{"id":"UBUNTU-CVE-2022-50942","details":"Incinga Web 2.8.2 contains a client-side cross-site scripting vulnerability that allows remote attackers to inject malicious script codes through the icinga.min.js file. Attackers can exploit the EventListener.handleEvent method to execute arbitrary scripts, potentially leading to session hijacking and non-persistent phishing attacks.","modified":"2026-02-04T19:18:39.092920Z","published":"2026-02-01T13:15:00Z","upstream":["CVE-2022-50942"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-50942"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2022-50942"},{"type":"REPORT","url":"https://www.vulnerability-lab.com/get_content.php?id=2273"},{"type":"REPORT","url":"https://github.com/Icinga/icingaweb2"},{"type":"REPORT","url":"https://icinga.com/"},{"type":"REPORT","url":"https://www.vulncheck.com/advisories/inciga-web-client-side-cross-site-scripting-via-eventlistener"}],"affected":[{"package":{"name":"icingaweb2","ecosystem":"Ubuntu:16.04:LTS","purl":"pkg:deb/ubuntu/icingaweb2@2.1.0-1ubuntu1.2?arch=source&distro=xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["2.1.0-1ubuntu1","2.1.0-1ubuntu1.1","2.1.0-1ubuntu1.2"],"ecosystem_specific":{"binaries":[{"binary_name":"icingaweb2","binary_version":"2.1.0-1ubuntu1.2"},{"binary_name":"icingaweb2-module-monitoring","binary_version":"2.1.0-1ubuntu1.2"},{"binary_name":"php-icinga","binary_version":"2.1.0-1ubuntu1.2"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2022/UBUNTU-CVE-2022-50942.json"}},{"package":{"name":"icingaweb2","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/icingaweb2@2.4.1-1ubuntu0.1?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["2.4.1-1","2.4.1-1ubuntu0.1"],"ecosystem_specific":{"binaries":[{"binary_name":"icingacli","binary_version":"2.4.1-1ubuntu0.1"},{"binary_name":"icingaweb2","binary_version":"2.4.1-1ubuntu0.1"},{"binary_name":"icingaweb2-common","binary_version":"2.4.1-1ubuntu0.1"},{"binary_name":"icingaweb2-module-monitoring","binary_version":"2.4.1-1ubuntu0.1"},{"binary_name":"php-icinga","binary_version":"2.4.1-1ubuntu0.1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2022/UBUNTU-CVE-2022-50942.json"}},{"package":{"name":"icingaweb2","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/icingaweb2@2.7.3-1?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["2.7.1-1","2.7.3-1"],"ecosystem_specific":{"binaries":[{"binary_name":"icingacli","binary_version":"2.7.3-1"},{"binary_name":"icingaweb2","binary_version":"2.7.3-1"},{"binary_name":"icingaweb2-common","binary_version":"2.7.3-1"},{"binary_name":"icingaweb2-module-monitoring","binary_version":"2.7.3-1"},{"binary_name":"php-icinga","binary_version":"2.7.3-1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2022/UBUNTU-CVE-2022-50942.json"}},{"package":{"name":"icingaweb2","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/icingaweb2@2.9.5-1?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["2.8.2-2","2.9.3-1","2.9.4-1","2.9.5-1"],"ecosystem_specific":{"binaries":[{"binary_name":"icingacli","binary_version":"2.9.5-1"},{"binary_name":"icingaweb2","binary_version":"2.9.5-1"},{"binary_name":"icingaweb2-common","binary_version":"2.9.5-1"},{"binary_name":"icingaweb2-module-monitoring","binary_version":"2.9.5-1"},{"binary_name":"php-icinga","binary_version":"2.9.5-1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2022/UBUNTU-CVE-2022-50942.json"}},{"package":{"name":"icingaweb2","ecosystem":"Ubuntu:24.04:LTS","purl":"pkg:deb/ubuntu/icingaweb2@2.12.1-1?arch=source&distro=noble"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["2.11.4-3","2.12.0-1","2.12.1-1"],"ecosystem_specific":{"binaries":[{"binary_name":"icingacli","binary_version":"2.12.1-1"},{"binary_name":"icingaweb2","binary_version":"2.12.1-1"},{"binary_name":"icingaweb2-common","binary_version":"2.12.1-1"},{"binary_name":"icingaweb2-module-monitoring","binary_version":"2.12.1-1"},{"binary_name":"php-icinga","binary_version":"2.12.1-1"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2022/UBUNTU-CVE-2022-50942.json"}},{"package":{"name":"icingaweb2","ecosystem":"Ubuntu:25.10","purl":"pkg:deb/ubuntu/icingaweb2@2.12.4-2?arch=source&distro=questing"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["2.12.2-1","2.12.4-1","2.12.4-2"],"ecosystem_specific":{"binaries":[{"binary_name":"icingacli","binary_version":"2.12.4-2"},{"binary_name":"icingaweb2","binary_version":"2.12.4-2"},{"binary_name":"icingaweb2-common","binary_version":"2.12.4-2"},{"binary_name":"icingaweb2-module-monitoring","binary_version":"2.12.4-2"},{"binary_name":"php-icinga","binary_version":"2.12.4-2"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2022/UBUNTU-CVE-2022-50942.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N"},{"type":"CVSS_V4","score":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N"},{"type":"Ubuntu","score":"medium"}]}