[Forgot Password]
Login  Register Subscribe

30481

 
 

423868

 
 

256610

 
 

909

 
 

199263

 
 

282

Paid content will be excluded from the download.


Download | Alert*


oval:org.secpod.oval:def:603763
icingaweb2 is installed

oval:org.secpod.oval:def:1801776
icingaweb2 is installed

oval:org.secpod.oval:def:2000695
Icinga Web 2 before 2.6.2 has XSS via the /icingaweb2/navigation/add icon parameter.

oval:org.secpod.oval:def:2001205
Icinga Web 2 before 2.6.2 allows injection of PHP ini-file directives via vectors involving environment variables as the channel to send information to the attacker, such as a name=${PATH}_${APACHE_RUN_DIR}_${APACHE_RUN_USER} parameter to /icingaweb2/navigation/add or /icingaweb2/dashboard/new-dashl ...

oval:org.secpod.oval:def:2000849
Icinga Web 2 before 2.6.2 allows parameters that break navigation dashlets, as demonstrated by a single "$" character as the Name of a Navigation item.

oval:org.secpod.oval:def:2000898
Icinga Web 2 before 2.6.2 has CSRF via /icingaweb2/config/moduledisable?name=monitoring to disable the monitoring module, or via /icingaweb2/config/moduleenable?name=setup to enable the setup module.

oval:org.secpod.oval:def:2001108
Icinga Web 2 has XSS via the /icingaweb2/monitoring/list/services dir parameter, the /icingaweb2/user/list query string, the /icingaweb2/monitoring/timeline query string, or the /icingaweb2/setup query string.

oval:org.secpod.oval:def:1801775
Icinga Web2 has a Directory Traversal vulnerability which allows an attacker to access arbitrary files that are readable by the process running Icinga Web 2.

*CPE
cpe:/a:icinga:icingaweb2

© SecPod Technologies