CVE-2020-14004
Summary
| CVE | CVE-2020-14004 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2020-06-12 16:15:00 UTC |
| Updated | 2022-11-16 03:43:00 UTC |
| Description | An issue was discovered in Icinga2 before v2.12.0-rc1. The prepare-dirs script (run as part of the icinga2 systemd service) executes chmod 2750 /run/icinga2/cmd. /run/icinga2 is under control of an unprivileged user by default. If /run/icinga2/cmd is a symlink, then it will by followed and arbitrary files can be changed to mode 2750 by the unprivileged icinga2 user. |
Risk And Classification
Problem Types: CWE-59
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Icinga | Icinga | 2.12.0 | rc1 | All | All |
| Application | Icinga | Icinga | 2.12.0 | rc1 | All | All |
| Application | Icinga | Icinga | All | All | All | All |
| Application | Opensuse | Backports Sle | 15.0 | sp1 | All | All |
| Application | Opensuse | Backports Sle | 15.0 | sp2 | All | All |
| Operating System | Opensuse | Leap | 15.1 | All | All | All |
| Operating System | Opensuse | Leap | 15.2 | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Releases · Icinga/icinga2 · GitHub | MISC | github.com | Release Notes, Third Party Advisory |
| prepare-dirs: combine mkdir and chmod by Al2Klimov · Pull Request #8045 · Icinga/icinga2 · GitHub | MISC | github.com | Patch, Third Party Advisory |
| Invalid Bug ID | MISC | bugzilla.suse.com | Broken Link |
| oss-security - icinga2: CVE-2020-14004: prepare-dirs script allows for symlink attack in the icinga user context | CONFIRM | www.openwall.com | Exploit, Mailing List, Third Party Advisory |
| Comparing v2.12.0-rc1...master · Icinga/icinga2 · GitHub | MISC | github.com | Third Party Advisory |
| [security-announce] openSUSE-SU-2020:1820-1: moderate: Security update f | SUSE | lists.opensuse.org | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.