Rapid7 Vulnerability & Exploit Database

SUSE: CVE-2022-24714: SUSE Linux Security Advisory

Free InsightVM Trial No Credit Card Necessary
Watch Demo See how it all works
Back to Search

SUSE: CVE-2022-24714: SUSE Linux Security Advisory

Severity
4
CVSS
(AV:N/AC:M/Au:N/C:P/I:N/A:N)
Published
03/08/2022
Created
03/24/2022
Added
03/22/2022
Modified
10/26/2022

Description

Icinga Web 2 is an open source monitoring web interface, framework and command-line interface. Installations of Icinga 2 with the IDO writer enabled are affected. If you use service custom variables in role restrictions, and you regularly decommission service objects, users with said roles may still have access to a collection of content. Note that this only applies if a role has implicitly permitted access to hosts, due to permitted access to at least one of their services. If access to a host is permitted by other means, no sensible information has been disclosed to unauthorized users. This issue has been resolved in versions 2.8.6, 2.9.6 and 2.10 of Icinga Web 2.

Solution(s)

  • suse-upgrade-icingacli
  • suse-upgrade-icingaweb2
  • suse-upgrade-icingaweb2-common
  • suse-upgrade-icingaweb2-vendor-dompdf
  • suse-upgrade-icingaweb2-vendor-htmlpurifier
  • suse-upgrade-icingaweb2-vendor-jshrink
  • suse-upgrade-icingaweb2-vendor-lessphp
  • suse-upgrade-icingaweb2-vendor-parsedown
  • suse-upgrade-icingaweb2-vendor-zf1
  • suse-upgrade-php-icinga

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;