vendor:
Icinga Web
by:
Jacob Ebben
5.5
CVSS
MEDIUM
Arbitrary File Disclosure
22
CWE
Product Name: Icinga Web
Affected Version From: <2.8.6
Affected Version To: <2.10
Patch Exists: YES
Related CWE: CVE-2022-24716
CPE: a:icinga:icinga_web:2.10
Tags: packetstorm,cve,cve2023,icinga,lfi
CVSS Metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Nuclei References:
https://github.com/JacobEbben/CVE-2022-24716/blob/main/exploit.py, http://packetstormsecurity.com/files/171774/Icinga-Web-2.10-Arbitrary-File-Disclosure.html, https://github.com/Icinga/icingaweb2/commit/9931ed799650f5b8d5e1dc58ea3415a4cdc5773d, https://github.com/Icinga/icingaweb2/security/advisories/GHSA-5p3f-rh28-8frw, https://security.gentoo.org/glsa/202208-05
Nuclei Metadata: {'max-request': 3, 'shodan-query': 'title:"Icinga"', 'vendor': 'icinga', 'product': 'icinga_web_2'}
Platforms Tested: Linux
2023
Icinga Web 2.10 – Arbitrary File Disclosure
This exploit allows an attacker to disclose arbitrary files on a target system running Icinga Web version <2.8.6, <2.9.6, <2.10. By exploiting a path traversal vulnerability, the attacker can specify a file to be disclosed and retrieve its contents. The vulnerability is identified by CVE-2022-24716. The exploit is based on the findings outlined in the blog post by SonarSource.
Mitigation:
Update Icinga Web to version 2.8.6 or higher to address this vulnerability. Implement proper input validation and sanitization to prevent path traversal attacks.