CVE-2024-24820

Icinga Director is a tool designed to make Icinga 2 configuration handling easy. Not any of Icinga Director's configuration forms used to manipulate the monitoring environment are protected against cross site request forgery (CSRF). It enables attackers to perform changes in the monitoring environment managed by Icinga Director without the awareness of the victim. Users of the map module in version 1.x, should immediately upgrade to v2.0. The mentioned XSS vulnerabilities in Icinga Web are already fixed as well and upgrades to the most recent release of the 2.9, 2.10 or 2.11 branch must be performed if not done yet. Any later major release is also suitable. Icinga Director will receive minor updates to the 1.8, 1.9, 1.10 and 1.11 branches to remedy this issue. Upgrade immediately to a patched release. If that is not feasible, disable the director module for the time being.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:icinga:icinga:*:*:*:*:*:*:*:*
cpe:2.3:a:icinga:icinga:*:*:*:*:*:*:*:*
cpe:2.3:a:icinga:icinga:*:*:*:*:*:*:*:*
cpe:2.3:a:icinga:icinga:*:*:*:*:*:*:*:*

History

16 Feb 2024, 21:36

Type Values Removed Values Added
CWE CWE-352
CPE cpe:2.3:a:icinga:icinga:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 8.3
First Time Icinga
Icinga icinga
References () https://www.chromium.org/updates/same-site/ - () https://www.chromium.org/updates/same-site/ - Issue Tracking
References () https://blog.mozilla.org/en/mozilla/firefox-rolls-out-total-cookie-protection-by-default-to-all-users-worldwide/ - () https://blog.mozilla.org/en/mozilla/firefox-rolls-out-total-cookie-protection-by-default-to-all-users-worldwide/ - Press/Media Coverage
References () https://github.com/nbuchwitz/icingaweb2-module-map/pull/86 - () https://github.com/nbuchwitz/icingaweb2-module-map/pull/86 - Exploit
References () https://github.com/Icinga/icingaweb2/issues?q=is%3Aissue++is%3Aclosed+4979+4960+4947 - () https://github.com/Icinga/icingaweb2/issues?q=is%3Aissue++is%3Aclosed+4979+4960+4947 - Issue Tracking
References () https://github.com/Icinga/icingaweb2-module-director/security/advisories/GHSA-3mwp-5p5v-j6q3 - () https://github.com/Icinga/icingaweb2-module-director/security/advisories/GHSA-3mwp-5p5v-j6q3 - Third Party Advisory
References () https://support.apple.com/en-is/guide/safari/sfri11471/16.0 - () https://support.apple.com/en-is/guide/safari/sfri11471/16.0 - Third Party Advisory

09 Feb 2024, 00:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-02-09 00:15

Updated : 2024-02-28 20:54


NVD link : CVE-2024-24820

Mitre link : CVE-2024-24820

CVE.ORG link : CVE-2024-24820


JSON object : View

Products Affected

icinga

  • icinga
CWE
CWE-352

Cross-Site Request Forgery (CSRF)