Search criteria

98 vulnerabilities found for Checkmk by Tribe29

CVE-2024-28833 (GCVE-0-2024-28833)

Vulnerability from cvelistv5 – Published: 2024-06-10 11:55 – Updated: 2024-08-02 00:56
VLAI?
Title
Missing brute-force protection for two factor authentication
Summary
Improper restriction of excessive authentication attempts with two factor authentication methods in Checkmk 2.3 before 2.3.0p6 facilitates brute-forcing of second factor mechanisms.
CWE
  • CWE-307 - Improper Restriction of Excessive Authentication Attempts
Assigner
References
Impacted products
Vendor Product Version
Checkmk GmbH Checkmk Affected: 2.3.0 , < 2.3.0p6 (semver)
Create a notification for this product.
Credits
PS Positive Security GmbH
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:checkmk:checkmk:2.3.0:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unaffected",
            "product": "checkmk",
            "vendor": "checkmk",
            "versions": [
              {
                "lessThan": "2.3.0p6",
                "status": "affected",
                "version": "2.3.0",
                "versionType": "semver"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-28833",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-06-10T18:04:29.500256Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-06-19T22:52:07.799Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T00:56:58.393Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://checkmk.com/werk/16830"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Checkmk",
          "vendor": "Checkmk GmbH",
          "versions": [
            {
              "lessThan": "2.3.0p6",
              "status": "affected",
              "version": "2.3.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "value": "PS Positive Security GmbH"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper restriction of excessive authentication attempts with two factor authentication methods in Checkmk 2.3 before 2.3.0p6 facilitates brute-forcing of second factor mechanisms."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-112",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-112: Brute Force"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-307",
              "description": "CWE-307: Improper Restriction of Excessive Authentication Attempts",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-06-19T08:12:15.306Z",
        "orgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
        "shortName": "Checkmk"
      },
      "references": [
        {
          "url": "https://checkmk.com/werk/16830"
        }
      ],
      "title": "Missing brute-force protection for two factor authentication"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
    "assignerShortName": "Checkmk",
    "cveId": "CVE-2024-28833",
    "datePublished": "2024-06-10T11:55:50.571Z",
    "dateReserved": "2024-03-11T13:21:43.122Z",
    "dateUpdated": "2024-08-02T00:56:58.393Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-6740 (GCVE-0-2023-6740)

Vulnerability from cvelistv5 – Published: 2024-01-12 07:50 – Updated: 2025-06-03 14:05
VLAI?
Title
Privilege escalation in jar_signature
Summary
Privilege escalation in jar_signature agent plugin in Checkmk before 2.2.0p18, 2.1.0p38 and 2.0.0p39 allows local user to escalate privileges
CWE
  • CWE-427 - Uncontrolled Search Path Element
Assigner
References
Impacted products
Vendor Product Version
Checkmk GmbH Checkmk Affected: 2.2.0 , < 2.2.0p18 (semver)
Affected: 2.1.0 , < 2.1.0p38 (semver)
Affected: 2.0.0 , ≤ 2.0.0p39 (semver)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T08:42:07.176Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://checkmk.com/werk/16163"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-6740",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-05-08T15:47:31.576972Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-06-03T14:05:24.299Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Checkmk",
          "vendor": "Checkmk GmbH",
          "versions": [
            {
              "lessThan": "2.2.0p18",
              "status": "affected",
              "version": "2.2.0",
              "versionType": "semver"
            },
            {
              "lessThan": "2.1.0p38",
              "status": "affected",
              "version": "2.1.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "2.0.0p39",
              "status": "affected",
              "version": "2.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Privilege escalation in jar_signature agent plugin in Checkmk before 2.2.0p18, 2.1.0p38 and 2.0.0p39 allows local user to escalate privileges"
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-233",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-233 Privilege Escalation"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-427",
              "description": "CWE-427 Uncontrolled Search Path Element",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-01-12T14:04:33.614Z",
        "orgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
        "shortName": "Checkmk"
      },
      "references": [
        {
          "url": "https://checkmk.com/werk/16163"
        }
      ],
      "title": "Privilege escalation in jar_signature"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
    "assignerShortName": "Checkmk",
    "cveId": "CVE-2023-6740",
    "datePublished": "2024-01-12T07:50:20.076Z",
    "dateReserved": "2023-12-12T15:55:03.221Z",
    "dateUpdated": "2025-06-03T14:05:24.299Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-6735 (GCVE-0-2023-6735)

Vulnerability from cvelistv5 – Published: 2024-01-12 07:50 – Updated: 2025-06-03 14:05
VLAI?
Title
Privilege escalation in mk_tsm
Summary
Privilege escalation in mk_tsm agent plugin in Checkmk before 2.2.0p18, 2.1.0p38 and 2.0.0p39 allows local user to escalate privileges
CWE
  • CWE-95 - Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection')
Assigner
References
Impacted products
Vendor Product Version
Checkmk GmbH Checkmk Affected: 2.2.0 , < 2.2.0p18 (semver)
Affected: 2.1.0 , < 2.1.0p38 (semver)
Affected: 2.0.0 , ≤ 2.0.0p39 (semver)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T08:35:14.884Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://checkmk.com/werk/16273"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-6735",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-05-08T18:45:38.891586Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-06-03T14:05:30.852Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Checkmk",
          "vendor": "Checkmk GmbH",
          "versions": [
            {
              "lessThan": "2.2.0p18",
              "status": "affected",
              "version": "2.2.0",
              "versionType": "semver"
            },
            {
              "lessThan": "2.1.0p38",
              "status": "affected",
              "version": "2.1.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "2.0.0p39",
              "status": "affected",
              "version": "2.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Privilege escalation in mk_tsm agent plugin in Checkmk before 2.2.0p18, 2.1.0p38 and 2.0.0p39 allows local user to escalate privileges"
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-233",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-233 Privilege Escalation"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-95",
              "description": "CWE-95: Improper Neutralization of Directives in Dynamically Evaluated Code (\u0027Eval Injection\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-08-26T09:48:15.939Z",
        "orgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
        "shortName": "Checkmk"
      },
      "references": [
        {
          "url": "https://checkmk.com/werk/16273"
        }
      ],
      "title": "Privilege escalation in mk_tsm"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
    "assignerShortName": "Checkmk",
    "cveId": "CVE-2023-6735",
    "datePublished": "2024-01-12T07:50:05.450Z",
    "dateReserved": "2023-12-12T15:27:34.769Z",
    "dateUpdated": "2025-06-03T14:05:30.852Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-31211 (GCVE-0-2023-31211)

Vulnerability from cvelistv5 – Published: 2024-01-12 07:49 – Updated: 2025-06-17 21:09
VLAI?
Title
Disabled automation users could still authenticate
Summary
Insufficient authentication flow in Checkmk before 2.2.0p18, 2.1.0p38 and 2.0.0p39 allows attacker to use locked credentials
CWE
  • CWE-303 - Incorrect Implementation of Authentication Algorithm
Assigner
References
Impacted products
Vendor Product Version
Checkmk GmbH Checkmk Affected: 2.2.0 , < 2.2.0p18 (semver)
Affected: 2.1.0 , < 2.1.0p38 (semver)
Affected: 2.0.0 , ≤ 2.0.0p39 (semver)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T14:53:30.666Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://checkmk.com/werk/16227"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-31211",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-01-12T14:44:05.997672Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-06-17T21:09:17.486Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Checkmk",
          "vendor": "Checkmk GmbH",
          "versions": [
            {
              "lessThan": "2.2.0p18",
              "status": "affected",
              "version": "2.2.0",
              "versionType": "semver"
            },
            {
              "lessThan": "2.1.0p38",
              "status": "affected",
              "version": "2.1.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "2.0.0p39",
              "status": "affected",
              "version": "2.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Insufficient authentication flow in Checkmk before 2.2.0p18, 2.1.0p38 and 2.0.0p39 allows attacker to use locked credentials"
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-114",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-114: Authentication Abuse"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-303",
              "description": "CWE-303: Incorrect Implementation of Authentication Algorithm",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-08-26T09:47:23.924Z",
        "orgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
        "shortName": "Checkmk"
      },
      "references": [
        {
          "url": "https://checkmk.com/werk/16227"
        }
      ],
      "title": "Disabled automation users could still authenticate"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
    "assignerShortName": "Checkmk",
    "cveId": "CVE-2023-31211",
    "datePublished": "2024-01-12T07:49:45.294Z",
    "dateReserved": "2023-04-25T08:49:15.443Z",
    "dateUpdated": "2025-06-17T21:09:17.486Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-31210 (GCVE-0-2023-31210)

Vulnerability from cvelistv5 – Published: 2023-12-13 08:26 – Updated: 2024-12-02 14:29
VLAI?
Title
Privilege escalation in agent via LD_LIBRARY_PATH
Summary
Usage of user controlled LD_LIBRARY_PATH in agent in Checkmk 2.2.0p10 up to 2.2.0p16 allows malicious Checkmk site user to escalate rights via injection of malicious libraries
CWE
  • CWE-427 - Uncontrolled Search Path Element
Assigner
References
Impacted products
Vendor Product Version
Checkmk GmbH Checkmk Affected: 2.2.0p10 , < 2.2.0p17 (semver)
Create a notification for this product.
Credits
We thank Jan-Philipp Litza for reporting this issue.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T14:53:29.719Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://checkmk.com/werk/16226"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-31210",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2023-12-18T21:37:33.317071Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-12-02T14:29:06.806Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Checkmk",
          "vendor": "Checkmk GmbH",
          "versions": [
            {
              "lessThan": "2.2.0p17",
              "status": "affected",
              "version": "2.2.0p10",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "value": "We thank Jan-Philipp Litza for reporting this issue."
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Usage of user controlled LD_LIBRARY_PATH in agent in Checkmk 2.2.0p10 up to 2.2.0p16 allows malicious Checkmk site user to escalate rights via injection of malicious libraries"
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-251",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-251: Local Code Inclusion"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-427",
              "description": "CWE-427: Uncontrolled Search Path Element",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-12-13T08:26:46.452Z",
        "orgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
        "shortName": "Checkmk"
      },
      "references": [
        {
          "url": "https://checkmk.com/werk/16226"
        }
      ],
      "title": "Privilege escalation in agent via LD_LIBRARY_PATH"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
    "assignerShortName": "Checkmk",
    "cveId": "CVE-2023-31210",
    "datePublished": "2023-12-13T08:26:46.452Z",
    "dateReserved": "2023-04-25T08:49:15.443Z",
    "dateUpdated": "2024-12-02T14:29:06.806Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-6251 (GCVE-0-2023-6251)

Vulnerability from cvelistv5 – Published: 2023-11-24 08:16 – Updated: 2024-08-02 08:21
VLAI?
Title
CSRF in delete_user_message
Summary
Cross-site Request Forgery (CSRF) in Checkmk < 2.2.0p15, < 2.1.0p37, <= 2.0.0p39 allow an authenticated attacker to delete user-messages for individual users.
CWE
  • CWE-352 - Cross-Site Request Forgery (CSRF)
Assigner
References
Impacted products
Vendor Product Version
Checkmk GmbH Checkmk Affected: 2.0.0 , ≤ 2.0.0p39 (semver)
Affected: 2.1.0 , < 2.1.0p37 (semver)
Affected: 2.2.0 , < 2.2.0p15 (semver)
Create a notification for this product.
Credits
Port Zero
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T08:21:18.099Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://checkmk.com/werk/16224"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Checkmk",
          "vendor": "Checkmk GmbH",
          "versions": [
            {
              "lessThanOrEqual": "2.0.0p39",
              "status": "affected",
              "version": "2.0.0",
              "versionType": "semver"
            },
            {
              "lessThan": "2.1.0p37",
              "status": "affected",
              "version": "2.1.0",
              "versionType": "semver"
            },
            {
              "lessThan": "2.2.0p15",
              "status": "affected",
              "version": "2.2.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "value": "Port Zero"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site Request Forgery (CSRF) in Checkmk \u003c 2.2.0p15, \u003c 2.1.0p37, \u003c= 2.0.0p39 allow an authenticated attacker to delete user-messages for individual users."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-62",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-62 Cross Site Request Forgery"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "baseScore": 3.5,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-352",
              "description": "CWE-352 Cross-Site Request Forgery (CSRF)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-11-24T08:16:23.663Z",
        "orgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
        "shortName": "Checkmk"
      },
      "references": [
        {
          "url": "https://checkmk.com/werk/16224"
        }
      ],
      "title": "CSRF in delete_user_message"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
    "assignerShortName": "Checkmk",
    "cveId": "CVE-2023-6251",
    "datePublished": "2023-11-24T08:16:23.663Z",
    "dateReserved": "2023-11-22T10:39:14.993Z",
    "dateUpdated": "2024-08-02T08:21:18.099Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-6157 (GCVE-0-2023-6157)

Vulnerability from cvelistv5 – Published: 2023-11-22 16:24 – Updated: 2024-08-02 08:21
VLAI?
Title
Livestatus injection in ajax_search
Summary
Improper neutralization of livestatus command delimiters in ajax_search in Checkmk <= 2.0.0p39, < 2.1.0p37, and < 2.2.0p15 allows arbitrary livestatus command execution for authorized users.
CWE
  • CWE-140 - Improper Neutralization of Delimiters
Assigner
References
Impacted products
Vendor Product Version
Checkmk GmbH Checkmk Affected: 2.2.0 , < 2.2.0p15 (semver)
Affected: 2.1.0 , < 2.1.0p37 (semver)
Affected: 2.0.0 , ≤ 2.0.0p39 (semver)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T08:21:17.625Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://checkmk.com/werk/16221"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Checkmk",
          "vendor": "Checkmk GmbH",
          "versions": [
            {
              "lessThan": "2.2.0p15",
              "status": "affected",
              "version": "2.2.0",
              "versionType": "semver"
            },
            {
              "lessThan": "2.1.0p37",
              "status": "affected",
              "version": "2.1.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "2.0.0p39",
              "status": "affected",
              "version": "2.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper neutralization of livestatus command delimiters in ajax_search in Checkmk \u003c= 2.0.0p39, \u003c 2.1.0p37, and \u003c 2.2.0p15 allows arbitrary livestatus command execution for authorized users."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-15",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-15: Command Delimiters"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "baseScore": 7.6,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-140",
              "description": "CWE-140: Improper Neutralization of Delimiters",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-11-22T16:24:22.002Z",
        "orgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
        "shortName": "Checkmk"
      },
      "references": [
        {
          "url": "https://checkmk.com/werk/16221"
        }
      ],
      "title": "Livestatus injection in ajax_search"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
    "assignerShortName": "Checkmk",
    "cveId": "CVE-2023-6157",
    "datePublished": "2023-11-22T16:24:22.002Z",
    "dateReserved": "2023-11-15T16:39:53.614Z",
    "dateUpdated": "2024-08-02T08:21:17.625Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-6156 (GCVE-0-2023-6156)

Vulnerability from cvelistv5 – Published: 2023-11-22 16:24 – Updated: 2024-08-02 08:21
VLAI?
Title
Livestatus injection in availability timeline
Summary
Improper neutralization of livestatus command delimiters in the availability timeline in Checkmk <= 2.0.0p39, < 2.1.0p37, and < 2.2.0p15 allows arbitrary livestatus command execution for authorized users.
CWE
  • CWE-140 - Improper Neutralization of Delimiters
Assigner
References
Impacted products
Vendor Product Version
Checkmk GmbH Checkmk Affected: 2.2.0 , < 2.2.0p15 (semver)
Affected: 2.1.0 , < 2.1.0p37 (semver)
Affected: 2.0.0 , ≤ 2.0.0p39 (semver)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T08:21:17.614Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://checkmk.com/werk/16221"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Checkmk",
          "vendor": "Checkmk GmbH",
          "versions": [
            {
              "lessThan": "2.2.0p15",
              "status": "affected",
              "version": "2.2.0",
              "versionType": "semver"
            },
            {
              "lessThan": "2.1.0p37",
              "status": "affected",
              "version": "2.1.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "2.0.0p39",
              "status": "affected",
              "version": "2.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper neutralization of livestatus command delimiters in the availability timeline in Checkmk \u003c= 2.0.0p39, \u003c 2.1.0p37, and \u003c 2.2.0p15 allows arbitrary livestatus command execution for authorized users."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-15",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-15: Command Delimiters"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "baseScore": 7.6,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-140",
              "description": "CWE-140: Improper Neutralization of Delimiters",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-11-22T16:24:15.515Z",
        "orgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
        "shortName": "Checkmk"
      },
      "references": [
        {
          "url": "https://checkmk.com/werk/16221"
        }
      ],
      "title": "Livestatus injection in availability timeline"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
    "assignerShortName": "Checkmk",
    "cveId": "CVE-2023-6156",
    "datePublished": "2023-11-22T16:24:15.515Z",
    "dateReserved": "2023-11-15T16:38:31.845Z",
    "dateUpdated": "2024-08-02T08:21:17.614Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-23549 (GCVE-0-2023-23549)

Vulnerability from cvelistv5 – Published: 2023-11-15 11:07 – Updated: 2024-08-28 20:25
VLAI?
Title
DoS via long hostnames
Summary
Improper Input Validation in Checkmk <2.2.0p15, <2.1.0p37, <=2.0.0p39 allows priviledged attackers to cause partial denial of service of the UI via too long hostnames.
CWE
  • CWE-1284 - Improper Validation of Specified Quantity in Input
Assigner
References
Impacted products
Vendor Product Version
Checkmk GmbH Checkmk Affected: 2.2.0 , < 2.2.0p15 (semver)
Affected: 2.1.0 , < 2.1.0p37 (semver)
Affected: 2.0.0 , ≤ 2.0.0p39 (semver)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T10:35:32.832Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://checkmk.com/werk/16219"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-23549",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-08-28T20:24:38.414790Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-28T20:25:01.313Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Checkmk",
          "vendor": "Checkmk GmbH",
          "versions": [
            {
              "lessThan": "2.2.0p15",
              "status": "affected",
              "version": "2.2.0",
              "versionType": "semver"
            },
            {
              "lessThan": "2.1.0p37",
              "status": "affected",
              "version": "2.1.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "2.0.0p39",
              "status": "affected",
              "version": "2.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper Input Validation in Checkmk \u003c2.2.0p15, \u003c2.1.0p37, \u003c=2.0.0p39 allows priviledged attackers to cause partial denial of service of the UI via too long hostnames."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-153",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-153: Input Data Manipulation"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "baseScore": 2.7,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-1284",
              "description": "CWE-1284: Improper Validation of Specified Quantity in Input",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-08-26T09:46:35.181Z",
        "orgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
        "shortName": "Checkmk"
      },
      "references": [
        {
          "url": "https://checkmk.com/werk/16219"
        }
      ],
      "title": "DoS via long hostnames"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
    "assignerShortName": "Checkmk",
    "cveId": "CVE-2023-23549",
    "datePublished": "2023-11-15T11:07:28.671Z",
    "dateReserved": "2023-01-18T15:32:06.511Z",
    "dateUpdated": "2024-08-28T20:25:01.313Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-31209 (GCVE-0-2023-31209)

Vulnerability from cvelistv5 – Published: 2023-08-10 08:14 – Updated: 2024-08-28 20:24
VLAI?
Title
Command injection via active checks and REST API
Summary
Improper neutralization of active check command arguments in Checkmk < 2.1.0p32, < 2.0.0p38, < 2.2.0p4 leads to arbitrary command execution for authenticated users.
CWE
  • CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Assigner
References
Impacted products
Vendor Product Version
Checkmk GmbH Checkmk Affected: 2.2.0 , < 2.2.0p4 (semver)
Affected: 2.1.0 , < 2.1.0p32 (semver)
Affected: 2.0.0 , < 2.0.0p38 (semver)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T14:53:30.688Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://checkmk.com/werk/15194"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-31209",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-08-28T20:23:39.698795Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-28T20:24:16.728Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Checkmk",
          "vendor": "Checkmk GmbH",
          "versions": [
            {
              "lessThan": "2.2.0p4",
              "status": "affected",
              "version": "2.2.0",
              "versionType": "semver"
            },
            {
              "lessThan": "2.1.0p32",
              "status": "affected",
              "version": "2.1.0",
              "versionType": "semver"
            },
            {
              "lessThan": "2.0.0p38",
              "status": "affected",
              "version": "2.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper neutralization of active check command arguments in Checkmk \u003c 2.1.0p32, \u003c 2.0.0p38, \u003c 2.2.0p4 leads to arbitrary command execution for authenticated users."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-6",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-6: Argument Injection"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-78",
              "description": "CWE-78: Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-08-26T09:47:02.416Z",
        "orgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
        "shortName": "Checkmk"
      },
      "references": [
        {
          "url": "https://checkmk.com/werk/15194"
        }
      ],
      "title": "Command injection via active checks and REST API"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
    "assignerShortName": "Tribe29",
    "cveId": "CVE-2023-31209",
    "datePublished": "2023-08-10T08:14:12.067Z",
    "dateReserved": "2023-04-25T08:49:15.443Z",
    "dateUpdated": "2024-08-28T20:24:16.728Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-23548 (GCVE-0-2023-23548)

Vulnerability from cvelistv5 – Published: 2023-08-01 09:42 – Updated: 2024-09-27 21:58
VLAI?
Title
XSS in business intelligence
Summary
Reflected XSS in business intelligence in Checkmk <2.2.0p8, <2.1.0p32, <2.0.0p38, <=1.6.0p30.
CWE
  • CWE-80 - Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)
Assigner
References
Impacted products
Vendor Product Version
Checkmk GmbH Checkmk Affected: 2.2.0 , < 2.2.0p8 (semver)
Affected: 2.1.0 , < 2.1.0p32 (semver)
Affected: 2.0.0 , < 2.0.0p38 (semver)
Affected: 1.6.0 , ≤ 1.6.0p30 (semver)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T10:35:33.528Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://checkmk.com/werk/15691"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-23548",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-09-27T21:50:12.357186Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-09-27T21:58:16.665Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Checkmk",
          "vendor": "Checkmk GmbH",
          "versions": [
            {
              "lessThan": "2.2.0p8",
              "status": "affected",
              "version": "2.2.0",
              "versionType": "semver"
            },
            {
              "lessThan": "2.1.0p32",
              "status": "affected",
              "version": "2.1.0",
              "versionType": "semver"
            },
            {
              "lessThan": "2.0.0p38",
              "status": "affected",
              "version": "2.0.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "1.6.0p30",
              "status": "affected",
              "version": "1.6.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Reflected XSS in business intelligence in Checkmk \u003c2.2.0p8, \u003c2.1.0p32, \u003c2.0.0p38, \u003c=1.6.0p30."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-591",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-591: Reflected XSS"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "baseScore": 5.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-80",
              "description": "CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-08-01T09:42:58.428Z",
        "orgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
        "shortName": "Tribe29"
      },
      "references": [
        {
          "url": "https://checkmk.com/werk/15691"
        }
      ],
      "title": "XSS in business intelligence"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
    "assignerShortName": "Tribe29",
    "cveId": "CVE-2023-23548",
    "datePublished": "2023-08-01T09:42:58.428Z",
    "dateReserved": "2023-01-18T15:32:06.498Z",
    "dateUpdated": "2024-09-27T21:58:16.665Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-22359 (GCVE-0-2023-22359)

Vulnerability from cvelistv5 – Published: 2023-06-26 06:51 – Updated: 2024-08-28 20:25
VLAI?
Title
User-enumeration in RestAPI
Summary
User enumeration in Checkmk <=2.2.0p4 allows an authenticated attacker to enumerate usernames.
CWE
Assigner
References
Impacted products
Vendor Product Version
Tribe29 Checkmk Affected: 2.2.0 , ≤ 2.2.0p4 (semver)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T10:07:06.470Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://checkmk.com/werk/15890"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-22359",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-08-28T20:25:16.139712Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-28T20:25:29.123Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Checkmk",
          "vendor": "Tribe29",
          "versions": [
            {
              "lessThanOrEqual": "2.2.0p4",
              "status": "affected",
              "version": "2.2.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "User enumeration in Checkmk \u003c=2.2.0p4 allows an authenticated attacker to enumerate usernames."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-575",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-575: Account Footprinting"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-203",
              "description": "CWE-203: Observable Discrepancy",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-08-26T09:46:00.200Z",
        "orgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
        "shortName": "Checkmk"
      },
      "references": [
        {
          "url": "https://checkmk.com/werk/15890"
        }
      ],
      "title": "User-enumeration in RestAPI"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
    "assignerShortName": "Tribe29",
    "cveId": "CVE-2023-22359",
    "datePublished": "2023-06-26T06:51:24.193Z",
    "dateReserved": "2023-01-18T15:32:06.543Z",
    "dateUpdated": "2024-08-28T20:25:29.123Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-22348 (GCVE-0-2023-22348)

Vulnerability from cvelistv5 – Published: 2023-05-17 15:51 – Updated: 2025-01-22 16:47
VLAI?
Title
Reading host_configs does not honour contact groups
Summary
Improper Authorization in RestAPI in Checkmk GmbH's Checkmk versions <2.1.0p28 and <2.2.0b8 allows remote authenticated users to read arbitrary host_configs.
CWE
Assigner
References
Impacted products
Vendor Product Version
Checkmk GmbH Checkmk Affected: 2.2.0 , < 2.2.0b8 (semver)
Affected: 2.1.0 , < 2.1.0p28 (semver)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T10:07:06.244Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://checkmk.com/werk/13982"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-22348",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-01-22T16:47:28.652373Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-01-22T16:47:31.132Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Checkmk",
          "vendor": "Checkmk GmbH",
          "versions": [
            {
              "lessThan": "2.2.0b8",
              "status": "affected",
              "version": "2.2.0",
              "versionType": "semver"
            },
            {
              "lessThan": "2.1.0p28",
              "status": "affected",
              "version": "2.1.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper Authorization in RestAPI in Checkmk GmbH\u0027s Checkmk versions \u003c2.1.0p28 and \u003c2.2.0b8 allows remote authenticated users to read arbitrary host_configs."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-54",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-54: Query System for Information"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-285",
              "description": "CWE-285: Improper Authorization",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-05-17T15:51:54.376Z",
        "orgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
        "shortName": "Tribe29"
      },
      "references": [
        {
          "url": "https://checkmk.com/werk/13982"
        }
      ],
      "title": "Reading host_configs does not honour contact groups"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
    "assignerShortName": "Tribe29",
    "cveId": "CVE-2023-22348",
    "datePublished": "2023-05-17T15:51:54.376Z",
    "dateReserved": "2023-01-18T15:32:06.534Z",
    "dateUpdated": "2025-01-22T16:47:31.132Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-28833 (GCVE-0-2024-28833)

Vulnerability from nvd – Published: 2024-06-10 11:55 – Updated: 2024-08-02 00:56
VLAI?
Title
Missing brute-force protection for two factor authentication
Summary
Improper restriction of excessive authentication attempts with two factor authentication methods in Checkmk 2.3 before 2.3.0p6 facilitates brute-forcing of second factor mechanisms.
CWE
  • CWE-307 - Improper Restriction of Excessive Authentication Attempts
Assigner
References
Impacted products
Vendor Product Version
Checkmk GmbH Checkmk Affected: 2.3.0 , < 2.3.0p6 (semver)
Create a notification for this product.
Credits
PS Positive Security GmbH
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:checkmk:checkmk:2.3.0:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unaffected",
            "product": "checkmk",
            "vendor": "checkmk",
            "versions": [
              {
                "lessThan": "2.3.0p6",
                "status": "affected",
                "version": "2.3.0",
                "versionType": "semver"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-28833",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-06-10T18:04:29.500256Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-06-19T22:52:07.799Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T00:56:58.393Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://checkmk.com/werk/16830"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Checkmk",
          "vendor": "Checkmk GmbH",
          "versions": [
            {
              "lessThan": "2.3.0p6",
              "status": "affected",
              "version": "2.3.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "value": "PS Positive Security GmbH"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper restriction of excessive authentication attempts with two factor authentication methods in Checkmk 2.3 before 2.3.0p6 facilitates brute-forcing of second factor mechanisms."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-112",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-112: Brute Force"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-307",
              "description": "CWE-307: Improper Restriction of Excessive Authentication Attempts",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-06-19T08:12:15.306Z",
        "orgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
        "shortName": "Checkmk"
      },
      "references": [
        {
          "url": "https://checkmk.com/werk/16830"
        }
      ],
      "title": "Missing brute-force protection for two factor authentication"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
    "assignerShortName": "Checkmk",
    "cveId": "CVE-2024-28833",
    "datePublished": "2024-06-10T11:55:50.571Z",
    "dateReserved": "2024-03-11T13:21:43.122Z",
    "dateUpdated": "2024-08-02T00:56:58.393Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-6740 (GCVE-0-2023-6740)

Vulnerability from nvd – Published: 2024-01-12 07:50 – Updated: 2025-06-03 14:05
VLAI?
Title
Privilege escalation in jar_signature
Summary
Privilege escalation in jar_signature agent plugin in Checkmk before 2.2.0p18, 2.1.0p38 and 2.0.0p39 allows local user to escalate privileges
CWE
  • CWE-427 - Uncontrolled Search Path Element
Assigner
References
Impacted products
Vendor Product Version
Checkmk GmbH Checkmk Affected: 2.2.0 , < 2.2.0p18 (semver)
Affected: 2.1.0 , < 2.1.0p38 (semver)
Affected: 2.0.0 , ≤ 2.0.0p39 (semver)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T08:42:07.176Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://checkmk.com/werk/16163"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-6740",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-05-08T15:47:31.576972Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-06-03T14:05:24.299Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Checkmk",
          "vendor": "Checkmk GmbH",
          "versions": [
            {
              "lessThan": "2.2.0p18",
              "status": "affected",
              "version": "2.2.0",
              "versionType": "semver"
            },
            {
              "lessThan": "2.1.0p38",
              "status": "affected",
              "version": "2.1.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "2.0.0p39",
              "status": "affected",
              "version": "2.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Privilege escalation in jar_signature agent plugin in Checkmk before 2.2.0p18, 2.1.0p38 and 2.0.0p39 allows local user to escalate privileges"
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-233",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-233 Privilege Escalation"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-427",
              "description": "CWE-427 Uncontrolled Search Path Element",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-01-12T14:04:33.614Z",
        "orgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
        "shortName": "Checkmk"
      },
      "references": [
        {
          "url": "https://checkmk.com/werk/16163"
        }
      ],
      "title": "Privilege escalation in jar_signature"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
    "assignerShortName": "Checkmk",
    "cveId": "CVE-2023-6740",
    "datePublished": "2024-01-12T07:50:20.076Z",
    "dateReserved": "2023-12-12T15:55:03.221Z",
    "dateUpdated": "2025-06-03T14:05:24.299Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-6735 (GCVE-0-2023-6735)

Vulnerability from nvd – Published: 2024-01-12 07:50 – Updated: 2025-06-03 14:05
VLAI?
Title
Privilege escalation in mk_tsm
Summary
Privilege escalation in mk_tsm agent plugin in Checkmk before 2.2.0p18, 2.1.0p38 and 2.0.0p39 allows local user to escalate privileges
CWE
  • CWE-95 - Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection')
Assigner
References
Impacted products
Vendor Product Version
Checkmk GmbH Checkmk Affected: 2.2.0 , < 2.2.0p18 (semver)
Affected: 2.1.0 , < 2.1.0p38 (semver)
Affected: 2.0.0 , ≤ 2.0.0p39 (semver)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T08:35:14.884Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://checkmk.com/werk/16273"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-6735",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-05-08T18:45:38.891586Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-06-03T14:05:30.852Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Checkmk",
          "vendor": "Checkmk GmbH",
          "versions": [
            {
              "lessThan": "2.2.0p18",
              "status": "affected",
              "version": "2.2.0",
              "versionType": "semver"
            },
            {
              "lessThan": "2.1.0p38",
              "status": "affected",
              "version": "2.1.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "2.0.0p39",
              "status": "affected",
              "version": "2.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Privilege escalation in mk_tsm agent plugin in Checkmk before 2.2.0p18, 2.1.0p38 and 2.0.0p39 allows local user to escalate privileges"
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-233",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-233 Privilege Escalation"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-95",
              "description": "CWE-95: Improper Neutralization of Directives in Dynamically Evaluated Code (\u0027Eval Injection\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-08-26T09:48:15.939Z",
        "orgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
        "shortName": "Checkmk"
      },
      "references": [
        {
          "url": "https://checkmk.com/werk/16273"
        }
      ],
      "title": "Privilege escalation in mk_tsm"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
    "assignerShortName": "Checkmk",
    "cveId": "CVE-2023-6735",
    "datePublished": "2024-01-12T07:50:05.450Z",
    "dateReserved": "2023-12-12T15:27:34.769Z",
    "dateUpdated": "2025-06-03T14:05:30.852Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-31211 (GCVE-0-2023-31211)

Vulnerability from nvd – Published: 2024-01-12 07:49 – Updated: 2025-06-17 21:09
VLAI?
Title
Disabled automation users could still authenticate
Summary
Insufficient authentication flow in Checkmk before 2.2.0p18, 2.1.0p38 and 2.0.0p39 allows attacker to use locked credentials
CWE
  • CWE-303 - Incorrect Implementation of Authentication Algorithm
Assigner
References
Impacted products
Vendor Product Version
Checkmk GmbH Checkmk Affected: 2.2.0 , < 2.2.0p18 (semver)
Affected: 2.1.0 , < 2.1.0p38 (semver)
Affected: 2.0.0 , ≤ 2.0.0p39 (semver)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T14:53:30.666Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://checkmk.com/werk/16227"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-31211",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-01-12T14:44:05.997672Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-06-17T21:09:17.486Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Checkmk",
          "vendor": "Checkmk GmbH",
          "versions": [
            {
              "lessThan": "2.2.0p18",
              "status": "affected",
              "version": "2.2.0",
              "versionType": "semver"
            },
            {
              "lessThan": "2.1.0p38",
              "status": "affected",
              "version": "2.1.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "2.0.0p39",
              "status": "affected",
              "version": "2.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Insufficient authentication flow in Checkmk before 2.2.0p18, 2.1.0p38 and 2.0.0p39 allows attacker to use locked credentials"
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-114",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-114: Authentication Abuse"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-303",
              "description": "CWE-303: Incorrect Implementation of Authentication Algorithm",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-08-26T09:47:23.924Z",
        "orgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
        "shortName": "Checkmk"
      },
      "references": [
        {
          "url": "https://checkmk.com/werk/16227"
        }
      ],
      "title": "Disabled automation users could still authenticate"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
    "assignerShortName": "Checkmk",
    "cveId": "CVE-2023-31211",
    "datePublished": "2024-01-12T07:49:45.294Z",
    "dateReserved": "2023-04-25T08:49:15.443Z",
    "dateUpdated": "2025-06-17T21:09:17.486Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-31210 (GCVE-0-2023-31210)

Vulnerability from nvd – Published: 2023-12-13 08:26 – Updated: 2024-12-02 14:29
VLAI?
Title
Privilege escalation in agent via LD_LIBRARY_PATH
Summary
Usage of user controlled LD_LIBRARY_PATH in agent in Checkmk 2.2.0p10 up to 2.2.0p16 allows malicious Checkmk site user to escalate rights via injection of malicious libraries
CWE
  • CWE-427 - Uncontrolled Search Path Element
Assigner
References
Impacted products
Vendor Product Version
Checkmk GmbH Checkmk Affected: 2.2.0p10 , < 2.2.0p17 (semver)
Create a notification for this product.
Credits
We thank Jan-Philipp Litza for reporting this issue.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T14:53:29.719Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://checkmk.com/werk/16226"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-31210",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2023-12-18T21:37:33.317071Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-12-02T14:29:06.806Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Checkmk",
          "vendor": "Checkmk GmbH",
          "versions": [
            {
              "lessThan": "2.2.0p17",
              "status": "affected",
              "version": "2.2.0p10",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "value": "We thank Jan-Philipp Litza for reporting this issue."
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Usage of user controlled LD_LIBRARY_PATH in agent in Checkmk 2.2.0p10 up to 2.2.0p16 allows malicious Checkmk site user to escalate rights via injection of malicious libraries"
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-251",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-251: Local Code Inclusion"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-427",
              "description": "CWE-427: Uncontrolled Search Path Element",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-12-13T08:26:46.452Z",
        "orgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
        "shortName": "Checkmk"
      },
      "references": [
        {
          "url": "https://checkmk.com/werk/16226"
        }
      ],
      "title": "Privilege escalation in agent via LD_LIBRARY_PATH"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
    "assignerShortName": "Checkmk",
    "cveId": "CVE-2023-31210",
    "datePublished": "2023-12-13T08:26:46.452Z",
    "dateReserved": "2023-04-25T08:49:15.443Z",
    "dateUpdated": "2024-12-02T14:29:06.806Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-6251 (GCVE-0-2023-6251)

Vulnerability from nvd – Published: 2023-11-24 08:16 – Updated: 2024-08-02 08:21
VLAI?
Title
CSRF in delete_user_message
Summary
Cross-site Request Forgery (CSRF) in Checkmk < 2.2.0p15, < 2.1.0p37, <= 2.0.0p39 allow an authenticated attacker to delete user-messages for individual users.
CWE
  • CWE-352 - Cross-Site Request Forgery (CSRF)
Assigner
References
Impacted products
Vendor Product Version
Checkmk GmbH Checkmk Affected: 2.0.0 , ≤ 2.0.0p39 (semver)
Affected: 2.1.0 , < 2.1.0p37 (semver)
Affected: 2.2.0 , < 2.2.0p15 (semver)
Create a notification for this product.
Credits
Port Zero
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T08:21:18.099Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://checkmk.com/werk/16224"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Checkmk",
          "vendor": "Checkmk GmbH",
          "versions": [
            {
              "lessThanOrEqual": "2.0.0p39",
              "status": "affected",
              "version": "2.0.0",
              "versionType": "semver"
            },
            {
              "lessThan": "2.1.0p37",
              "status": "affected",
              "version": "2.1.0",
              "versionType": "semver"
            },
            {
              "lessThan": "2.2.0p15",
              "status": "affected",
              "version": "2.2.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "value": "Port Zero"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site Request Forgery (CSRF) in Checkmk \u003c 2.2.0p15, \u003c 2.1.0p37, \u003c= 2.0.0p39 allow an authenticated attacker to delete user-messages for individual users."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-62",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-62 Cross Site Request Forgery"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "baseScore": 3.5,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-352",
              "description": "CWE-352 Cross-Site Request Forgery (CSRF)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-11-24T08:16:23.663Z",
        "orgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
        "shortName": "Checkmk"
      },
      "references": [
        {
          "url": "https://checkmk.com/werk/16224"
        }
      ],
      "title": "CSRF in delete_user_message"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
    "assignerShortName": "Checkmk",
    "cveId": "CVE-2023-6251",
    "datePublished": "2023-11-24T08:16:23.663Z",
    "dateReserved": "2023-11-22T10:39:14.993Z",
    "dateUpdated": "2024-08-02T08:21:18.099Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-6157 (GCVE-0-2023-6157)

Vulnerability from nvd – Published: 2023-11-22 16:24 – Updated: 2024-08-02 08:21
VLAI?
Title
Livestatus injection in ajax_search
Summary
Improper neutralization of livestatus command delimiters in ajax_search in Checkmk <= 2.0.0p39, < 2.1.0p37, and < 2.2.0p15 allows arbitrary livestatus command execution for authorized users.
CWE
  • CWE-140 - Improper Neutralization of Delimiters
Assigner
References
Impacted products
Vendor Product Version
Checkmk GmbH Checkmk Affected: 2.2.0 , < 2.2.0p15 (semver)
Affected: 2.1.0 , < 2.1.0p37 (semver)
Affected: 2.0.0 , ≤ 2.0.0p39 (semver)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T08:21:17.625Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://checkmk.com/werk/16221"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Checkmk",
          "vendor": "Checkmk GmbH",
          "versions": [
            {
              "lessThan": "2.2.0p15",
              "status": "affected",
              "version": "2.2.0",
              "versionType": "semver"
            },
            {
              "lessThan": "2.1.0p37",
              "status": "affected",
              "version": "2.1.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "2.0.0p39",
              "status": "affected",
              "version": "2.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper neutralization of livestatus command delimiters in ajax_search in Checkmk \u003c= 2.0.0p39, \u003c 2.1.0p37, and \u003c 2.2.0p15 allows arbitrary livestatus command execution for authorized users."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-15",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-15: Command Delimiters"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "baseScore": 7.6,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-140",
              "description": "CWE-140: Improper Neutralization of Delimiters",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-11-22T16:24:22.002Z",
        "orgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
        "shortName": "Checkmk"
      },
      "references": [
        {
          "url": "https://checkmk.com/werk/16221"
        }
      ],
      "title": "Livestatus injection in ajax_search"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
    "assignerShortName": "Checkmk",
    "cveId": "CVE-2023-6157",
    "datePublished": "2023-11-22T16:24:22.002Z",
    "dateReserved": "2023-11-15T16:39:53.614Z",
    "dateUpdated": "2024-08-02T08:21:17.625Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-6156 (GCVE-0-2023-6156)

Vulnerability from nvd – Published: 2023-11-22 16:24 – Updated: 2024-08-02 08:21
VLAI?
Title
Livestatus injection in availability timeline
Summary
Improper neutralization of livestatus command delimiters in the availability timeline in Checkmk <= 2.0.0p39, < 2.1.0p37, and < 2.2.0p15 allows arbitrary livestatus command execution for authorized users.
CWE
  • CWE-140 - Improper Neutralization of Delimiters
Assigner
References
Impacted products
Vendor Product Version
Checkmk GmbH Checkmk Affected: 2.2.0 , < 2.2.0p15 (semver)
Affected: 2.1.0 , < 2.1.0p37 (semver)
Affected: 2.0.0 , ≤ 2.0.0p39 (semver)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T08:21:17.614Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://checkmk.com/werk/16221"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Checkmk",
          "vendor": "Checkmk GmbH",
          "versions": [
            {
              "lessThan": "2.2.0p15",
              "status": "affected",
              "version": "2.2.0",
              "versionType": "semver"
            },
            {
              "lessThan": "2.1.0p37",
              "status": "affected",
              "version": "2.1.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "2.0.0p39",
              "status": "affected",
              "version": "2.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper neutralization of livestatus command delimiters in the availability timeline in Checkmk \u003c= 2.0.0p39, \u003c 2.1.0p37, and \u003c 2.2.0p15 allows arbitrary livestatus command execution for authorized users."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-15",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-15: Command Delimiters"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "baseScore": 7.6,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-140",
              "description": "CWE-140: Improper Neutralization of Delimiters",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-11-22T16:24:15.515Z",
        "orgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
        "shortName": "Checkmk"
      },
      "references": [
        {
          "url": "https://checkmk.com/werk/16221"
        }
      ],
      "title": "Livestatus injection in availability timeline"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
    "assignerShortName": "Checkmk",
    "cveId": "CVE-2023-6156",
    "datePublished": "2023-11-22T16:24:15.515Z",
    "dateReserved": "2023-11-15T16:38:31.845Z",
    "dateUpdated": "2024-08-02T08:21:17.614Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-23549 (GCVE-0-2023-23549)

Vulnerability from nvd – Published: 2023-11-15 11:07 – Updated: 2024-08-28 20:25
VLAI?
Title
DoS via long hostnames
Summary
Improper Input Validation in Checkmk <2.2.0p15, <2.1.0p37, <=2.0.0p39 allows priviledged attackers to cause partial denial of service of the UI via too long hostnames.
CWE
  • CWE-1284 - Improper Validation of Specified Quantity in Input
Assigner
References
Impacted products
Vendor Product Version
Checkmk GmbH Checkmk Affected: 2.2.0 , < 2.2.0p15 (semver)
Affected: 2.1.0 , < 2.1.0p37 (semver)
Affected: 2.0.0 , ≤ 2.0.0p39 (semver)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T10:35:32.832Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://checkmk.com/werk/16219"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-23549",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-08-28T20:24:38.414790Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-28T20:25:01.313Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Checkmk",
          "vendor": "Checkmk GmbH",
          "versions": [
            {
              "lessThan": "2.2.0p15",
              "status": "affected",
              "version": "2.2.0",
              "versionType": "semver"
            },
            {
              "lessThan": "2.1.0p37",
              "status": "affected",
              "version": "2.1.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "2.0.0p39",
              "status": "affected",
              "version": "2.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper Input Validation in Checkmk \u003c2.2.0p15, \u003c2.1.0p37, \u003c=2.0.0p39 allows priviledged attackers to cause partial denial of service of the UI via too long hostnames."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-153",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-153: Input Data Manipulation"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "baseScore": 2.7,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-1284",
              "description": "CWE-1284: Improper Validation of Specified Quantity in Input",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-08-26T09:46:35.181Z",
        "orgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
        "shortName": "Checkmk"
      },
      "references": [
        {
          "url": "https://checkmk.com/werk/16219"
        }
      ],
      "title": "DoS via long hostnames"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
    "assignerShortName": "Checkmk",
    "cveId": "CVE-2023-23549",
    "datePublished": "2023-11-15T11:07:28.671Z",
    "dateReserved": "2023-01-18T15:32:06.511Z",
    "dateUpdated": "2024-08-28T20:25:01.313Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-31209 (GCVE-0-2023-31209)

Vulnerability from nvd – Published: 2023-08-10 08:14 – Updated: 2024-08-28 20:24
VLAI?
Title
Command injection via active checks and REST API
Summary
Improper neutralization of active check command arguments in Checkmk < 2.1.0p32, < 2.0.0p38, < 2.2.0p4 leads to arbitrary command execution for authenticated users.
CWE
  • CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Assigner
References
Impacted products
Vendor Product Version
Checkmk GmbH Checkmk Affected: 2.2.0 , < 2.2.0p4 (semver)
Affected: 2.1.0 , < 2.1.0p32 (semver)
Affected: 2.0.0 , < 2.0.0p38 (semver)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T14:53:30.688Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://checkmk.com/werk/15194"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-31209",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-08-28T20:23:39.698795Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-28T20:24:16.728Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Checkmk",
          "vendor": "Checkmk GmbH",
          "versions": [
            {
              "lessThan": "2.2.0p4",
              "status": "affected",
              "version": "2.2.0",
              "versionType": "semver"
            },
            {
              "lessThan": "2.1.0p32",
              "status": "affected",
              "version": "2.1.0",
              "versionType": "semver"
            },
            {
              "lessThan": "2.0.0p38",
              "status": "affected",
              "version": "2.0.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper neutralization of active check command arguments in Checkmk \u003c 2.1.0p32, \u003c 2.0.0p38, \u003c 2.2.0p4 leads to arbitrary command execution for authenticated users."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-6",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-6: Argument Injection"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-78",
              "description": "CWE-78: Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-08-26T09:47:02.416Z",
        "orgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
        "shortName": "Checkmk"
      },
      "references": [
        {
          "url": "https://checkmk.com/werk/15194"
        }
      ],
      "title": "Command injection via active checks and REST API"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
    "assignerShortName": "Tribe29",
    "cveId": "CVE-2023-31209",
    "datePublished": "2023-08-10T08:14:12.067Z",
    "dateReserved": "2023-04-25T08:49:15.443Z",
    "dateUpdated": "2024-08-28T20:24:16.728Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-23548 (GCVE-0-2023-23548)

