Wuerth Phoenix has released some Critical Patches (CPs) for NetEye 4. These CPs resolve multiple vulnerabilities related to Privilege Escalation and authenticated remote command execution (RCE) exploits.
Description
GLPI was affected by an SSRF vulnerability in the External Calendars feature of the GLPI Plannings. An authenticated attacker could exploit this vulnerability to perform arbitrary requests on behalf of the Server, granted the attacker had edit permissions on GLPI Plannings.
An SSRF vulnerability was discovered in NagVis. Authenticated users with admin permissions on the NagVis module could perform arbitrary requests on behalf of the Server.
NagVis was also affected by a PHAR deserialization vulnerability. An authenticated attacker could exploit this vulnerability to achieve Remote Code Execution.
A Local Root Privilege Escalation vulnerability was found in Tornado. An attacker with unprivileged access to the system could perform a vertical privilege escalation.
An SSRF vulnerability was found in the Alyvix module. When calling the APIs of Alyvix nodes, the Alyvix backend was not validating the host address of the Alyvix node. An attacker with edit permissions on Icinga Director could insert malicious host addresses in Icinga Director to perform arbitrary HTTP GET and POST requests when visiting the Alyvix UI.
OCS Inventory was affected by an unsafe deserialization vulnerability. An authenticated attacker could achieve RCE by inserting malicious content in the cookies.
The SLM module had a path traversal vulnerability, occurring during the generation of the SLM Resource Reports. An authenticated attacker could insert malicious parameters in the definition of an SLM Report to write in arbitrary file paths.
For details on how to apply this update, which includes the changes described in this advisory, refer to the NetEye Update Section inside the User Guide.
Affected Products
All NetEye 4.x versions prior to and including 4.25.