6.5 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
4 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:S/C:P/I:N/A:N
0.001 Low
EPSS
Percentile
42.3%
Icinga Web 2 is an open source monitoring web interface, framework, and
command-line interface. A vulnerability in which custom variables are
exposed to unauthorized users exists between versions 2.0.0 and 2.8.2.
Custom variables are user-defined keys and values on configuration objects
in Icinga 2. These are commonly used to reference secrets in other
configurations such as check commands to be able to authenticate with a
service being checked. Icinga Web 2 displays these custom variables to
logged in users with access to said hosts or services. In order to protect
the secrets from being visible to anyone, it’s possible to setup protection
rules and blacklists in a user’s role. Protection rules result in ***
being shown instead of the original value, the key will remain. Backlists
will hide a custom variable entirely from the user. Besides using the UI,
custom variables can also be accessed differently by using an undocumented
URL parameter. By adding a parameter to the affected routes, Icinga Web 2
will show these columns additionally in the respective list. This parameter
is also respected when exporting to JSON or CSV. Protection rules and
blacklists however have no effect in this case. Custom variables are shown
as-is in the result. The issue has been fixed in the 2.9.0, 2.8.3, and
2.7.5 releases. As a workaround, one may set up a restriction to hide hosts
and services with the custom variable in question.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | icingaweb2 | < any | UNKNOWN |
ubuntu | 20.04 | noarch | icingaweb2 | < any | UNKNOWN |
ubuntu | 22.04 | noarch | icingaweb2 | < any | UNKNOWN |
ubuntu | 23.10 | noarch | icingaweb2 | < any | UNKNOWN |
ubuntu | 24.04 | noarch | icingaweb2 | < any | UNKNOWN |
ubuntu | 16.04 | noarch | icingaweb2 | < any | UNKNOWN |
github.com/Icinga/icingaweb2/releases/tag/v2.7.5
github.com/Icinga/icingaweb2/releases/tag/v2.8.3
github.com/Icinga/icingaweb2/releases/tag/v2.9.0
github.com/Icinga/icingaweb2/security/advisories/GHSA-2xv9-886q-p7xx
launchpad.net/bugs/cve/CVE-2021-32747
nvd.nist.gov/vuln/detail/CVE-2021-32747
security-tracker.debian.org/tracker/CVE-2021-32747
www.cve.org/CVERecord?id=CVE-2021-32747
6.5 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
4 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:S/C:P/I:N/A:N
0.001 Low
EPSS
Percentile
42.3%