Discover the path traversal vulnerability in Icinga Web 2 that allows unauthenticated users to access local system files, including database credentials. Learn about the impact, affected versions, and mitigation steps.
A path traversal vulnerability has been discovered in Icinga Web 2, an open-source monitoring web interface, framework, and command-line interface. This vulnerability allows unauthenticated users to access and view the contents of files on the local system, including sensitive database credentials stored in the
icingaweb2
configuration files. The issue has been addressed in versions 2.9.6 and 2.10 of Icinga Web 2, with a recommendation to rotate database credentials for enhanced security.