Vulnerability from nvd – Published: 2023-08-01 09:42 – Updated: 2024-09-27 21:58
VLAI?
Title
XSS in business intelligence
Summary
Reflected XSS in business intelligence in Checkmk <2.2.0p8, <2.1.0p32, <2.0.0p38, <=1.6.0p30.
CWE
  • CWE-80 - Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)
Assigner
References
Impacted products
Vendor Product Version
Checkmk GmbH Checkmk Affected: 2.2.0 , < 2.2.0p8 (semver)
Affected: 2.1.0 , < 2.1.0p32 (semver)
Affected: 2.0.0 , < 2.0.0p38 (semver)
Affected: 1.6.0 , ≤ 1.6.0p30 (semver)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T10:35:33.528Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://checkmk.com/werk/15691"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-23548",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-09-27T21:50:12.357186Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-09-27T21:58:16.665Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Checkmk",
          "vendor": "Checkmk GmbH",
          "versions": [
            {
              "lessThan": "2.2.0p8",
              "status": "affected",
              "version": "2.2.0",
              "versionType": "semver"
            },
            {
              "lessThan": "2.1.0p32",
              "status": "affected",
              "version": "2.1.0",
              "versionType": "semver"
            },
            {
              "lessThan": "2.0.0p38",
              "status": "affected",
              "version": "2.0.0",
              "versionType": "semver"
            },
            {
              "lessThanOrEqual": "1.6.0p30",
              "status": "affected",
              "version": "1.6.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Reflected XSS in business intelligence in Checkmk \u003c2.2.0p8, \u003c2.1.0p32, \u003c2.0.0p38, \u003c=1.6.0p30."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-591",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-591: Reflected XSS"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "baseScore": 5.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-80",
              "description": "CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-08-01T09:42:58.428Z",
        "orgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
        "shortName": "Tribe29"
      },
      "references": [
        {
          "url": "https://checkmk.com/werk/15691"
        }
      ],
      "title": "XSS in business intelligence"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
    "assignerShortName": "Tribe29",
    "cveId": "CVE-2023-23548",
    "datePublished": "2023-08-01T09:42:58.428Z",
    "dateReserved": "2023-01-18T15:32:06.498Z",
    "dateUpdated": "2024-09-27T21:58:16.665Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-22359 (GCVE-0-2023-22359)

Vulnerability from nvd – Published: 2023-06-26 06:51 – Updated: 2024-08-28 20:25
VLAI?
Title
User-enumeration in RestAPI
Summary
User enumeration in Checkmk <=2.2.0p4 allows an authenticated attacker to enumerate usernames.
CWE
Assigner
References
Impacted products
Vendor Product Version
Tribe29 Checkmk Affected: 2.2.0 , ≤ 2.2.0p4 (semver)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T10:07:06.470Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://checkmk.com/werk/15890"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-22359",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-08-28T20:25:16.139712Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-28T20:25:29.123Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Checkmk",
          "vendor": "Tribe29",
          "versions": [
            {
              "lessThanOrEqual": "2.2.0p4",
              "status": "affected",
              "version": "2.2.0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "User enumeration in Checkmk \u003c=2.2.0p4 allows an authenticated attacker to enumerate usernames."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-575",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-575: Account Footprinting"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-203",
              "description": "CWE-203: Observable Discrepancy",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-08-26T09:46:00.200Z",
        "orgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
        "shortName": "Checkmk"
      },
      "references": [
        {
          "url": "https://checkmk.com/werk/15890"
        }
      ],
      "title": "User-enumeration in RestAPI"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "f7d6281c-4801-44ce-ace2-493291dedb0f",
    "assignerShortName": "Tribe29",
    "cveId": "CVE-2023-22359",
    "datePublished": "2023-06-26T06:51:24.193Z",
    "dateReserved": "2023-01-18T15:32:06.543Z",
    "dateUpdated": "2024-08-28T20:25:29.123Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

FKIE_CVE-2023-6740

Vulnerability from fkie_nvd - Published: 2024-01-12 08:15 - Updated: 2024-11-21 08:44
Summary
Privilege escalation in jar_signature agent plugin in Checkmk before 2.2.0p18, 2.1.0p38 and 2.0.0p39 allows local user to escalate privileges
Impacted products
Vendor Product Version
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
tribe29 checkmk *

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:b1:*:*:*:*:*:*",
              "matchCriteriaId": "54031390-D7E7-4A14-AA2F-923768B3685F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:b2:*:*:*:*:*:*",
              "matchCriteriaId": "F1B7E35F-5A07-424E-AA09-AC54104D612B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:b3:*:*:*:*:*:*",
              "matchCriteriaId": "8D4AC302-C8F5-4A2B-A73A-982D0AA2495A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:b4:*:*:*:*:*:*",
              "matchCriteriaId": "7A058C71-C39E-4109-B570-4A061013D033",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:b5:*:*:*:*:*:*",
              "matchCriteriaId": "22BCFA79-B3D6-4FFF-A3D3-8C4C97AF17C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:b6:*:*:*:*:*:*",
              "matchCriteriaId": "2A1703D9-8EEB-432D-90E2-F847CDC4C204",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:b7:*:*:*:*:*:*",
              "matchCriteriaId": "1A4C72BA-6D78-4911-83E4-4DABB2CAC47F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:b8:*:*:*:*:*:*",
              "matchCriteriaId": "081FD127-1066-4019-B521-9FADB85DBD4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:i1:*:*:*:*:*:*",
              "matchCriteriaId": "C1A4F005-4823-4B2B-B4EF-4EFDB04CFB9B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p1:*:*:*:*:*:*",
              "matchCriteriaId": "357240B1-F0DA-4FA8-B782-D998951F4B54",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p10:*:*:*:*:*:*",
              "matchCriteriaId": "2F828F54-04E2-4B98-91A7-B09ED833E88B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p11:*:*:*:*:*:*",
              "matchCriteriaId": "A4B8B300-8264-40AB-A839-7EACB988163B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p12:*:*:*:*:*:*",
              "matchCriteriaId": "EB76A8DF-C870-482F-A488-DB2917ABD971",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p13:*:*:*:*:*:*",
              "matchCriteriaId": "04947B1B-CF67-4C11-8FE3-6C17FD35E2EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p14:*:*:*:*:*:*",
              "matchCriteriaId": "591AEC3C-2F48-4E91-9881-42EEDD039C5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p15:*:*:*:*:*:*",
              "matchCriteriaId": "C5CA04C8-2C80-4C7E-B329-3FFCBEDEE663",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p16:*:*:*:*:*:*",
              "matchCriteriaId": "47A1C5AC-C8B7-495A-A5F4-CD4790358A2E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p17:*:*:*:*:*:*",
              "matchCriteriaId": "B87D8B46-5B04-460D-BBA1-BB19234DA19D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p18:*:*:*:*:*:*",
              "matchCriteriaId": "C59EA30A-0B7D-4E58-A503-8C2F16B45004",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p19:*:*:*:*:*:*",
              "matchCriteriaId": "F2849E4C-09D1-48A5-B28E-F7A4CD3E8967",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p2:*:*:*:*:*:*",
              "matchCriteriaId": "F1E5549E-3272-478D-85D0-6F53EE731183",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p20:*:*:*:*:*:*",
              "matchCriteriaId": "CD0EA35B-EBFF-4E6F-BD2E-4BE165E81A3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p21:*:*:*:*:*:*",
              "matchCriteriaId": "3F2C76F2-D457-4C7C-BE76-515CA45CA161",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p22:*:*:*:*:*:*",
              "matchCriteriaId": "0E5A374E-56C5-4EBA-967C-CDFE6A967DFD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p23:*:*:*:*:*:*",
              "matchCriteriaId": "7D4568F0-8CCD-4517-B4E9-7E2CA228D659",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p24:*:*:*:*:*:*",
              "matchCriteriaId": "96893FF5-B85E-45AF-9020-5D767E954D6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p25:*:*:*:*:*:*",
              "matchCriteriaId": "425ABB56-3A2E-40E3-9701-E638F16E6ADD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p26:*:*:*:*:*:*",
              "matchCriteriaId": "9EEF6054-B3B5-4AAC-B24B-147A38564992",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p27:*:*:*:*:*:*",
              "matchCriteriaId": "462C2826-237E-4061-8F14-3DE09CE9952C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p28:*:*:*:*:*:*",
              "matchCriteriaId": "8DE8F008-1FC0-416C-B0D4-5A560CF985F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p29:*:*:*:*:*:*",
              "matchCriteriaId": "53AA0AB2-E814-4378-9486-D9192293C1DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p3:*:*:*:*:*:*",
              "matchCriteriaId": "D884D3AF-7D57-4DF6-82E8-556C35319ED2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p30:*:*:*:*:*:*",
              "matchCriteriaId": "2F6A123B-D6D3-4C46-9595-4D8138FC31C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p31:*:*:*:*:*:*",
              "matchCriteriaId": "4245029F-D95D-4364-BB29-8C60F5461070",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p32:*:*:*:*:*:*",
              "matchCriteriaId": "C67473D2-A96B-4ACD-B248-A0AF2E3C9738",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p33:*:*:*:*:*:*",
              "matchCriteriaId": "B22FDFE4-844F-449B-88D7-E7EDC92EC752",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p34:*:*:*:*:*:*",
              "matchCriteriaId": "01D13D8E-61F2-406C-8EE5-FDDD9BDCCF71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p35:*:*:*:*:*:*",
              "matchCriteriaId": "CA0DCBEB-CAED-4A39-B700-64311E7742DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p36:*:*:*:*:*:*",
              "matchCriteriaId": "0D8C138E-C8C2-46F7-A1D6-D33562FB86BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p37:*:*:*:*:*:*",
              "matchCriteriaId": "D4BE7A6A-C3BB-405A-8757-E60E2F611ACD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p38:*:*:*:*:*:*",
              "matchCriteriaId": "1D7BC614-16F2-4F7D-9824-C5DDE540072B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p4:*:*:*:*:*:*",
              "matchCriteriaId": "528BAFA3-ED39-45B5-8C81-A6FD76DDB49B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p5:*:*:*:*:*:*",
              "matchCriteriaId": "02DA7C50-7360-4679-93A5-92C8DC5E8E46",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p6:*:*:*:*:*:*",
              "matchCriteriaId": "71B49D90-9522-46C6-8948-B9C21CEA473C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p7:*:*:*:*:*:*",
              "matchCriteriaId": "98C29296-D1F3-45A2-BF0A-22333150F416",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p8:*:*:*:*:*:*",
              "matchCriteriaId": "339226E6-532F-4FE2-A543-6B166A9BA7F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p9:*:*:*:*:*:*",
              "matchCriteriaId": "986FDFA6-BE12-4268-9B90-F7D469BBE517",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "1AE224D8-742B-4D1F-ABBE-3DDA3EA5C5AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:b1:*:*:*:*:*:*",
              "matchCriteriaId": "1E6FCE7B-7ECE-42A4-82C5-12A647B0CCC8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:b2:*:*:*:*:*:*",
              "matchCriteriaId": "923AA113-D5E7-4F78-88BA-B72EF250F3EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:b3:*:*:*:*:*:*",
              "matchCriteriaId": "B1984F57-A313-48AC-B8F9-F352D82824D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:b4:*:*:*:*:*:*",
              "matchCriteriaId": "A38DB527-72A6-40B8-B46F-B8E78BFFDB1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:b5:*:*:*:*:*:*",
              "matchCriteriaId": "67643E11-91A1-4580-BC4C-574074C862CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:b6:*:*:*:*:*:*",
              "matchCriteriaId": "350B7E0F-D234-4D7C-91E4-F35E73579A24",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:b7:*:*:*:*:*:*",
              "matchCriteriaId": "DE58ACA9-8078-46A7-8487-C06E4E38F372",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:b8:*:*:*:*:*:*",
              "matchCriteriaId": "B3D8CF4D-E1F8-4D8D-A8A9-1783CAC869E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:b9:*:*:*:*:*:*",
              "matchCriteriaId": "58B0B051-7D3C-4EC7-96B0-38A1CC108D61",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p1:*:*:*:*:*:*",
              "matchCriteriaId": "B783A741-AAF2-43EE-8272-9239133A01E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p10:*:*:*:*:*:*",
              "matchCriteriaId": "A5F275A3-A99E-40E1-BD77-694FA568541F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p11:*:*:*:*:*:*",
              "matchCriteriaId": "3A44BF1A-5BE0-4412-B51D-055445758B61",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p12:*:*:*:*:*:*",
              "matchCriteriaId": "A31BAE94-9096-4320-AC19-AA204E8EC08D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p13:*:*:*:*:*:*",
              "matchCriteriaId": "1B0784EA-98E8-4490-B97B-894F188A223D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p14:*:*:*:*:*:*",
              "matchCriteriaId": "A56A901F-1040-4DB9-9BE3-FE1999C514CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p15:*:*:*:*:*:*",
              "matchCriteriaId": "58A904FC-C015-469D-8502-E678D5FDBD06",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p16:*:*:*:*:*:*",
              "matchCriteriaId": "1B5D109C-60AA-4FA4-9B10-2191AAF109F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p17:*:*:*:*:*:*",
              "matchCriteriaId": "37297866-24BB-4044-8744-EC0A8C29F152",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p18:*:*:*:*:*:*",
              "matchCriteriaId": "F9D4A171-CCB3-43B8-8B70-78610423E7C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p19:*:*:*:*:*:*",
              "matchCriteriaId": "5E1145FF-426D-407C-9F4B-EF773BD191EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p2:*:*:*:*:*:*",
              "matchCriteriaId": "4DA8F776-A724-48FC-B7EF-13788BC69753",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p20:*:*:*:*:*:*",
              "matchCriteriaId": "46F42A22-99F2-4DF5-9B00-3123396F87AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p21:*:*:*:*:*:*",
              "matchCriteriaId": "1C59D4D3-D526-4E6B-B3AA-FE485D030190",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p22:*:*:*:*:*:*",
              "matchCriteriaId": "65E5CAE6-DC8B-47B3-84A0-D79B0C33EB45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p23:*:*:*:*:*:*",
              "matchCriteriaId": "8B9E0D89-79E2-476A-8A3E-8443316BC310",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p24:*:*:*:*:*:*",
              "matchCriteriaId": "38EA0591-C30B-4102-8A06-1B922FD3A0C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p25:*:*:*:*:*:*",
              "matchCriteriaId": "5E9AF0D3-8DD6-4EC7-BB33-54401D4025FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p26:*:*:*:*:*:*",
              "matchCriteriaId": "983604CC-DD2C-42A9-8B9D-A9A261CE8BA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p27:*:*:*:*:*:*",
              "matchCriteriaId": "224960F7-695C-415B-B991-E8C01859AA80",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p28:*:*:*:*:*:*",
              "matchCriteriaId": "1F6D86E4-738B-4ADA-858E-C12CCED9FAAA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p29:*:*:*:*:*:*",
              "matchCriteriaId": "BD8EBF09-9B70-4972-85B1-82F41488BE3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p3:*:*:*:*:*:*",
              "matchCriteriaId": "076463AA-195F-4CD6-861B-72FE1C8A407F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p30:*:*:*:*:*:*",
              "matchCriteriaId": "009D2C7B-39B8-400F-80A5-06D56319232C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p31:*:*:*:*:*:*",
              "matchCriteriaId": "3D5AEB8D-772E-401F-975C-61BDD30B481E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p32:*:*:*:*:*:*",
              "matchCriteriaId": "2ECAB6C5-518C-4CA4-8B2B-D51115612A8B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p33:*:*:*:*:*:*",
              "matchCriteriaId": "FECC252C-02AA-41EC-BB84-5C1A6BC0FB8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p34:*:*:*:*:*:*",
              "matchCriteriaId": "238324F5-7225-40DD-82E8-52F30F0D3776",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p35:*:*:*:*:*:*",
              "matchCriteriaId": "4F3C9510-BD43-4F67-9C30-4F82B5D230E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p36:*:*:*:*:*:*",
              "matchCriteriaId": "51941654-F6FF-4323-AECA-5D1D84308CD2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p37:*:*:*:*:*:*",
              "matchCriteriaId": "6E800133-1D28-41D1-8D73-9437D741F83B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p4:*:*:*:*:*:*",
              "matchCriteriaId": "63043834-98E5-47C2-91F1-41B98270ABCA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p5:*:*:*:*:*:*",
              "matchCriteriaId": "FCF745D0-2EA6-4414-90BC-99D3ED08BB01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p6:*:*:*:*:*:*",
              "matchCriteriaId": "4823087F-D7FA-4594-8FD3-412DE5EA1F02",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p7:*:*:*:*:*:*",
              "matchCriteriaId": "6429F9CE-D477-4CFF-B6E0-4BF11B61ED0E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p8:*:*:*:*:*:*",
              "matchCriteriaId": "A50C58F9-94ED-4D85-8331-2D81F8E0760A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p9:*:*:*:*:*:*",
              "matchCriteriaId": "9A6AC0BD-FB65-4FAA-B344-66F87F16F8B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "C66704F1-0B5E-4B43-8748-987022F378F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b1:*:*:*:*:*:*",
              "matchCriteriaId": "B068974F-6F67-4CBB-B567-FCED86E28F22",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b2:*:*:*:*:*:*",
              "matchCriteriaId": "EA70F36A-EEF6-48DC-B15E-055D0DE8A052",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b3:*:*:*:*:*:*",
              "matchCriteriaId": "B2017F38-38DB-4E96-B34F-160BC731CBBE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b4:*:*:*:*:*:*",
              "matchCriteriaId": "0949F399-371B-409C-AF9F-32690D881440",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b5:*:*:*:*:*:*",
              "matchCriteriaId": "42E1E31A-B5CC-45F2-A2E5-3EEF735499BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b6:*:*:*:*:*:*",
              "matchCriteriaId": "4B364FCA-500C-458E-B997-82CD0B1D24F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b7:*:*:*:*:*:*",
              "matchCriteriaId": "0B32E657-917B-482B-B6A4-3D3746992A4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b8:*:*:*:*:*:*",
              "matchCriteriaId": "2119C732-E024-4DA6-8E47-9E08E5E12602",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:i1:*:*:*:*:*:*",
              "matchCriteriaId": "4F0B99A8-A124-43BD-B8AA-EECC9112346F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p1:*:*:*:*:*:*",
              "matchCriteriaId": "3FB7221E-BE9F-4529-8E07-8AD547FA3208",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p10:*:*:*:*:*:*",
              "matchCriteriaId": "30A074AD-9499-46E3-AB67-D6CEE3AA01C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p11:*:*:*:*:*:*",
              "matchCriteriaId": "A8BD0240-A22B-4273-BD47-C35A8C12E127",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p12:*:*:*:*:*:*",
              "matchCriteriaId": "DAA5680F-1DD0-48AA-BB7F-15B27365F0FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p13:*:*:*:*:*:*",
              "matchCriteriaId": "BC2F31CA-D4EB-44E6-9A09-5255D33F4A88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p14:*:*:*:*:*:*",
              "matchCriteriaId": "CD80BD69-20C6-4E17-B165-98689179A5A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p15:*:*:*:*:*:*",
              "matchCriteriaId": "B044D43B-0233-4A0D-A356-B9F9324E2777",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p16:*:*:*:*:*:*",
              "matchCriteriaId": "7DE79896-EBE5-42F2-A126-2A871BBA1071",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p17:*:*:*:*:*:*",
              "matchCriteriaId": "51A44E69-EEA1-4B01-B7B3-5BF7B39819E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p2:*:*:*:*:*:*",
              "matchCriteriaId": "7BCEB6FF-668F-4313-9264-0BF021AFC45F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p3:*:*:*:*:*:*",
              "matchCriteriaId": "E2342E2D-58B0-43E7-8C01-DF4678520F39",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p4:*:*:*:*:*:*",
              "matchCriteriaId": "1871B646-CA69-477F-B113-B901AC7B3934",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p5:*:*:*:*:*:*",
              "matchCriteriaId": "EEC65A72-CAE1-4E28-83EF-7ECAFE921BB6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tribe29:checkmk:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AF09C00-1AEF-4502-8C7B-3B68F2C35D34",
              "versionEndIncluding": "2.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Privilege escalation in jar_signature agent plugin in Checkmk before 2.2.0p18, 2.1.0p38 and 2.0.0p39 allows local user to escalate privileges"
    },
    {
      "lang": "es",
      "value": "La escalada de privilegios en el complemento del agente jar_signature en Checkmk anterior a 2.2.0p17, 2.1.0p37 y 2.0.0p39 permite al usuario local escalar privilegios"
    }
  ],
  "id": "CVE-2023-6740",
  "lastModified": "2024-11-21T08:44:27.517",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.0,
        "impactScore": 6.0,
        "source": "security@checkmk.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-01-12T08:15:43.920",
  "references": [
    {
      "source": "security@checkmk.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://checkmk.com/werk/16163"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://checkmk.com/werk/16163"
    }
  ],
  "sourceIdentifier": "security@checkmk.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-427"
        }
      ],
      "source": "security@checkmk.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-269"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2023-31211

