Icinga Web 2 Icinga Web 2

Do you want an email whenever new security vulnerabilities are reported in Icinga Web 2?

By the Year

In 2024 there have been 0 vulnerabilities in Icinga Web 2 . Icinga Web 2 did not have any published security vulnerabilities last year.

Year Vulnerabilities Average Score
2024 0 0.00
2023 0 0.00
2022 3 7.20
2021 0 0.00
2020 1 7.50
2019 0 0.00
2018 5 7.06

It may take a day or so for new Icinga Web 2 vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Icinga Web 2 Security Vulnerabilities

Icinga Web 2 is an open source monitoring web interface, framework and command-line interface

CVE-2022-24716 7.5 - High - March 08, 2022

Icinga Web 2 is an open source monitoring web interface, framework and command-line interface. Unauthenticated users can leak the contents of files of the local system accessible to the web-server user, including `icingaweb2` configuration files with database credentials. This issue has been resolved in versions 2.9.6 and 2.10 of Icinga Web 2. Database credentials should be rotated.

Directory traversal

Icinga Web 2 is an open source monitoring web interface, framework and command-line interface

CVE-2022-24715 8.8 - High - March 08, 2022

Icinga Web 2 is an open source monitoring web interface, framework and command-line interface. Authenticated users, with access to the configuration, can create SSH resource files in unintended directories, leading to the execution of arbitrary code. This issue has been resolved in versions 2.8.6, 2.9.6 and 2.10 of Icinga Web 2. Users unable to upgrade should limit access to the Icinga Web 2 configuration.

Directory traversal

Icinga Web 2 is an open source monitoring web interface, framework and command-line interface

CVE-2022-24714 5.3 - Medium - March 08, 2022

Icinga Web 2 is an open source monitoring web interface, framework and command-line interface. Installations of Icinga 2 with the IDO writer enabled are affected. If you use service custom variables in role restrictions, and you regularly decommission service objects, users with said roles may still have access to a collection of content. Note that this only applies if a role has implicitly permitted access to hosts, due to permitted access to at least one of their services. If access to a host is permitted by other means, no sensible information has been disclosed to unauthorized users. This issue has been resolved in versions 2.8.6, 2.9.6 and 2.10 of Icinga Web 2.

AuthZ

Icinga Icinga Web2 2.0.0 through 2.6.4, 2.7.4 and 2.8.2 has a Directory Traversal vulnerability which allows an attacker to access arbitrary files

CVE-2020-24368 7.5 - High - August 19, 2020

Icinga Icinga Web2 2.0.0 through 2.6.4, 2.7.4 and 2.8.2 has a Directory Traversal vulnerability which allows an attacker to access arbitrary files that are readable by the process running Icinga Web 2. This issue is fixed in Icinga Web 2 in v2.6.4, v2.7.4 and v2.8.2.

Directory traversal

Icinga Web 2 before 2.6.2 has CSRF

CVE-2018-18246 6.5 - Medium - December 17, 2018

Icinga Web 2 before 2.6.2 has CSRF via /icingaweb2/config/moduledisable?name=monitoring to disable the monitoring module, or via /icingaweb2/config/moduleenable?name=setup to enable the setup module.

Session Riding

Icinga Web 2 before 2.6.2 has XSS

CVE-2018-18247 5.4 - Medium - December 17, 2018

Icinga Web 2 before 2.6.2 has XSS via the /icingaweb2/navigation/add icon parameter.

XSS

Icinga Web 2 has XSS

CVE-2018-18248 6.1 - Medium - December 17, 2018

Icinga Web 2 has XSS via the /icingaweb2/monitoring/list/services dir parameter, the /icingaweb2/user/list query string, the /icingaweb2/monitoring/timeline query string, or the /icingaweb2/setup query string.

XSS

Icinga Web 2 before 2.6.2

CVE-2018-18249 9.8 - Critical - December 17, 2018

Icinga Web 2 before 2.6.2 allows injection of PHP ini-file directives via vectors involving environment variables as the channel to send information to the attacker, such as a name=${PATH}_${APACHE_RUN_DIR}_${APACHE_RUN_USER} parameter to /icingaweb2/navigation/add or /icingaweb2/dashboard/new-dashlet.

Code Injection

Icinga Web 2 before 2.6.2 allows parameters

CVE-2018-18250 7.5 - High - December 17, 2018

Icinga Web 2 before 2.6.2 allows parameters that break navigation dashlets, as demonstrated by a single '$' character as the Name of a Navigation item.

Injection

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Icinga Web 2 or by Icinga? Click the Watch button to subscribe.

Icinga
Vendor

Icinga Web 2
Product

subscribe