Module: check_mk
Branch: master
Commit: ec4a5fd821bea17767d538bf58683e66b7f1fb5a
URL:
http://git.mathias-kettner.de/git/?p=check_mk.git;a=commit;h=ec4a5fd821bea1…
Author: Lars Michelsen <lm(a)mathias-kettner.de>
Date: Thu Oct 18 14:46:39 2018 +0200
6786 SEC Livestatus proxy: Fixed file path traversal vulnerability
The livestatus proxy connects to the livestatus server of remote sites. One task is to
fetch the inventory data of the remote site and replicate it to the master site to make
client accesses faster.
The livestatus proxy was not validating the incoming data correctly which made it
possible
for an attacker that has access to the remote sites to compromise the site the livestatus
proxy daemon is running in.
Using this vulnerability it was possible to write write files in directories that are
writable
by the liveproxy site user. This could be used to gain access to the liveproxy site.
CMK-1153
Change-Id: Ie4de43fc2f8603ba9f03198384a41291ccee726d
---
.werks/6786 | 20 ++++++++++++++++++++
1 file changed, 20 insertions(+)
diff --git a/.werks/6786 b/.werks/6786
new file mode 100644
index 0000000..8f0095e
--- /dev/null
+++ b/.werks/6786
@@ -0,0 +1,20 @@
+Title: Livestatus proxy: Fixed file path traversal vulnerability
+Level: 2
+Component: liveproxy
+Class: security
+Compatible: compat
+Edition: cee
+State: unknown
+Version: 1.6.0i1
+Date: 1539844674
+
+The livestatus proxy connects to the livestatus server of remote sites. One task is to
+fetch the inventory data of the remote site and replicate it to the master site to make
+client accesses faster.
+
+The livestatus proxy was not validating the incoming data correctly which made it
possible
+for an attacker that has access to the remote sites to compromise the site the
livestatus
+proxy daemon is running in.
+
+Using this vulnerability it was possible to write write files in directories that are
writable
+by the liveproxy site user. This could be used to gain access to the liveproxy site.