{"id":"CVE-2022-24716","summary":"Path traversal in Icinga Web 2","details":"Icinga Web 2 is an open source monitoring web interface, framework and command-line interface. Unauthenticated users can leak the contents of files of the local system accessible to the web-server user, including `icingaweb2` configuration files with database credentials. This issue has been resolved in versions 2.9.6 and 2.10 of Icinga Web 2. Database credentials should be rotated.","aliases":["GHSA-5p3f-rh28-8frw"],"modified":"2026-04-13T04:20:01.218191Z","published":"2022-03-08T00:00:00Z","database_specific":{"osv_generated_from":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/24xxx/CVE-2022-24716.json","cwe_ids":["CWE-22"],"cna_assigner":"GitHub_M"},"references":[{"type":"WEB","url":"http://packetstormsecurity.com/files/171774/Icinga-Web-2.10-Arbitrary-File-Disclosure.html"},{"type":"ADVISORY","url":"https://github.com/CVEProject/cvelistV5/tree/main/cves/2022/24xxx/CVE-2022-24716.json"},{"type":"ADVISORY","url":"https://github.com/Icinga/icingaweb2/security/advisories/GHSA-5p3f-rh28-8frw"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-24716"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/202208-05"},{"type":"FIX","url":"https://github.com/Icinga/icingaweb2/commit/9931ed799650f5b8d5e1dc58ea3415a4cdc5773d"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/icinga/icingaweb2","events":[{"introduced":"3b0a0a78df9389c46d3a74611a8eaec2f2b3cc77"},{"fixed":"e702d933e15b0907628091a03741baff1b6074df"},{"fixed":"9931ed799650f5b8d5e1dc58ea3415a4cdc5773d"}],"database_specific":{"extracted_events":[{"introduced":"2.9.0"},{"fixed":"2.9.6"}],"source":["CPE_FIELD","REFERENCES"],"cpe":"cpe:2.3:a:icinga:icinga_web_2:*:*:*:*:*:*:*:*"}}],"versions":["v2.9.0","v2.9.1","v2.9.2","v2.9.3","v2.9.4","v2.9.5"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2022-24716.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}]}