Skip to main content

CVE-2022-24716: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Icinga icingaweb2

Medium
Published: Tue Mar 08 2022 (03/08/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: Icinga
Product: icingaweb2

Description

Icinga Web 2 is an open source monitoring web interface, framework and command-line interface. Unauthenticated users can leak the contents of files of the local system accessible to the web-server user, including `icingaweb2` configuration files with database credentials. This issue has been resolved in versions 2.9.6 and 2.10 of Icinga Web 2. Database credentials should be rotated.

AI-Powered Analysis

AILast updated: 06/23/2025, 15:00:52 UTC

Technical Analysis

CVE-2022-24716 is a path traversal vulnerability identified in Icinga Web 2, an open-source monitoring web interface and framework widely used for IT infrastructure monitoring. The vulnerability affects versions 2.9.0 up to, but not including, 2.9.6. It allows unauthenticated attackers to exploit improper limitation of pathname inputs (CWE-22) to access files outside the intended restricted directories. Specifically, attackers can retrieve arbitrary files accessible to the web server user, including sensitive configuration files such as those containing database credentials. This exposure can lead to further compromise of the underlying database and potentially the monitoring infrastructure itself. The vulnerability arises because the application does not properly sanitize or restrict user-supplied file path inputs, enabling directory traversal sequences (e.g., ../) to access files outside the web root or designated safe directories. The issue was addressed in versions 2.9.6 and 2.10 of Icinga Web 2. Since database credentials may have been exposed, it is recommended to rotate these credentials post-remediation. No known exploits have been reported in the wild, but the vulnerability is significant due to the unauthenticated nature of the attack vector and the sensitivity of the data exposed.

Potential Impact

For European organizations using Icinga Web 2 versions between 2.9.0 and 2.9.6, this vulnerability poses a substantial risk to confidentiality and integrity. Unauthorized access to configuration files can lead to leakage of database credentials, enabling attackers to pivot into backend systems, manipulate monitoring data, or disrupt monitoring operations. This can degrade the reliability of IT infrastructure monitoring, potentially delaying detection of other security incidents or system failures. Given that monitoring systems often have elevated privileges and visibility into critical infrastructure, compromise could cascade into broader network breaches. The unauthenticated nature of the vulnerability lowers the barrier to exploitation, increasing risk especially in environments where Icinga Web 2 is exposed to untrusted networks or the internet. Availability impact is indirect but possible if attackers leverage access to disrupt monitoring or related services. The medium severity rating reflects the balance between the ease of exploitation and the criticality of the exposed data. European organizations in sectors such as finance, telecommunications, energy, and public administration that rely on Icinga for infrastructure monitoring could face operational and reputational damage if exploited.

Mitigation Recommendations

1. Immediate upgrade of Icinga Web 2 installations to version 2.9.6 or later, preferably to the latest stable release (2.10 or newer) to ensure the vulnerability is patched. 2. Conduct a thorough audit of all Icinga Web 2 instances to identify affected versions and exposure levels, especially those accessible from untrusted networks. 3. Rotate all database credentials and any other sensitive credentials stored in Icinga configuration files to invalidate potentially compromised secrets. 4. Restrict network access to Icinga Web 2 interfaces using firewalls or VPNs to limit exposure to trusted users only. 5. Implement web application firewall (WAF) rules to detect and block path traversal attempts targeting Icinga Web 2 endpoints. 6. Review and harden file system permissions to minimize the web server user’s access to sensitive files beyond what is strictly necessary. 7. Monitor logs for suspicious file access patterns indicative of path traversal exploitation attempts. 8. Educate system administrators on the importance of timely patching and credential rotation following such vulnerabilities. These steps go beyond generic advice by emphasizing credential rotation, network access controls, and proactive monitoring tailored to this specific vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2022-02-10T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d9842c4522896dcbf26e5

Added to database: 5/21/2025, 9:09:22 AM

Last enriched: 6/23/2025, 3:00:52 PM

Last updated: 7/31/2025, 3:15:40 AM

Views: 9

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats