Checkmk

Checkmk

92 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.2%
  • Veröffentlicht 20.02.2023 17:15:12
  • Zuletzt bearbeitet 21.11.2024 07:33:09

Cross-site Request Forgery (CSRF) in Tribe29's Checkmk <= 2.1.0p17, Checkmk <= 2.0.0p31, and all versions of Checkmk 1.6.0 (EOL) allow an attacker to add new visual elements to multiple pages.

  • EPSS 0.06%
  • Veröffentlicht 20.02.2023 17:15:12
  • Zuletzt bearbeitet 21.11.2024 07:33:09

Sensitive host secret disclosed in cmk-update-agent.log file in Tribe29's Checkmk <= 2.1.0p13, Checkmk <= 2.0.0p29, and all versions of Checkmk 1.6.0 (EOL) allows an attacker to gain access to the host secret through the unprotected agent updater log...

  • EPSS 0.2%
  • Veröffentlicht 20.02.2023 17:15:12
  • Zuletzt bearbeitet 21.11.2024 07:33:09

No authorisation controls in the RestAPI documentation for Tribe29's Checkmk <= 2.1.0p13 and Checkmk <= 2.0.0p29 which may lead to unintended information disclosure through automatically generated user specific tags within Rest API documentation.

  • EPSS 0.39%
  • Veröffentlicht 20.02.2023 17:15:12
  • Zuletzt bearbeitet 21.11.2024 07:33:08

Expired sessions were not securely terminated in the RestAPI for Tribe29's Checkmk <= 2.1.0p10 and Checkmk <= 2.0.0p28 allowing an attacker to use expired session tokens when communicating with the RestAPI.

Exploit
  • EPSS 0.28%
  • Veröffentlicht 20.02.2023 17:15:12
  • Zuletzt bearbeitet 21.11.2024 07:32:31

Livestatus Query Language (LQL) injection in the AuthUser HTTP query header of Tribe29's Checkmk <= 2.1.0p11, Checkmk <= 2.0.0p28, and all versions of Checkmk 1.6.0 (EOL) allows an attacker to perform direct queries to the application's core from loc...

Exploit
  • EPSS 2.22%
  • Veröffentlicht 20.02.2023 17:15:12
  • Zuletzt bearbeitet 21.11.2024 07:31:08

PHP code injection in watolib auth.php and hosttags.php in Tribe29's Checkmk <= 2.1.0p10, Checkmk <= 2.0.0p27, and Checkmk <= 1.6.0p29 allows an attacker to inject and execute PHP code which will be executed upon request of the vulnerable component.

  • EPSS 0.71%
  • Veröffentlicht 20.02.2023 17:15:12
  • Zuletzt bearbeitet 21.11.2024 07:30:20

Command injection in SMS notifications in Tribe29 Checkmk <= 2.1.0p10, Checkmk <= 2.0.0p27, and Checkmk <= 1.6.0p29 allows an attacker with User Management permissions, as well as LDAP administrators in certain scenarios, to perform arbitrary command...

  • EPSS 0.07%
  • Veröffentlicht 09.02.2023 09:15:11
  • Zuletzt bearbeitet 21.11.2024 07:26:29

Uncontrolled Search Path Element in Checkmk Agent in Tribe29 Checkmk before 2.1.0p1, before 2.0.0p25 and before 1.6.0p29 on a Checkmk server allows the site user to escalate privileges via a manipulated unixcat executable

  • EPSS 0.39%
  • Veröffentlicht 26.01.2023 21:18:07
  • Zuletzt bearbeitet 21.11.2024 07:36:53

Improper Input Validation of LDAP user IDs in Tribe29 Checkmk allows attackers that can control LDAP user IDs to manipulate files on the server. Checkmk <= 2.1.0p19, Checkmk <= 2.0.0p32, and all versions of Checkmk 1.6.0 (EOL) are affected.

  • EPSS 0.26%
  • Veröffentlicht 09.01.2023 17:15:11
  • Zuletzt bearbeitet 21.11.2024 07:36:08

Path-Traversal in MKP storing in Tribe29 Checkmk <=2.0.0p32 and <= 2.1.0p18 allows an administrator to write mkp files to arbitrary locations via a malicious mkp file.