Download
| Alert*
oval:org.secpod.oval:def:603763
icingaweb2 is installed oval:org.secpod.oval:def:1801776 icingaweb2 is installed oval:org.secpod.oval:def:2000695 Icinga Web 2 before 2.6.2 has XSS via the /icingaweb2/navigation/add icon parameter. oval:org.secpod.oval:def:2001205 Icinga Web 2 before 2.6.2 allows injection of PHP ini-file directives via vectors involving environment variables as the channel to send information to the attacker, such as a name=${PATH}_${APACHE_RUN_DIR}_${APACHE_RUN_USER} parameter to /icingaweb2/navigation/add or /icingaweb2/dashboard/new-dashl ... oval:org.secpod.oval:def:2000849 Icinga Web 2 before 2.6.2 allows parameters that break navigation dashlets, as demonstrated by a single "$" character as the Name of a Navigation item. oval:org.secpod.oval:def:2000898 Icinga Web 2 before 2.6.2 has CSRF via /icingaweb2/config/moduledisable?name=monitoring to disable the monitoring module, or via /icingaweb2/config/moduleenable?name=setup to enable the setup module. oval:org.secpod.oval:def:2001108 Icinga Web 2 has XSS via the /icingaweb2/monitoring/list/services dir parameter, the /icingaweb2/user/list query string, the /icingaweb2/monitoring/timeline query string, or the /icingaweb2/setup query string. oval:org.secpod.oval:def:1801775 Icinga Web2 has a Directory Traversal vulnerability which allows an attacker to access arbitrary files that are readable by the process running Icinga Web 2. |