CVE-2022-24716
HIGH EXPLOITED NUCLEIIcinga Web 2 <2.9.5 - Info Disclosure
Title source: llmDescription
Icinga Web 2 is an open source monitoring web interface, framework and command-line interface. Unauthenticated users can leak the contents of files of the local system accessible to the web-server user, including `icingaweb2` configuration files with database credentials. This issue has been resolved in versions 2.9.6 and 2.10 of Icinga Web 2. Database credentials should be rotated.
Exploits (10)
metasploit
WORKING POC
by h00die, Jacob Ebben, Thomas Chauchefoin · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/scanner/http/icinga_static_library_file_directory_traversal.rb
Nuclei Templates (1)
Icinga Web 2 - Arbitrary File Disclosure
HIGHby DhiyaneshDK
Shodan:
title:"Icinga" || http.title:"icinga" || http.title:"icinga web 2 login"
FOFA:
title="icinga web 2 login" || title="icinga"
References (4)
Scores
CVSS v3
7.5
EPSS
0.9311
EPSS Percentile
99.8%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Details
VulnCheck KEV
2024-01-22
CWE
CWE-22
Status
published
Products (1)
icinga/icinga_web_2
2.9.0 - 2.9.6
Published
Mar 08, 2022
Tracked Since
Feb 18, 2026