Vulnerability Details : CVE-2022-24715
Icinga Web 2 is an open source monitoring web interface, framework and command-line interface. Authenticated users, with access to the configuration, can create SSH resource files in unintended directories, leading to the execution of arbitrary code. This issue has been resolved in versions 2.8.6, 2.9.6 and 2.10 of Icinga Web 2. Users unable to upgrade should limit access to the Icinga Web 2 configuration.
Vulnerability category: Directory traversal
Products affected by CVE-2022-24715
- cpe:2.3:a:icinga:icinga_web_2:*:*:*:*:*:*:*:*
- cpe:2.3:a:icinga:icinga_web_2:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-24715
0.46%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 75 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2022-24715
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.0
|
MEDIUM | AV:N/AC:M/Au:S/C:P/I:P/A:P |
6.8
|
6.4
|
NIST | |
8.8
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
NIST | |
8.5
|
HIGH | CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H |
1.8
|
6.0
|
GitHub, Inc. |
CWE ids for CVE-2022-24715
-
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.Assigned by: security-advisories@github.com (Primary)
References for CVE-2022-24715
-
http://packetstormsecurity.com/files/173516/Icinga-Web-2.10-Remote-Code-Execution.html
Icinga Web 2.10 Remote Code Execution ≈ Packet Storm
-
https://github.com/Icinga/icingaweb2/commit/a06d915467ca943a4b406eb9587764b8ec34cafb
Merge pull request from GHSA-v9mv-h52f-7g63 · Icinga/icingaweb2@a06d915 · GitHubPatch;Third Party Advisory
-
https://github.com/Icinga/icingaweb2/security/advisories/GHSA-v9mv-h52f-7g63
SSH resources allow arbitrary code execution for authenticated users · Advisory · Icinga/icingaweb2 · GitHubThird Party Advisory
-
https://security.gentoo.org/glsa/202208-05
Icinga Web 2: Multiple Vulnerabilities (GLSA 202208-05) — Gentoo securityThird Party Advisory
Jump to