Icinga Web 2 is an open source monitoring web interface, framework and command-line interface. Authenticated users, with access to the configuration, can create SSH resource files in unintended directories, leading to the execution of arbitrary code. This issue has been resolved in versions 2.8.6, 2.9.6 and 2.10 of Icinga Web 2. Users unable to upgrade should limit access to the Icinga Web 2 configuration.
References
Link | Resource |
---|---|
https://github.com/Icinga/icingaweb2/security/advisories/GHSA-v9mv-h52f-7g63 | Third Party Advisory |
https://github.com/Icinga/icingaweb2/commit/a06d915467ca943a4b406eb9587764b8ec34cafb | Patch Third Party Advisory |
https://security.gentoo.org/glsa/202208-05 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2022-03-08 12:15
Updated : 2022-11-09 13:26
NVD link : CVE-2022-24715
Mitre link : CVE-2022-24715
JSON object : View
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Products Affected
icinga
- icinga_web_2