The /etc/init.d/opsview-reporting-module script that runs at boot time in Opsview Monitor before 5.3.1 and 5.4.x before 5.4.2 invokes a file that can be edited by the nagios user, and would allow attackers to elevate their privileges to root after a system restart, hence obtaining full control of the appliance.
The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.
Link | Tags |
---|---|
https://knowledge.opsview.com/v5.4/docs/whats-new | release notes vendor advisory |
https://seclists.org/fulldisclosure/2018/Sep/3 | mailing list third party advisory exploit |
https://www.coresecurity.com/advisories/opsview-monitor-multiple-vulnerabilities | third party advisory exploit |
https://knowledge.opsview.com/v5.3/docs/whats-new | release notes vendor advisory |