{"id":"CVE-2018-18249","details":"Icinga Web 2 before 2.6.2 allows injection of PHP ini-file directives via vectors involving environment variables as the channel to send information to the attacker, such as a name=${PATH}_${APACHE_RUN_DIR}_${APACHE_RUN_USER} parameter to /icingaweb2/navigation/add or /icingaweb2/dashboard/new-dashlet.","modified":"2026-04-11T18:19:56.492496Z","published":"2018-12-17T15:29:00.530Z","related":["openSUSE-SU-2020:0067-1","openSUSE-SU-2024:10857-1"],"references":[{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00031.html"},{"type":"EVIDENCE","url":"https://herolab.usd.de/wp-content/uploads/sites/4/2018/12/usd20180030.txt"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/icinga/icingaweb2","events":[{"introduced":"0"},{"fixed":"63cb9d728338225833884fda2c312a5a9f431fd6"}],"database_specific":{"extracted_events":[{"introduced":"0"},{"fixed":"2.6.2"}],"source":"CPE_FIELD","cpe":"cpe:2.3:a:icinga:icinga_web_2:*:*:*:*:*:*:*:*"}}],"versions":["v1.0-11","v2.0.0","v2.0.0-beta1","v2.0.0-beta2","v2.0.0-beta3","v2.0.0-rc1","v2.1.0","v2.1.1","v2.1.2","v2.2.0","v2.3.0","v2.3.1","v2.3.2","v2.3.3","v2.3.4","v2.4.0","v2.4.0-2","v2.5.0","v2.5.1","v2.5.2","v2.5.3","v2.6.0","v2.6.1"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2018-18249.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}