CVE-2018-16145

The /etc/init.d/opsview-reporting-module script that runs at boot time in Opsview Monitor before 5.3.1 and 5.4.x before 5.4.2 invokes a file that can be edited by the nagios user, and would allow attackers to elevate their privileges to root after a system restart, hence obtaining full control of the appliance.
References
Link Resource
https://knowledge.opsview.com/v5.3/docs/whats-new Release Notes Vendor Advisory
https://knowledge.opsview.com/v5.4/docs/whats-new Release Notes Vendor Advisory
https://seclists.org/fulldisclosure/2018/Sep/3 Exploit Mailing List Third Party Advisory
https://www.coresecurity.com/advisories/opsview-monitor-multiple-vulnerabilities Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:opsview:opsview:*:*:*:*:*:*:*:*
cpe:2.3:a:opsview:opsview:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2018-09-05 21:29

Updated : 2023-12-10 12:44


NVD link : CVE-2018-16145

Mitre link : CVE-2018-16145

CVE.ORG link : CVE-2018-16145


JSON object : View

Products Affected

opsview

  • opsview
CWE
CWE-732

Incorrect Permission Assignment for Critical Resource