Vulnerability from fkie_nvd - Published: 2024-01-12 08:15 - Updated: 2024-11-21 08:01
Summary
Insufficient authentication flow in Checkmk before 2.2.0p18, 2.1.0p38 and 2.0.0p39 allows attacker to use locked credentials
Impacted products
Vendor Product Version
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
tribe29 checkmk *

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:b1:*:*:*:*:*:*",
              "matchCriteriaId": "54031390-D7E7-4A14-AA2F-923768B3685F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:b2:*:*:*:*:*:*",
              "matchCriteriaId": "F1B7E35F-5A07-424E-AA09-AC54104D612B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:b3:*:*:*:*:*:*",
              "matchCriteriaId": "8D4AC302-C8F5-4A2B-A73A-982D0AA2495A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:b4:*:*:*:*:*:*",
              "matchCriteriaId": "7A058C71-C39E-4109-B570-4A061013D033",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:b5:*:*:*:*:*:*",
              "matchCriteriaId": "22BCFA79-B3D6-4FFF-A3D3-8C4C97AF17C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:b6:*:*:*:*:*:*",
              "matchCriteriaId": "2A1703D9-8EEB-432D-90E2-F847CDC4C204",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:b7:*:*:*:*:*:*",
              "matchCriteriaId": "1A4C72BA-6D78-4911-83E4-4DABB2CAC47F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:b8:*:*:*:*:*:*",
              "matchCriteriaId": "081FD127-1066-4019-B521-9FADB85DBD4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:i1:*:*:*:*:*:*",
              "matchCriteriaId": "C1A4F005-4823-4B2B-B4EF-4EFDB04CFB9B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p1:*:*:*:*:*:*",
              "matchCriteriaId": "357240B1-F0DA-4FA8-B782-D998951F4B54",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p10:*:*:*:*:*:*",
              "matchCriteriaId": "2F828F54-04E2-4B98-91A7-B09ED833E88B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p11:*:*:*:*:*:*",
              "matchCriteriaId": "A4B8B300-8264-40AB-A839-7EACB988163B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p12:*:*:*:*:*:*",
              "matchCriteriaId": "EB76A8DF-C870-482F-A488-DB2917ABD971",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p13:*:*:*:*:*:*",
              "matchCriteriaId": "04947B1B-CF67-4C11-8FE3-6C17FD35E2EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p14:*:*:*:*:*:*",
              "matchCriteriaId": "591AEC3C-2F48-4E91-9881-42EEDD039C5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p15:*:*:*:*:*:*",
              "matchCriteriaId": "C5CA04C8-2C80-4C7E-B329-3FFCBEDEE663",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p16:*:*:*:*:*:*",
              "matchCriteriaId": "47A1C5AC-C8B7-495A-A5F4-CD4790358A2E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p17:*:*:*:*:*:*",
              "matchCriteriaId": "B87D8B46-5B04-460D-BBA1-BB19234DA19D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p18:*:*:*:*:*:*",
              "matchCriteriaId": "C59EA30A-0B7D-4E58-A503-8C2F16B45004",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p19:*:*:*:*:*:*",
              "matchCriteriaId": "F2849E4C-09D1-48A5-B28E-F7A4CD3E8967",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p2:*:*:*:*:*:*",
              "matchCriteriaId": "F1E5549E-3272-478D-85D0-6F53EE731183",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p20:*:*:*:*:*:*",
              "matchCriteriaId": "CD0EA35B-EBFF-4E6F-BD2E-4BE165E81A3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p21:*:*:*:*:*:*",
              "matchCriteriaId": "3F2C76F2-D457-4C7C-BE76-515CA45CA161",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p22:*:*:*:*:*:*",
              "matchCriteriaId": "0E5A374E-56C5-4EBA-967C-CDFE6A967DFD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p23:*:*:*:*:*:*",
              "matchCriteriaId": "7D4568F0-8CCD-4517-B4E9-7E2CA228D659",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p24:*:*:*:*:*:*",
              "matchCriteriaId": "96893FF5-B85E-45AF-9020-5D767E954D6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p25:*:*:*:*:*:*",
              "matchCriteriaId": "425ABB56-3A2E-40E3-9701-E638F16E6ADD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p26:*:*:*:*:*:*",
              "matchCriteriaId": "9EEF6054-B3B5-4AAC-B24B-147A38564992",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p27:*:*:*:*:*:*",
              "matchCriteriaId": "462C2826-237E-4061-8F14-3DE09CE9952C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p28:*:*:*:*:*:*",
              "matchCriteriaId": "8DE8F008-1FC0-416C-B0D4-5A560CF985F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p29:*:*:*:*:*:*",
              "matchCriteriaId": "53AA0AB2-E814-4378-9486-D9192293C1DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p3:*:*:*:*:*:*",
              "matchCriteriaId": "D884D3AF-7D57-4DF6-82E8-556C35319ED2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p30:*:*:*:*:*:*",
              "matchCriteriaId": "2F6A123B-D6D3-4C46-9595-4D8138FC31C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p31:*:*:*:*:*:*",
              "matchCriteriaId": "4245029F-D95D-4364-BB29-8C60F5461070",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p32:*:*:*:*:*:*",
              "matchCriteriaId": "C67473D2-A96B-4ACD-B248-A0AF2E3C9738",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p33:*:*:*:*:*:*",
              "matchCriteriaId": "B22FDFE4-844F-449B-88D7-E7EDC92EC752",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p34:*:*:*:*:*:*",
              "matchCriteriaId": "01D13D8E-61F2-406C-8EE5-FDDD9BDCCF71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p35:*:*:*:*:*:*",
              "matchCriteriaId": "CA0DCBEB-CAED-4A39-B700-64311E7742DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p36:*:*:*:*:*:*",
              "matchCriteriaId": "0D8C138E-C8C2-46F7-A1D6-D33562FB86BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p37:*:*:*:*:*:*",
              "matchCriteriaId": "D4BE7A6A-C3BB-405A-8757-E60E2F611ACD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p38:*:*:*:*:*:*",
              "matchCriteriaId": "1D7BC614-16F2-4F7D-9824-C5DDE540072B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p4:*:*:*:*:*:*",
              "matchCriteriaId": "528BAFA3-ED39-45B5-8C81-A6FD76DDB49B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p5:*:*:*:*:*:*",
              "matchCriteriaId": "02DA7C50-7360-4679-93A5-92C8DC5E8E46",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p6:*:*:*:*:*:*",
              "matchCriteriaId": "71B49D90-9522-46C6-8948-B9C21CEA473C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p7:*:*:*:*:*:*",
              "matchCriteriaId": "98C29296-D1F3-45A2-BF0A-22333150F416",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p8:*:*:*:*:*:*",
              "matchCriteriaId": "339226E6-532F-4FE2-A543-6B166A9BA7F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p9:*:*:*:*:*:*",
              "matchCriteriaId": "986FDFA6-BE12-4268-9B90-F7D469BBE517",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "1AE224D8-742B-4D1F-ABBE-3DDA3EA5C5AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:b1:*:*:*:*:*:*",
              "matchCriteriaId": "1E6FCE7B-7ECE-42A4-82C5-12A647B0CCC8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:b2:*:*:*:*:*:*",
              "matchCriteriaId": "923AA113-D5E7-4F78-88BA-B72EF250F3EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:b3:*:*:*:*:*:*",
              "matchCriteriaId": "B1984F57-A313-48AC-B8F9-F352D82824D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:b4:*:*:*:*:*:*",
              "matchCriteriaId": "A38DB527-72A6-40B8-B46F-B8E78BFFDB1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:b5:*:*:*:*:*:*",
              "matchCriteriaId": "67643E11-91A1-4580-BC4C-574074C862CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:b6:*:*:*:*:*:*",
              "matchCriteriaId": "350B7E0F-D234-4D7C-91E4-F35E73579A24",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:b7:*:*:*:*:*:*",
              "matchCriteriaId": "DE58ACA9-8078-46A7-8487-C06E4E38F372",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:b8:*:*:*:*:*:*",
              "matchCriteriaId": "B3D8CF4D-E1F8-4D8D-A8A9-1783CAC869E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:b9:*:*:*:*:*:*",
              "matchCriteriaId": "58B0B051-7D3C-4EC7-96B0-38A1CC108D61",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p1:*:*:*:*:*:*",
              "matchCriteriaId": "B783A741-AAF2-43EE-8272-9239133A01E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p10:*:*:*:*:*:*",
              "matchCriteriaId": "A5F275A3-A99E-40E1-BD77-694FA568541F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p11:*:*:*:*:*:*",
              "matchCriteriaId": "3A44BF1A-5BE0-4412-B51D-055445758B61",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p12:*:*:*:*:*:*",
              "matchCriteriaId": "A31BAE94-9096-4320-AC19-AA204E8EC08D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p13:*:*:*:*:*:*",
              "matchCriteriaId": "1B0784EA-98E8-4490-B97B-894F188A223D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p14:*:*:*:*:*:*",
              "matchCriteriaId": "A56A901F-1040-4DB9-9BE3-FE1999C514CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p15:*:*:*:*:*:*",
              "matchCriteriaId": "58A904FC-C015-469D-8502-E678D5FDBD06",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p16:*:*:*:*:*:*",
              "matchCriteriaId": "1B5D109C-60AA-4FA4-9B10-2191AAF109F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p17:*:*:*:*:*:*",
              "matchCriteriaId": "37297866-24BB-4044-8744-EC0A8C29F152",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p18:*:*:*:*:*:*",
              "matchCriteriaId": "F9D4A171-CCB3-43B8-8B70-78610423E7C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p19:*:*:*:*:*:*",
              "matchCriteriaId": "5E1145FF-426D-407C-9F4B-EF773BD191EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p2:*:*:*:*:*:*",
              "matchCriteriaId": "4DA8F776-A724-48FC-B7EF-13788BC69753",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p20:*:*:*:*:*:*",
              "matchCriteriaId": "46F42A22-99F2-4DF5-9B00-3123396F87AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p21:*:*:*:*:*:*",
              "matchCriteriaId": "1C59D4D3-D526-4E6B-B3AA-FE485D030190",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p22:*:*:*:*:*:*",
              "matchCriteriaId": "65E5CAE6-DC8B-47B3-84A0-D79B0C33EB45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p23:*:*:*:*:*:*",
              "matchCriteriaId": "8B9E0D89-79E2-476A-8A3E-8443316BC310",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p24:*:*:*:*:*:*",
              "matchCriteriaId": "38EA0591-C30B-4102-8A06-1B922FD3A0C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p25:*:*:*:*:*:*",
              "matchCriteriaId": "5E9AF0D3-8DD6-4EC7-BB33-54401D4025FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p26:*:*:*:*:*:*",
              "matchCriteriaId": "983604CC-DD2C-42A9-8B9D-A9A261CE8BA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p27:*:*:*:*:*:*",
              "matchCriteriaId": "224960F7-695C-415B-B991-E8C01859AA80",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p28:*:*:*:*:*:*",
              "matchCriteriaId": "1F6D86E4-738B-4ADA-858E-C12CCED9FAAA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p29:*:*:*:*:*:*",
              "matchCriteriaId": "BD8EBF09-9B70-4972-85B1-82F41488BE3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p3:*:*:*:*:*:*",
              "matchCriteriaId": "076463AA-195F-4CD6-861B-72FE1C8A407F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p30:*:*:*:*:*:*",
              "matchCriteriaId": "009D2C7B-39B8-400F-80A5-06D56319232C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p31:*:*:*:*:*:*",
              "matchCriteriaId": "3D5AEB8D-772E-401F-975C-61BDD30B481E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p32:*:*:*:*:*:*",
              "matchCriteriaId": "2ECAB6C5-518C-4CA4-8B2B-D51115612A8B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p33:*:*:*:*:*:*",
              "matchCriteriaId": "FECC252C-02AA-41EC-BB84-5C1A6BC0FB8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p34:*:*:*:*:*:*",
              "matchCriteriaId": "238324F5-7225-40DD-82E8-52F30F0D3776",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p35:*:*:*:*:*:*",
              "matchCriteriaId": "4F3C9510-BD43-4F67-9C30-4F82B5D230E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p36:*:*:*:*:*:*",
              "matchCriteriaId": "51941654-F6FF-4323-AECA-5D1D84308CD2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p37:*:*:*:*:*:*",
              "matchCriteriaId": "6E800133-1D28-41D1-8D73-9437D741F83B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p4:*:*:*:*:*:*",
              "matchCriteriaId": "63043834-98E5-47C2-91F1-41B98270ABCA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p5:*:*:*:*:*:*",
              "matchCriteriaId": "FCF745D0-2EA6-4414-90BC-99D3ED08BB01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p6:*:*:*:*:*:*",
              "matchCriteriaId": "4823087F-D7FA-4594-8FD3-412DE5EA1F02",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p7:*:*:*:*:*:*",
              "matchCriteriaId": "6429F9CE-D477-4CFF-B6E0-4BF11B61ED0E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p8:*:*:*:*:*:*",
              "matchCriteriaId": "A50C58F9-94ED-4D85-8331-2D81F8E0760A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p9:*:*:*:*:*:*",
              "matchCriteriaId": "9A6AC0BD-FB65-4FAA-B344-66F87F16F8B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "C66704F1-0B5E-4B43-8748-987022F378F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b1:*:*:*:*:*:*",
              "matchCriteriaId": "B068974F-6F67-4CBB-B567-FCED86E28F22",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b2:*:*:*:*:*:*",
              "matchCriteriaId": "EA70F36A-EEF6-48DC-B15E-055D0DE8A052",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b3:*:*:*:*:*:*",
              "matchCriteriaId": "B2017F38-38DB-4E96-B34F-160BC731CBBE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b4:*:*:*:*:*:*",
              "matchCriteriaId": "0949F399-371B-409C-AF9F-32690D881440",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b5:*:*:*:*:*:*",
              "matchCriteriaId": "42E1E31A-B5CC-45F2-A2E5-3EEF735499BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b6:*:*:*:*:*:*",
              "matchCriteriaId": "4B364FCA-500C-458E-B997-82CD0B1D24F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b7:*:*:*:*:*:*",
              "matchCriteriaId": "0B32E657-917B-482B-B6A4-3D3746992A4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b8:*:*:*:*:*:*",
              "matchCriteriaId": "2119C732-E024-4DA6-8E47-9E08E5E12602",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:i1:*:*:*:*:*:*",
              "matchCriteriaId": "4F0B99A8-A124-43BD-B8AA-EECC9112346F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p1:*:*:*:*:*:*",
              "matchCriteriaId": "3FB7221E-BE9F-4529-8E07-8AD547FA3208",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p10:*:*:*:*:*:*",
              "matchCriteriaId": "30A074AD-9499-46E3-AB67-D6CEE3AA01C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p11:*:*:*:*:*:*",
              "matchCriteriaId": "A8BD0240-A22B-4273-BD47-C35A8C12E127",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p12:*:*:*:*:*:*",
              "matchCriteriaId": "DAA5680F-1DD0-48AA-BB7F-15B27365F0FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p13:*:*:*:*:*:*",
              "matchCriteriaId": "BC2F31CA-D4EB-44E6-9A09-5255D33F4A88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p14:*:*:*:*:*:*",
              "matchCriteriaId": "CD80BD69-20C6-4E17-B165-98689179A5A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p15:*:*:*:*:*:*",
              "matchCriteriaId": "B044D43B-0233-4A0D-A356-B9F9324E2777",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p16:*:*:*:*:*:*",
              "matchCriteriaId": "7DE79896-EBE5-42F2-A126-2A871BBA1071",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p17:*:*:*:*:*:*",
              "matchCriteriaId": "51A44E69-EEA1-4B01-B7B3-5BF7B39819E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p2:*:*:*:*:*:*",
              "matchCriteriaId": "7BCEB6FF-668F-4313-9264-0BF021AFC45F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p3:*:*:*:*:*:*",
              "matchCriteriaId": "E2342E2D-58B0-43E7-8C01-DF4678520F39",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p4:*:*:*:*:*:*",
              "matchCriteriaId": "1871B646-CA69-477F-B113-B901AC7B3934",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p5:*:*:*:*:*:*",
              "matchCriteriaId": "EEC65A72-CAE1-4E28-83EF-7ECAFE921BB6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tribe29:checkmk:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AF09C00-1AEF-4502-8C7B-3B68F2C35D34",
              "versionEndIncluding": "2.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Insufficient authentication flow in Checkmk before 2.2.0p18, 2.1.0p38 and 2.0.0p39 allows attacker to use locked credentials"
    },
    {
      "lang": "es",
      "value": "El flujo de autenticaci\u00f3n insuficiente en Checkmk anterior a 2.2.0p17, 2.1.0p37 y 2.0.0p39 permite al atacante utilizar credenciales bloqueadas"
    }
  ],
  "id": "CVE-2023-31211",
  "lastModified": "2024-11-21T08:01:37.957",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "security@checkmk.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-01-12T08:15:43.137",
  "references": [
    {
      "source": "security@checkmk.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://checkmk.com/werk/16227"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://checkmk.com/werk/16227"
    }
  ],
  "sourceIdentifier": "security@checkmk.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-303"
        }
      ],
      "source": "security@checkmk.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-670"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2023-6735

