CVE-2024-24820

Icinga Director is a tool designed to make Icinga 2 configuration handling easy. Not any of Icinga Director's configuration forms used to manipulate the monitoring environment are protected against cross site request forgery (CSRF). It enables attackers to perform changes in the monitoring environment managed by Icinga Director without the awareness of the victim. Users of the map module in version 1.x, should immediately upgrade to v2.0. The mentioned XSS vulnerabilities in Icinga Web are already fixed as well and upgrades to the most recent release of the 2.9, 2.10 or 2.11 branch must be performed if not done yet. Any later major release is also suitable. Icinga Director will receive minor updates to the 1.8, 1.9, 1.10 and 1.11 branches to remedy this issue. Upgrade immediately to a patched release. If that is not feasible, disable the director module for the time being.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:icinga:icinga:*:*:*:*:*:*:*:*
cpe:2.3:a:icinga:icinga:*:*:*:*:*:*:*:*
cpe:2.3:a:icinga:icinga:*:*:*:*:*:*:*:*
cpe:2.3:a:icinga:icinga:*:*:*:*:*:*:*:*

History

16 Feb 2024, 21:36

Type Values Removed Values Added
References () https://blog.mozilla.org/en/mozilla/firefox-rolls-out-total-cookie-protection-by-default-to-all-users-worldwide/ - () https://blog.mozilla.org/en/mozilla/firefox-rolls-out-total-cookie-protection-by-default-to-all-users-worldwide/ - Press/Media Coverage
References () https://github.com/Icinga/icingaweb2-module-director/security/advisories/GHSA-3mwp-5p5v-j6q3 - () https://github.com/Icinga/icingaweb2-module-director/security/advisories/GHSA-3mwp-5p5v-j6q3 - Third Party Advisory
References () https://github.com/Icinga/icingaweb2/issues?q=is%3Aissue++is%3Aclosed+4979+4960+4947 - () https://github.com/Icinga/icingaweb2/issues?q=is%3Aissue++is%3Aclosed+4979+4960+4947 - Issue Tracking
References () https://github.com/nbuchwitz/icingaweb2-module-map/pull/86 - () https://github.com/nbuchwitz/icingaweb2-module-map/pull/86 - Exploit
References () https://support.apple.com/en-is/guide/safari/sfri11471/16.0 - () https://support.apple.com/en-is/guide/safari/sfri11471/16.0 - Third Party Advisory
References () https://www.chromium.org/updates/same-site/ - () https://www.chromium.org/updates/same-site/ - Issue Tracking
CPE cpe:2.3:a:icinga:icinga:*:*:*:*:*:*:*:*
First Time Icinga icinga
Icinga
Summary
  • (es) Icinga Director es una herramienta manipulada para facilitar el manejo de la configuración de Icinga 2. Ninguno de los formularios de configuración de Icinga Director utilizados para manipular el entorno de monitoreo está protegido contra cross site request forgery (CSRF). Permite a los atacantes realizar cambios en el entorno de monitoreo administrado por Icinga Director sin el conocimiento de la víctima. Los usuarios del módulo de mapas en la versión 1.x deben actualizar inmediatamente a la versión 2.0. Las vulnerabilidades XSS mencionadas en Icinga Web también ya están solucionadas y se deben realizar actualizaciones a la versión más reciente de la rama 2.9, 2.10 o 2.11 si aún no se han hecho. Cualquier versión importante posterior también es adecuada. Icinga Director recibirá actualizaciones menores para las ramas 1.8, 1.9, 1.10 y 1.11 para solucionar este problema. Actualice inmediatamente a una versión parcheada. Si eso no es posible, desactive el módulo director por el momento.

09 Feb 2024, 00:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-02-09 00:15

Updated : 2024-02-16 21:36


NVD link : CVE-2024-24820

Mitre link : CVE-2024-24820

CVE.ORG link : CVE-2024-24820


JSON object : View

Products Affected

icinga

  • icinga
CWE
CWE-352

Cross-Site Request Forgery (CSRF)