Lucene search

K
githubexploitFE48662D-4928-5A89-A7D2-9131D5A2325F
HistoryJul 08, 2023 - 11:22 p.m.

Exploit for Path Traversal in Icinga Icinga Web 2

2023-07-0823:22:28
175
icinga
web 2
path traversal
remote code execution
exploit
security
command execution
reverse shell
attack
vulnerability
remote
python3
localhost
admin
admin123
192.168.1.1
443

CVSS2

6

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:S/C:P/I:P/A:P

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0.004

Percentile

74.2%

Icinga Web 2 - Authenticated Remote Code Execution <2.8.6, <2.9…

This is an article that belongs to githubexploit private collection.
Please sign in to get more Information.

CVSS2

6

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:S/C:P/I:P/A:P

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0.004

Percentile

74.2%