CVE-2022-50942
📋 TL;DR
CVE-2022-50942 is a client-side cross-site scripting vulnerability in Icinga Web 2.8.2 that allows attackers to inject malicious scripts through the icinga.min.js file. This can lead to session hijacking and phishing attacks when users interact with the compromised web interface. Organizations running Icinga Web 2.8.2 are affected.
💻 Affected Systems
- Icinga Web 2
⚠️ Risk & Real-World Impact
Worst Case
Attackers hijack administrator sessions, gain full control of the monitoring system, steal credentials, and pivot to internal networks.
Likely Case
Attackers steal user sessions, perform phishing attacks, and manipulate monitoring data/alerts.
If Mitigated
Limited impact due to proper input validation, CSP headers, and session security controls.
🎯 Exploit Status
Exploitation requires user interaction (clicking malicious link) but doesn't require authentication.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 2.8.3
Vendor Advisory: https://icinga.com/blog/2022/10/24/icinga-web-2-8-3-released/
Restart Required: Yes
Instructions:
1. Backup current installation. 2. Download Icinga Web 2.8.3 from official repository. 3. Replace existing installation with patched version. 4. Restart web server service.
🔧 Temporary Workarounds
Implement Content Security Policy
allAdd CSP headers to restrict script execution sources
Add to web server config: Content-Security-Policy: script-src 'self'
Input Validation Filter
allAdd input sanitization for EventListener parameters
Implement JavaScript input validation before EventListener.handleEvent calls
🧯 If You Can't Patch
- Restrict access to Icinga Web interface using network ACLs/firewall rules
- Implement web application firewall with XSS protection rules
🔍 How to Verify
Check if Vulnerable:
Check Icinga Web version via web interface or configuration files
Check Version:
grep version /usr/share/icingaweb2/application/config/version.ini
Verify Fix Applied:
Verify version is 2.8.3 or later and test XSS payloads no longer execute
📡 Detection & Monitoring
Log Indicators:
- Unusual JavaScript execution patterns
- Suspicious EventListener calls in browser logs
Network Indicators:
- Malicious script injections in HTTP requests to icinga.min.js
SIEM Query:
source="web_access_logs" AND uri="*icinga.min.js*" AND (content="<script>" OR content="javascript:")