Symlink Attack Affecting icinga/icinga2 package, versions [2.0.0,2.11.4)


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.05% (24th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-ICINGAICINGA2-2365046
  • published26 Jan 2022
  • disclosed12 Jun 2020
  • creditUnknown

Introduced: 12 Jun 2020

CVE-2020-14004  (opens in a new tab)
CWE-59  (opens in a new tab)

How to fix?

Upgrade icinga/icinga2 to version 2.11.4 or higher.

Overview

Affected versions of this package are vulnerable to Symlink Attack. An issue was discovered in Icinga2 before v2.12.0-rc1. The prepare-dirs script (run as part of the icinga2 systemd service) executes chmod 2750 /run/icinga2/cmd. /run/icinga2 is under control of an unprivileged user by default. If /run/icinga2/cmd is a symlink, then it will by followed and arbitrary files can be changed to mode 2750 by the unprivileged icinga2 user.

CVSS Scores

version 3.1