Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2021.3836 icinga2 security update 11 November 2021 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: icinga2 Publisher: Debian Operating System: Debian GNU/Linux Impact/Access: Access Confidential Data -- Remote/Unauthenticated Increased Privileges -- Existing Account Resolution: Patch/Upgrade CVE Names: CVE-2021-37698 CVE-2021-32743 CVE-2021-32739 Original Bulletin: https://www.debian.org/lts/security/2021/dla-2816 - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - - ------------------------------------------------------------------------- Debian LTS Advisory DLA-2816-1 debian-lts@lists.debian.org https://www.debian.org/lts/security/ Sylvain Beucler November 10, 2021 https://wiki.debian.org/LTS - - ------------------------------------------------------------------------- Package : icinga2 Version : 2.6.0-2+deb9u2 CVE ID : CVE-2021-32739 CVE-2021-32743 CVE-2021-37698 Debian Bug : 991494 Several vulnerabilities were discovered in Icinga 2, a general-purpose monitoring application. An attacker could retrieve sensitive information such as service passwords and ticket salt by querying the web API, or by intercepting unsufficiently checked encrypted connections. CVE-2021-32739 A vulnerability exists that may allow privilege escalation for authenticated API users. With a read-ony user's credentials, an attacker can view most attributes of all config objects including `ticket_salt` of `ApiListener`. This salt is enough to compute a ticket for every possible common name (CN). A ticket, the master node's certificate, and a self-signed certificate are enough to successfully request the desired certificate from Icinga. That certificate may in turn be used to steal an endpoint or API user's identity. See also complementary manual procedures: https://icinga.com/blog/2021/07/15/releasing-icinga-2-12-5-and-2-11-10/#change-ticket-salt https://icinga.com/blog/2021/07/15/releasing-icinga-2-12-5-and-2-11-10/#replace-icinga-ca CVE-2021-32743 Some of the Icinga 2 features that require credentials for external services expose those credentials through the API to authenticated API users with read permissions for the corresponding object types. IdoMysqlConnection and IdoPgsqlConnection exposes the password of the user used to connect to the database. An attacker who obtains these credentials can impersonate Icinga to these services and add, modify and delete information there. If credentials with more permissions are in use, this increases the impact accordingly. CVE-2021-37698 InfluxdbWriter and Influxdb2Writer do not verify the server's certificate despite a certificate authority being specified. Icinga 2 instances which connect to any of the mentioned time series databases (TSDBs) using TLS over a spoofable infrastructure should immediately upgrade. Such instances should also change the credentials (if any) used by the TSDB writer feature to authenticate against the TSDB. For Debian 9 stretch, these problems have been fixed in version 2.6.0-2+deb9u2. We recommend that you upgrade your icinga2 packages. For the detailed security status of icinga2 please refer to its security tracker page at: https://security-tracker.debian.org/tracker/icinga2 Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS - -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEE1vEOfV7HXWKqBieIDTl9HeUlXjAFAmGML3YACgkQDTl9HeUl XjD+ZA/+PYLea+G/in5SPqF7BLHUHSTnbfpCaXJorQ1yP5OX74SlnP8uSnHF0kXK NbQ+dVF4uJ+n1Yy7c47hd+VnVE4nP7qXxJF41eHC04/Qg2W3i17ZE0vQ0zSUF/GI RmwyVB0VmyTMd9MRZb6ZIVyKxaT11y14YQrXwQEnRI9yhj54mtFSa7DX4UA0FZKj CjR5NpyOUDJsCgz1rorapo2y+1NYdM4LyOy9BvkhJ/Pc0Oy635jhKmkCs/JbhN3W chCsWwvnTDoxtddpSGbXXMR79TKlSTTbMBo9eEngtNsuDvNMhZjyLYKz5N8sgjwz kMF0Ei5Uvfy+JjurObokx6piUWwpa5DPQqMLlCS6Is5GRsZzCudtFzrayfavlFAX 6hUfIJWKxcXVT+7QBI3/Hx8n/A/OSMJxNzGJYka9ZJhwmDvPDB+fHl/1UGFlraSR DbIe9NyM8pQ/P5++NCJyZX46DZ8nTp5NOuEWXNs0lA36BkLAJ6YOT1P63IDt89Cr GbjWjQCxBrpN3CFvYo8n2MAa42pKHaJYkJ79jQLt+v3BUXiQkyfV1A9/2ZkNL5WP AR2K90lV/mvAXgs5fWL2yJ5yuKmnjKRVn5n8rNldmUpwwZ++7TNH9T2qjzSCcZdL vKMSaEbgiE99sFJPBe0JgvIZwHiEFYFz753YGjhwwaGztbsHhVI= =KsgK - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBYYxsAuNLKJtyKPYoAQjb2g/6AiDILqYQnbcDHxj9VpldMW9vEM2Xckfz mbbaS9rnl8pD6n5qf4F1JuTPN+GV8/rKH4XJWnX24HgJtzBG+Z5uteVf5Wyqrv0Q CSwyYX31XIejmA3iCrkA4gaZ/ZI67KtmTtDlVsGyl9VCrS93kVCG5tBNi22g84n2 lZQS6rWYyvJhJzZmtsBcu+eMW6zAEf0lju24ch1HPm35p7hP4Vom6yfGXjS6UVtv sJbsRQi86nWO/X6VVfFD4J4d8qnRxGIH1HKVhpjFbf+YcsYmd2KgQW9UFsPMP4RK rxo1pDyIwx2MTKLJ8uKk4uHfQ6cvhv11oVTF76vfrB6ZisXFBr0jCtld3BcQvLq2 w2/mRga1SlLiP0kiriDZ/mKML5CvA+GU2XTRwUZxm2KgCMtgiqlFTAw4eJ3gXPQY pbjcdosq1WoKFJuYhWR/pydzZuNQRDih3x+L7iw2FvPL4JnhsBImOWwKE+0He2P5 QJiFOWvHFEZvmy3hj7Lg4I8ZFNBIHKqxX+771YI+DoDxYqGxpPVYB2XhcfD0I5dE NJnGjxlNT1W/HS32NN7ytybJsJ/zzkt4zurG5lbhuRGHEp0dHi7yxy+NxfuIFUOj tmwkNgjHq4YrhJjYzT4rs2Bq7uvxYQSHvyCOz2iAIzHF+eeMa6yISdsLOXdybAFF pxBSye1GTDo= =EyFK -----END PGP SIGNATURE-----