CVE-2022-24716
HIGH EXPLOITED NUCLEIIcinga Web 2 <2.9.5 - Info Disclosure
Title source: llmDescription
Icinga Web 2 is an open source monitoring web interface, framework and command-line interface. Unauthenticated users can leak the contents of files of the local system accessible to the web-server user, including `icingaweb2` configuration files with database credentials. This issue has been resolved in versions 2.9.6 and 2.10 of Icinga Web 2. Database credentials should be rotated.
Exploits (9)
metasploit
WORKING POC
by h00die, Jacob Ebben, Thomas Chauchefoin · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/scanner/http/icinga_static_library_file_directory_traversal.rb
Nuclei Templates (1)
Icinga Web 2 - Arbitrary File Disclosure
HIGHby DhiyaneshDK
Shodan:
title:"Icinga" || http.title:"icinga" || http.title:"icinga web 2 login"
FOFA:
title="icinga web 2 login" || title="icinga"
References (4)
Scores
CVSS v3
7.5
EPSS
0.9318
EPSS Percentile
99.8%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Exploitation Intel
VulnCheck KEV
2024-01-22
Classification
CWE
CWE-22
Status
published
Affected Products (1)
icinga/icinga_web_2
< 2.9.6
Timeline
Published
Mar 08, 2022
Tracked Since
Feb 18, 2026