{"api_version":"1","generated_at":"2026-04-23T06:21:02+00:00","cve":"CVE-2022-24715","urls":{"html":"https://cve.report/CVE-2022-24715","api":"https://cve.report/api/cve/CVE-2022-24715.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2022-24715","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2022-24715"},"summary":{"title":"CVE-2022-24715","description":"Icinga Web 2 is an open source monitoring web interface, framework and command-line interface. Authenticated users, with access to the configuration, can create SSH resource files in unintended directories, leading to the execution of arbitrary code. This issue has been resolved in versions 2.8.6, 2.9.6 and 2.10 of Icinga Web 2. Users unable to upgrade should limit access to the Icinga Web 2 configuration.","state":"PUBLIC","assigner":"security-advisories@github.com","published_at":"2022-03-08 20:15:00","updated_at":"2023-07-17 17:15:00"},"problem_types":["CWE-22"],"metrics":[],"references":[{"url":"https://security.gentoo.org/glsa/202208-05","name":"GLSA-202208-05","refsource":"GENTOO","tags":[],"title":"Icinga Web 2: Multiple Vulnerabilities (GLSA 202208-05) — Gentoo security","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/Icinga/icingaweb2/security/advisories/GHSA-v9mv-h52f-7g63","name":"https://github.com/Icinga/icingaweb2/security/advisories/GHSA-v9mv-h52f-7g63","refsource":"CONFIRM","tags":[],"title":"SSH resources allow arbitrary code execution for authenticated users · Advisory · Icinga/icingaweb2 · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"http://packetstormsecurity.com/files/173516/Icinga-Web-2.10-Remote-Code-Execution.html","name":"http://packetstormsecurity.com/files/173516/Icinga-Web-2.10-Remote-Code-Execution.html","refsource":"MISC","tags":[],"title":"Icinga Web 2.10 Remote Code Execution ≈ Packet Storm","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/Icinga/icingaweb2/commit/a06d915467ca943a4b406eb9587764b8ec34cafb","name":"https://github.com/Icinga/icingaweb2/commit/a06d915467ca943a4b406eb9587764b8ec34cafb","refsource":"MISC","tags":[],"title":"Merge pull request from GHSA-v9mv-h52f-7g63 · Icinga/icingaweb2@a06d915 · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2022-24715","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-24715","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2022","cve_id":"24715","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"icinga","cpe5":"icinga_web_2","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2022-24715","qid":"184586","title":"Debian Security Update for icingaweb2 (CVE-2022-24715)"},{"cve":"CVE-2022-24715","qid":"710576","title":"Gentoo Linux Icinga Web 2 Multiple Vulnerabilities (GLSA 202208-05)"}]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"security-advisories@github.com","ID":"CVE-2022-24715","STATE":"PUBLIC","TITLE":"Arbitrary code execution for authenticated users in Icinga Web 2"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"icingaweb2","version":{"version_data":[{"version_value":"< 2.8.6"},{"version_value":">= 2.9.0, < 2.9.6"}]}}]},"vendor_name":"Icinga"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Icinga Web 2 is an open source monitoring web interface, framework and command-line interface. Authenticated users, with access to the configuration, can create SSH resource files in unintended directories, leading to the execution of arbitrary code. This issue has been resolved in versions 2.8.6, 2.9.6 and 2.10 of Icinga Web 2. Users unable to upgrade should limit access to the Icinga Web 2 configuration."}]},"impact":{"cvss":{"attackComplexity":"HIGH","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":8.5,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')"}]}]},"references":{"reference_data":[{"name":"https://github.com/Icinga/icingaweb2/security/advisories/GHSA-v9mv-h52f-7g63","refsource":"CONFIRM","url":"https://github.com/Icinga/icingaweb2/security/advisories/GHSA-v9mv-h52f-7g63"},{"name":"https://github.com/Icinga/icingaweb2/commit/a06d915467ca943a4b406eb9587764b8ec34cafb","refsource":"MISC","url":"https://github.com/Icinga/icingaweb2/commit/a06d915467ca943a4b406eb9587764b8ec34cafb"},{"refsource":"GENTOO","name":"GLSA-202208-05","url":"https://security.gentoo.org/glsa/202208-05"},{"refsource":"MISC","name":"http://packetstormsecurity.com/files/173516/Icinga-Web-2.10-Remote-Code-Execution.html","url":"http://packetstormsecurity.com/files/173516/Icinga-Web-2.10-Remote-Code-Execution.html"}]},"source":{"advisory":"GHSA-v9mv-h52f-7g63","discovery":"UNKNOWN"}},"nvd":{"publishedDate":"2022-03-08 20:15:00","lastModifiedDate":"2023-07-17 17:15:00","problem_types":["CWE-22"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:M/Au:S/C:P/I:P/A:P","accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL","baseScore":6},"severity":"MEDIUM","exploitabilityScore":6.8,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:icinga:icinga_web_2:*:*:*:*:*:*:*:*","versionEndExcluding":"2.8.6","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:icinga:icinga_web_2:*:*:*:*:*:*:*:*","versionStartIncluding":"2.9.0","versionEndExcluding":"2.9.6","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2022","CveId":"24715","Ordinal":"228301","Title":"CVE-2022-24715","CVE":"CVE-2022-24715","Year":"2022"},"notes":[{"CveYear":"2022","CveId":"24715","Ordinal":"1","NoteData":"** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.","Type":"Description","Title":null}]}}}