ID: 13981
Title: Permission checks in REST-API service downtimes
Component: REST API
Level: 1
Class: Security fix
Version: 2.3.0b1
Prior to this Werk it was possible for users to schedule downtimes for services of any host via the REST API, even if they didn't have the permissions to do so.
The REST API will now correctly check the users permissions when putting a service into downtime.
That not only includes the permission "wato.downtimes" but also access to the effected host and service.
<b>Affected Versions</b>:
LI: 2.2.0 (beta)
LI: 2.1.0
<b>Vulnerability Management</b>:
We have rated the issue with a CVSS Score of 4.3 (Medium) with the following CVSS vector:
<tt>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N</tt>.
and assigned CVE <tt>CVE-2023-2020</tt>.
ID: 15423
Title: Linux agent: Handle failing symmetric encryption
Component: Checks & agents
Level: 1
Class: Security fix
Version: 2.3.0b1
Prior to this Werk the symmetric encryption of agent data (if configured) would fail silently if the option "Run agent as non-root user (Linux)" was also set, since these two options are not compatible.
As a result, agent output would be sent unencrypted.
If symmetric encryption is configured, but failing, the agent will now abort immediately and transmit a message about the failure as the only output.<br>
This will then be reported at the <i>Check_MK Agent</i> service of the host, alongside a <tt>CRIT</tt> status.
<b>Affected Versions</b>:
LI: 2.2.0 (beta)
LI: 2.1.0
LI: 2.0.0
LI: 1.6.0 (EOL)
<b>Vulnerability Management</b>:
We have rated the issue with a CVSS Score of 3.7 (Low) with the following CVSS vector: <tt>CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N</tt>.
We have assigned CVE <tt>CVE-2023-1768</tt>.