Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2022-24715Path Traversal in Icingaweb2

CWE-22Path Traversal5 documents5 sources
Severity
8.8HIGHNVD
CNA8.5
EPSS
72.5%
top 1.23%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedMar 8
Latest updateJul 15

Description

Icinga Web 2 is an open source monitoring web interface, framework and command-line interface. Authenticated users, with access to the configuration, can create SSH resource files in unintended directories, leading to the execution of arbitrary code. This issue has been resolved in versions 2.8.6, 2.9.6 and 2.10 of Icinga Web 2. Users unable to upgrade should limit access to the Icinga Web 2 configuration.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages3 packages

CVEListV5icinga/icingaweb2< 2.8.6+1
NVDicinga/icinga_web_22.9.02.9.6+1
Debianicinga/icingaweb2< 2.9.6-1+2

Patches

🔴Vulnerability Details

2
CVEList
Arbitrary code execution for authenticated users in Icinga Web 22022-03-08
OSV
CVE-2022-24715: Icinga Web 2 is an open source monitoring web interface, framework and command-line interface2022-03-08

💥Exploits & PoCs

1
Exploit-DB
Icinga Web 2.10 - Authenticated Remote Code Execution2023-07-15

📋Vendor Advisories

1
Debian
CVE-2022-24715: icingaweb2 - Icinga Web 2 is an open source monitoring web interface, framework and command-l...2022
CVE-2022-24715 — Path Traversal in Icinga Icingaweb2 | cvebase