The /etc/init.d/opsview-reporting-module script that runs at boot time in Opsview Monitor before 5.3.1 and 5.4.x before 5.4.2 invokes a file that can be edited by the nagios user, and would allow attackers to elevate their privileges to root after a system restart, hence obtaining full control of the appliance.
References
Link | Resource |
---|---|
https://knowledge.opsview.com/v5.3/docs/whats-new | Release Notes Vendor Advisory |
https://knowledge.opsview.com/v5.4/docs/whats-new | Release Notes Vendor Advisory |
https://seclists.org/fulldisclosure/2018/Sep/3 | Exploit Mailing List Third Party Advisory |
https://www.coresecurity.com/advisories/opsview-monitor-multiple-vulnerabilities | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2018-09-05 21:29
Updated : 2019-10-03 00:03
NVD link : CVE-2018-16145
Mitre link : CVE-2018-16145
CVE.ORG link : CVE-2018-16145
JSON object : View
Products Affected
opsview
- opsview
CWE
CWE-732
Incorrect Permission Assignment for Critical Resource