SB2018090503 - Multiple vulnerabilities in Opsview Monitor



SB2018090503 - Multiple vulnerabilities in Opsview Monitor

Published: September 5, 2018

Security Bulletin ID SB2018090503
Severity
Low
Patch available
YES
Number of vulnerabilities 5
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 5 secuirty vulnerabilities.


1) Reflected cross-site scripting (CVE-ID: CVE-2018-16148)

The disclosed vulnerability allows a remote attacker to perform reflected cross-site scripting (XSS) attacks.

The vulnerability exists in the 'diagnosticsb2ksy' parameter of the '/rest' endpoint due to insufficient sanitization of user-supplied data. A remote attacker can trick the victim to follow a specially specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.

Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.


2) Persistent cross-site scripting (CVE-ID: CVE-2018-16147)

The disclosed vulnerability allows a remote attacker to perform persistent cross-site scripting (XSS) attacks.

The vulnerability exists in the 'data' parameter of the '/settings/api/router' endpoint due to insufficient sanitization of user-supplied data. A remote attacker can trick the victim to follow a specially specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.

Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.


3) Command injection (CVE-ID: CVE-2018-16146)

The disclosed vulnerability allows a local administrative attacker to execute arbitrary commands on the target system.

The vulnerability exists due to the 'value' parameter is not properly sanitized. A local attacker can access a Opsview Web Management console functionality, test notifications that are triggered under certain configurable events and execute arbitrary commands with nagios' user privileges.


4) Command injection (CVE-ID: CVE-2018-16144)

The disclosed vulnerability allows a remote attacker to execute arbitrary commands on the target system.

The vulnerability exists in the test connection functionality due to an improper sanitization of the 'rancid_password' parameter. A remote attacker can automate the backing up of network devices' configuration files to a centralized location and execute arbitrary commands with elevated privileges.


5) Privilege escalation (CVE-ID: CVE-2018-16145)

The disclosed vulnerability allows a local attacker to gain elevated privileges on the target system.

The vulnerability exists due to the '/etc/init.d/opsview-reporting-module' script invokes the '/opt/opsview/jasper/bin/db_jasper' script. A local attacker can cause the scripts that run at boot time to impersonate nagios user during its execution and gain elevated privileges.


Remediation

Install update from vendor's website.