First published: Tue Mar 08 2022(Updated: )
Icinga Web 2 is an open source monitoring web interface, framework and command-line interface. Unauthenticated users can leak the contents of files of the local system accessible to the web-server user, including `icingaweb2` configuration files with database credentials. This issue has been resolved in versions 2.9.6 and 2.10 of Icinga Web 2. Database credentials should be rotated.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
Icinga Icinga Web 2 | >=2.9.0<2.9.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-24716 is a vulnerability in Icinga Web 2 that allows unauthenticated users to access and leak the contents of files on the local system, including configuration files with sensitive information.
CVE-2022-24716 has a severity rating of 7.5 (High).
CVE-2022-24716 allows unauthenticated users to gain access to sensitive files on the local system, potentially exposing confidential information.
Yes, the issue has been resolved. It is recommended to update to Icinga Web 2 version 2.9.7 or later to mitigate this vulnerability.
You can find more information about CVE-2022-24716 at the following references: [Packet Storm](http://packetstormsecurity.com/files/171774/Icinga-Web-2.10-Arbitrary-File-Disclosure.html), [GitHub Commit](https://github.com/Icinga/icingaweb2/commit/9931ed799650f5b8d5e1dc58ea3415a4cdc5773d), [GitHub Security Advisories](https://github.com/Icinga/icingaweb2/security/advisories/GHSA-5p3f-rh28-8frw).