A Security vulnerability has been found on several director endpoints of REST API. To reproduce this vulnerability an authenticated user with permission to access the Director is required (plus api access with regard to the api endpoints). And even though some of these Icinga Director users are restricted from accessing certain objects, are able to retrieve information related to them if their name is known. This makes it possible to change the configuration of these objects by those Icinga Director users restricted from accessing them. This results in further exploitation, data breaches and sensitive information disclosure. Reproducible: Always
The bug has been referenced in the following commit(s): https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=eb2db5be531859a475e94a68ff3d6376c0dc799e commit eb2db5be531859a475e94a68ff3d6376c0dc799e Author: Anton Fischl <github@fischl-online.de> AuthorDate: 2025-04-01 21:10:05 +0000 Commit: Jay Faulkner <jayf@gentoo.org> CommitDate: 2025-04-02 03:17:56 +0000 www-apps/icingaweb2-module-director: add 1.11.4 Bug: https://bugs.gentoo.org/953028 Signed-off-by: Anton Fischl <github@fischl-online.de> Signed-off-by: Jay Faulkner <jayf@gentoo.org> www-apps/icingaweb2-module-director/Manifest | 1 + .../icingaweb2-module-director-1.11.4.ebuild | 71 ++++++++++++++++++++++ 2 files changed, 72 insertions(+)