{"api_version":"1","generated_at":"2026-04-23T02:58:51+00:00","cve":"CVE-2022-24714","urls":{"html":"https://cve.report/CVE-2022-24714","api":"https://cve.report/api/cve/CVE-2022-24714.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-24714","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-24714"},"summary":{"title":"CVE-2022-24714","description":"Icinga Web 2 is an open source monitoring web interface, framework and command-line interface. Installations of Icinga 2 with the IDO writer enabled are affected. If you use service custom variables in role restrictions, and you regularly decommission service objects, users with said roles may still have access to a collection of content. Note that this only applies if a role has implicitly permitted access to hosts, due to permitted access to at least one of their services. If access to a host is permitted by other means, no sensible information has been disclosed to unauthorized users. This issue has been resolved in versions 2.8.6, 2.9.6 and 2.10 of Icinga Web 2.","state":"PUBLIC","assigner":"security-advisories@github.com","published_at":"2022-03-08 20:15:00","updated_at":"2022-11-09 21:38:00"},"problem_types":["CWE-863"],"metrics":[],"references":[{"url":"https://security.gentoo.org/glsa/202208-05","name":"GLSA-202208-05","refsource":"GENTOO","tags":[],"title":"Icinga Web 2: Multiple Vulnerabilities (GLSA 202208-05) — Gentoo security","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/Icinga/icingaweb2/commit/6e989d05a1568a6733a3d912001251acc51d9293","name":"https://github.com/Icinga/icingaweb2/commit/6e989d05a1568a6733a3d912001251acc51d9293","refsource":"MISC","tags":[],"title":"Merge pull request from GHSA-qcmg-vr56-x9wf · Icinga/icingaweb2@6e989d0 · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/Icinga/icingaweb2/security/advisories/GHSA-qcmg-vr56-x9wf","name":"https://github.com/Icinga/icingaweb2/security/advisories/GHSA-qcmg-vr56-x9wf","refsource":"CONFIRM","tags":[],"title":"Unwanted disclosure of hosts and related data, linked to decommissioned services · Advisory · Icinga/icingaweb2 · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-24714","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-24714","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2022","cve_id":"24714","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"icinga","cpe5":"icinga_web_2","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2022-24714","qid":"184211","title":"Debian Security Update for icingaweb2 (CVE-2022-24714)"},{"cve":"CVE-2022-24714","qid":"710576","title":"Gentoo Linux Icinga Web 2 Multiple Vulnerabilities (GLSA 202208-05)"}]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"security-advisories@github.com","ID":"CVE-2022-24714","STATE":"PUBLIC","TITLE":"Disclosure of hosts and related data, linked to decommissioned services in Icinga Web 2"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"icingaweb2","version":{"version_data":[{"version_value":"< 2.8.6"},{"version_value":">= 2.9.0, < 2.9.6"}]}}]},"vendor_name":"Icinga"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Icinga Web 2 is an open source monitoring web interface, framework and command-line interface. Installations of Icinga 2 with the IDO writer enabled are affected. If you use service custom variables in role restrictions, and you regularly decommission service objects, users with said roles may still have access to a collection of content. Note that this only applies if a role has implicitly permitted access to hosts, due to permitted access to at least one of their services. If access to a host is permitted by other means, no sensible information has been disclosed to unauthorized users. This issue has been resolved in versions 2.8.6, 2.9.6 and 2.10 of Icinga Web 2."}]},"impact":{"cvss":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":5.3,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-863: Incorrect Authorization"}]}]},"references":{"reference_data":[{"name":"https://github.com/Icinga/icingaweb2/security/advisories/GHSA-qcmg-vr56-x9wf","refsource":"CONFIRM","url":"https://github.com/Icinga/icingaweb2/security/advisories/GHSA-qcmg-vr56-x9wf"},{"name":"https://github.com/Icinga/icingaweb2/commit/6e989d05a1568a6733a3d912001251acc51d9293","refsource":"MISC","url":"https://github.com/Icinga/icingaweb2/commit/6e989d05a1568a6733a3d912001251acc51d9293"},{"refsource":"GENTOO","name":"GLSA-202208-05","url":"https://security.gentoo.org/glsa/202208-05"}]},"source":{"advisory":"GHSA-qcmg-vr56-x9wf","discovery":"UNKNOWN"}},"nvd":{"publishedDate":"2022-03-08 20:15:00","lastModifiedDate":"2022-11-09 21:38:00","problem_types":["CWE-863"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":5.3,"baseSeverity":"MEDIUM"},"exploitabilityScore":3.9,"impactScore":1.4},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:N/A:N","accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":4.3},"severity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:icinga:icinga_web_2:*:*:*:*:*:*:*:*","versionEndExcluding":"2.8.6","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:icinga:icinga_web_2:*:*:*:*:*:*:*:*","versionStartIncluding":"2.9.0","versionEndExcluding":"2.9.6","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2022","CveId":"24714","Ordinal":"228246","Title":"CVE-2022-24714","CVE":"CVE-2022-24714","Year":"2022"},"notes":[{"CveYear":"2022","CveId":"24714","Ordinal":"1","NoteData":"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","Type":"Description","Title":null}]}}}