You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The puppet module fetches the master's certificate using the icinga2 pki save-cert CLI command but does not in any way validate that this certificate actually belongs to the correct Icinga master.
This presents an MITM vulnerability where an attacker could associate Icinga agents with a rogue Icinga master. Once that's done it can:
a) Retrieve check results from the agent
b) send commands to the agent (depending on whether accept_commands is set)
c) send config files to the agent (depending on whether accept_config is set).
The text was updated successfully, but these errors were encountered:
The puppet module fetches the master's certificate using the
icinga2 pki save-cert
CLI command but does not in any way validate that this certificate actually belongs to the correct Icinga master.This presents an MITM vulnerability where an attacker could associate Icinga agents with a rogue Icinga master. Once that's done it can:
a) Retrieve check results from the agent
b) send commands to the agent (depending on whether accept_commands is set)
c) send config files to the agent (depending on whether accept_config is set).
The text was updated successfully, but these errors were encountered: