An update for Icinga Web 2 is now available for NetEye 4.12 and 4.13.
NetEye Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
Icinga Web 2 is an open-source front-end/framework developed by Icinga and is the primary frontend framework used in the NetEye 4 Product.
A Directory Traversal issue was discovered in Icinga Web 2 which could be exploited by attackers to read any local application files in the context of the running webserver.
Security Fix(es) for NetEye 4.13:
icingacli-2.7.3_neteye1.73.2-1.el7.noarch.rpm
icingaweb2-2.7.3_neteye1.73.2-1.el7.noarch.rpm : Path Traversal vulnerability in imgAction function (CVE-2020-24368)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Solution
For details on how to apply this update, which includes the changes described in this advisory, refer to the NetEye Update Section inside the User Guide.
After installing the updated packages, the httpd daemon will be restarted automatically.
Affected Products
All NetEye 4.x versions prior to and including 4.13.
Fixes
ICW-315 – (CVE-2020-24368) icingaweb2: Path Traversal vulnerability in file parameter
Hi folks!
I began loving computer since 1994, it was still the time of windows 3.1. Immediately I learned starting DOS games from the command promt, and while typing some white text on black background I felt like some hackish dude in a hollywoodian movie.
Later during the studies at the university, I discovered the magic world of opensource, and it was love at first sight. Finally I got rid of BSOD's =)
I love everything that is connected to some network, especially in a security perspective.
My motto is:
"With motivation, nothing is impossibile. It only requires more time."
Author
Thomas Forrer
Hi folks!
I began loving computer since 1994, it was still the time of windows 3.1. Immediately I learned starting DOS games from the command promt, and while typing some white text on black background I felt like some hackish dude in a hollywoodian movie.
Later during the studies at the university, I discovered the magic world of opensource, and it was love at first sight. Finally I got rid of BSOD's =)
I love everything that is connected to some network, especially in a security perspective.
My motto is:
"With motivation, nothing is impossibile. It only requires more time."
Important: Elastic Stack security update (installed with SIEM) Type/Severity NetEye Product Security has rated this update as having a Critical security impact. Topic An update for the kibana package is now available for NetEye 4. Security Fix for NetEye 4.41 8.18.3_neteye3.79.1-1 CVSSv3.1: 9.9 Read More
Important: Elastic Stack security update (installed with SIEM) Type/Severity NetEye Product Security has rated this update as having a Critical security impact. Topic An update for the kibana package is now available for NetEye 4. Security Fix for NetEye 4.41 8.17.6_neteye3.74.6-1 CVSSv3.1: 9.1(Critical) Read More
Important: Grafana security update Type/Severity NetEye Product Security has rated this update as having a security impact of High Topic An update for the package grafana is now available for NetEye 4. Security Fix for NetEye 4.41 11.6.1_neteye3.27.1-1 For details on how Read More
Important: Chromium security update Type/Severity NetEye Product Security has rated this update as having a security impact of Low Security Fix for NetEye 4.41 An update for the following packages is now available for NetEye 4: chromium to version 133.0.6943.141-1 Read More
Important: Icingaweb2 Module Neteye security update Type/Severity NetEye Product Security has rated this update as having a security impact of Low Topic An update for the package icingaweb2-module-neteye is now available for NetEye 4. Security Fix for NetEye 4.41 1.164.2-1 For Read More