged icinga2 user.
References
Link | Resource |
---|---|
https://bugzilla.suse.com/show_bug.cgi?id=CVE-2020-14004 | Broken Link |
https://github.com/Icinga/icinga2/pull/8045/commits/2f0f2e8c355b75fa4407d23f85feea037d2bc4b6 | Patch Third Party Advisory |
http://www.openwall.com/lists/oss-security/2020/06/12/1 | Exploit Mailing List Third Party Advisory |
https://github.com/Icinga/icinga2/releases | Release Notes Third Party Advisory |
https://github.com/Icinga/icinga2/compare/v2.12.0-rc1...master | Third Party Advisory |
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00014.html |
Configurations
Configuration 1 (hide)
|
Information
Published : 2020-06-12 09:15
Updated : 2020-11-02 23:15
NVD link : CVE-2020-14004
Mitre link : CVE-2020-14004
JSON object : View
CWE
CWE-59
Improper Link Resolution Before File Access ('Link Following')
Products Affected
icinga
- icinga