SB2018090503 - Multiple vulnerabilities in Opsview Monitor
Published: September 5, 2018
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 5 secuirty vulnerabilities.
1) Reflected cross-site scripting (CVE-ID: CVE-2018-16148)
The disclosed vulnerability allows a remote attacker to perform reflected cross-site scripting (XSS) attacks.
The vulnerability exists in the 'diagnosticsb2ksy' parameter of the '/rest' endpoint due to insufficient sanitization of user-supplied data. A remote attacker can trick the victim to follow a specially specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
2) Persistent cross-site scripting (CVE-ID: CVE-2018-16147)
The disclosed vulnerability allows a remote attacker to perform persistent cross-site scripting (XSS) attacks.
The vulnerability exists in the 'data' parameter of the '/settings/api/router' endpoint due to insufficient sanitization of user-supplied data. A remote attacker can trick the victim to follow a specially specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
3) Command injection (CVE-ID: CVE-2018-16146)
The disclosed vulnerability allows a local administrative attacker to execute arbitrary commands on the target system.
The vulnerability exists due to the 'value' parameter is not properly sanitized. A local attacker can access a Opsview Web Management console functionality, test notifications that are triggered under certain configurable events and execute arbitrary commands with nagios' user privileges.
4) Command injection (CVE-ID: CVE-2018-16144)
The disclosed vulnerability allows a remote attacker to execute arbitrary commands on the target system.
The vulnerability exists in the test connection functionality due to an improper sanitization of the 'rancid_password' parameter. A remote attacker can automate the backing up of network devices' configuration files to a centralized location and execute arbitrary commands with elevated privileges.
5) Privilege escalation (CVE-ID: CVE-2018-16145)
The disclosed vulnerability allows a local attacker to gain elevated privileges on the target system.
The vulnerability exists due to the '/etc/init.d/opsview-reporting-module' script invokes the '/opt/opsview/jasper/bin/db_jasper' script. A local attacker can cause the scripts that run at boot time to impersonate nagios user during its execution and gain elevated privileges.
Remediation
Install update from vendor's website.