First published: Tue Mar 08 2022(Updated: )
Icinga Web 2 is an open source monitoring web interface, framework and command-line interface. Authenticated users, with access to the configuration, can create SSH resource files in unintended directories, leading to the execution of arbitrary code. This issue has been resolved in versions 2.8.6, 2.9.6 and 2.10 of Icinga Web 2. Users unable to upgrade should limit access to the Icinga Web 2 configuration.
Credit: Dante Corona security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Icinga Icinga Web 2 | <2.8.6 | |
Icinga Icinga Web 2 | >=2.9.0<2.9.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-24715 is a vulnerability in Icinga Web 2 that allows authenticated users to execute arbitrary code by creating SSH resource files in unintended directories.
CVE-2022-24715 affects Icinga Web 2 versions up to 2.9.6, allowing authenticated users with access to the configuration to execute arbitrary code.
CVE-2022-24715 has a severity score of 8.8 (high).
To fix CVE-2022-24715, update Icinga Web 2 to version 2.8.6 or later.
Yes, you can find references for CVE-2022-24715 at the following links: [Exploit-DB](https://www.exploit-db.com/exploits/51586), [Packet Storm Security](http://packetstormsecurity.com/files/173516/Icinga-Web-2.10-Remote-Code-Execution.html), and [GitHub](https://github.com/Icinga/icingaweb2/commit/a06d915467ca943a4b406eb9587764b8ec34cafb).