First published: Mon Dec 17 2018(Updated: )
Icinga Web 2 before 2.6.2 allows injection of PHP ini-file directives via vectors involving environment variables as the channel to send information to the attacker, such as a name=${PATH}_${APACHE_RUN_DIR}_${APACHE_RUN_USER} parameter to /icingaweb2/navigation/add or /icingaweb2/dashboard/new-dashlet.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Icinga Icinga Web 2 | <2.6.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-18249 is a vulnerability in Icinga Web 2 before version 2.6.2 that allows injection of PHP ini-file directives via vectors involving environment variables.
CVE-2018-18249 affects Icinga Web 2 versions prior to 2.6.2 by allowing the injection of PHP ini-file directives through environment variables.
CVE-2018-18249 has a severity rating of 9.8, which is considered critical.
To fix CVE-2018-18249, users should upgrade their Icinga Web 2 installation to version 2.6.2 or above as it contains the necessary security patches.
More information about CVE-2018-18249 can be found in the following references: [OpenSUSE Security Announcement](http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00031.html) and [USD HeroLab Advisory](https://herolab.usd.de/wp-content/uploads/sites/4/2018/12/usd20180030.txt).