Vulnerability from fkie_nvd - Published: 2024-01-12 08:15 - Updated: 2024-11-21 08:44
Summary
Privilege escalation in mk_tsm agent plugin in Checkmk before 2.2.0p18, 2.1.0p38 and 2.0.0p39 allows local user to escalate privileges
Impacted products
Vendor Product Version
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
tribe29 checkmk *

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:b1:*:*:*:*:*:*",
              "matchCriteriaId": "54031390-D7E7-4A14-AA2F-923768B3685F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:b2:*:*:*:*:*:*",
              "matchCriteriaId": "F1B7E35F-5A07-424E-AA09-AC54104D612B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:b3:*:*:*:*:*:*",
              "matchCriteriaId": "8D4AC302-C8F5-4A2B-A73A-982D0AA2495A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:b4:*:*:*:*:*:*",
              "matchCriteriaId": "7A058C71-C39E-4109-B570-4A061013D033",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:b5:*:*:*:*:*:*",
              "matchCriteriaId": "22BCFA79-B3D6-4FFF-A3D3-8C4C97AF17C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:b6:*:*:*:*:*:*",
              "matchCriteriaId": "2A1703D9-8EEB-432D-90E2-F847CDC4C204",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:b7:*:*:*:*:*:*",
              "matchCriteriaId": "1A4C72BA-6D78-4911-83E4-4DABB2CAC47F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:b8:*:*:*:*:*:*",
              "matchCriteriaId": "081FD127-1066-4019-B521-9FADB85DBD4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:i1:*:*:*:*:*:*",
              "matchCriteriaId": "C1A4F005-4823-4B2B-B4EF-4EFDB04CFB9B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p1:*:*:*:*:*:*",
              "matchCriteriaId": "357240B1-F0DA-4FA8-B782-D998951F4B54",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p10:*:*:*:*:*:*",
              "matchCriteriaId": "2F828F54-04E2-4B98-91A7-B09ED833E88B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p11:*:*:*:*:*:*",
              "matchCriteriaId": "A4B8B300-8264-40AB-A839-7EACB988163B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p12:*:*:*:*:*:*",
              "matchCriteriaId": "EB76A8DF-C870-482F-A488-DB2917ABD971",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p13:*:*:*:*:*:*",
              "matchCriteriaId": "04947B1B-CF67-4C11-8FE3-6C17FD35E2EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p14:*:*:*:*:*:*",
              "matchCriteriaId": "591AEC3C-2F48-4E91-9881-42EEDD039C5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p15:*:*:*:*:*:*",
              "matchCriteriaId": "C5CA04C8-2C80-4C7E-B329-3FFCBEDEE663",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p16:*:*:*:*:*:*",
              "matchCriteriaId": "47A1C5AC-C8B7-495A-A5F4-CD4790358A2E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p17:*:*:*:*:*:*",
              "matchCriteriaId": "B87D8B46-5B04-460D-BBA1-BB19234DA19D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p18:*:*:*:*:*:*",
              "matchCriteriaId": "C59EA30A-0B7D-4E58-A503-8C2F16B45004",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p19:*:*:*:*:*:*",
              "matchCriteriaId": "F2849E4C-09D1-48A5-B28E-F7A4CD3E8967",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p2:*:*:*:*:*:*",
              "matchCriteriaId": "F1E5549E-3272-478D-85D0-6F53EE731183",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p20:*:*:*:*:*:*",
              "matchCriteriaId": "CD0EA35B-EBFF-4E6F-BD2E-4BE165E81A3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p21:*:*:*:*:*:*",
              "matchCriteriaId": "3F2C76F2-D457-4C7C-BE76-515CA45CA161",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p22:*:*:*:*:*:*",
              "matchCriteriaId": "0E5A374E-56C5-4EBA-967C-CDFE6A967DFD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p23:*:*:*:*:*:*",
              "matchCriteriaId": "7D4568F0-8CCD-4517-B4E9-7E2CA228D659",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p24:*:*:*:*:*:*",
              "matchCriteriaId": "96893FF5-B85E-45AF-9020-5D767E954D6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p25:*:*:*:*:*:*",
              "matchCriteriaId": "425ABB56-3A2E-40E3-9701-E638F16E6ADD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p26:*:*:*:*:*:*",
              "matchCriteriaId": "9EEF6054-B3B5-4AAC-B24B-147A38564992",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p27:*:*:*:*:*:*",
              "matchCriteriaId": "462C2826-237E-4061-8F14-3DE09CE9952C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p28:*:*:*:*:*:*",
              "matchCriteriaId": "8DE8F008-1FC0-416C-B0D4-5A560CF985F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p29:*:*:*:*:*:*",
              "matchCriteriaId": "53AA0AB2-E814-4378-9486-D9192293C1DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p3:*:*:*:*:*:*",
              "matchCriteriaId": "D884D3AF-7D57-4DF6-82E8-556C35319ED2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p30:*:*:*:*:*:*",
              "matchCriteriaId": "2F6A123B-D6D3-4C46-9595-4D8138FC31C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p31:*:*:*:*:*:*",
              "matchCriteriaId": "4245029F-D95D-4364-BB29-8C60F5461070",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p32:*:*:*:*:*:*",
              "matchCriteriaId": "C67473D2-A96B-4ACD-B248-A0AF2E3C9738",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p33:*:*:*:*:*:*",
              "matchCriteriaId": "B22FDFE4-844F-449B-88D7-E7EDC92EC752",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p34:*:*:*:*:*:*",
              "matchCriteriaId": "01D13D8E-61F2-406C-8EE5-FDDD9BDCCF71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p35:*:*:*:*:*:*",
              "matchCriteriaId": "CA0DCBEB-CAED-4A39-B700-64311E7742DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p36:*:*:*:*:*:*",
              "matchCriteriaId": "0D8C138E-C8C2-46F7-A1D6-D33562FB86BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p37:*:*:*:*:*:*",
              "matchCriteriaId": "D4BE7A6A-C3BB-405A-8757-E60E2F611ACD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p38:*:*:*:*:*:*",
              "matchCriteriaId": "1D7BC614-16F2-4F7D-9824-C5DDE540072B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p4:*:*:*:*:*:*",
              "matchCriteriaId": "528BAFA3-ED39-45B5-8C81-A6FD76DDB49B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p5:*:*:*:*:*:*",
              "matchCriteriaId": "02DA7C50-7360-4679-93A5-92C8DC5E8E46",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p6:*:*:*:*:*:*",
              "matchCriteriaId": "71B49D90-9522-46C6-8948-B9C21CEA473C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p7:*:*:*:*:*:*",
              "matchCriteriaId": "98C29296-D1F3-45A2-BF0A-22333150F416",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p8:*:*:*:*:*:*",
              "matchCriteriaId": "339226E6-532F-4FE2-A543-6B166A9BA7F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p9:*:*:*:*:*:*",
              "matchCriteriaId": "986FDFA6-BE12-4268-9B90-F7D469BBE517",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "1AE224D8-742B-4D1F-ABBE-3DDA3EA5C5AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:b1:*:*:*:*:*:*",
              "matchCriteriaId": "1E6FCE7B-7ECE-42A4-82C5-12A647B0CCC8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:b2:*:*:*:*:*:*",
              "matchCriteriaId": "923AA113-D5E7-4F78-88BA-B72EF250F3EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:b3:*:*:*:*:*:*",
              "matchCriteriaId": "B1984F57-A313-48AC-B8F9-F352D82824D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:b4:*:*:*:*:*:*",
              "matchCriteriaId": "A38DB527-72A6-40B8-B46F-B8E78BFFDB1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:b5:*:*:*:*:*:*",
              "matchCriteriaId": "67643E11-91A1-4580-BC4C-574074C862CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:b6:*:*:*:*:*:*",
              "matchCriteriaId": "350B7E0F-D234-4D7C-91E4-F35E73579A24",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:b7:*:*:*:*:*:*",
              "matchCriteriaId": "DE58ACA9-8078-46A7-8487-C06E4E38F372",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:b8:*:*:*:*:*:*",
              "matchCriteriaId": "B3D8CF4D-E1F8-4D8D-A8A9-1783CAC869E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:b9:*:*:*:*:*:*",
              "matchCriteriaId": "58B0B051-7D3C-4EC7-96B0-38A1CC108D61",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p1:*:*:*:*:*:*",
              "matchCriteriaId": "B783A741-AAF2-43EE-8272-9239133A01E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p10:*:*:*:*:*:*",
              "matchCriteriaId": "A5F275A3-A99E-40E1-BD77-694FA568541F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p11:*:*:*:*:*:*",
              "matchCriteriaId": "3A44BF1A-5BE0-4412-B51D-055445758B61",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p12:*:*:*:*:*:*",
              "matchCriteriaId": "A31BAE94-9096-4320-AC19-AA204E8EC08D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p13:*:*:*:*:*:*",
              "matchCriteriaId": "1B0784EA-98E8-4490-B97B-894F188A223D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p14:*:*:*:*:*:*",
              "matchCriteriaId": "A56A901F-1040-4DB9-9BE3-FE1999C514CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p15:*:*:*:*:*:*",
              "matchCriteriaId": "58A904FC-C015-469D-8502-E678D5FDBD06",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p16:*:*:*:*:*:*",
              "matchCriteriaId": "1B5D109C-60AA-4FA4-9B10-2191AAF109F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p17:*:*:*:*:*:*",
              "matchCriteriaId": "37297866-24BB-4044-8744-EC0A8C29F152",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p18:*:*:*:*:*:*",
              "matchCriteriaId": "F9D4A171-CCB3-43B8-8B70-78610423E7C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p19:*:*:*:*:*:*",
              "matchCriteriaId": "5E1145FF-426D-407C-9F4B-EF773BD191EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p2:*:*:*:*:*:*",
              "matchCriteriaId": "4DA8F776-A724-48FC-B7EF-13788BC69753",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p20:*:*:*:*:*:*",
              "matchCriteriaId": "46F42A22-99F2-4DF5-9B00-3123396F87AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p21:*:*:*:*:*:*",
              "matchCriteriaId": "1C59D4D3-D526-4E6B-B3AA-FE485D030190",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p22:*:*:*:*:*:*",
              "matchCriteriaId": "65E5CAE6-DC8B-47B3-84A0-D79B0C33EB45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p23:*:*:*:*:*:*",
              "matchCriteriaId": "8B9E0D89-79E2-476A-8A3E-8443316BC310",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p24:*:*:*:*:*:*",
              "matchCriteriaId": "38EA0591-C30B-4102-8A06-1B922FD3A0C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p25:*:*:*:*:*:*",
              "matchCriteriaId": "5E9AF0D3-8DD6-4EC7-BB33-54401D4025FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p26:*:*:*:*:*:*",
              "matchCriteriaId": "983604CC-DD2C-42A9-8B9D-A9A261CE8BA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p27:*:*:*:*:*:*",
              "matchCriteriaId": "224960F7-695C-415B-B991-E8C01859AA80",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p28:*:*:*:*:*:*",
              "matchCriteriaId": "1F6D86E4-738B-4ADA-858E-C12CCED9FAAA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p29:*:*:*:*:*:*",
              "matchCriteriaId": "BD8EBF09-9B70-4972-85B1-82F41488BE3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p3:*:*:*:*:*:*",
              "matchCriteriaId": "076463AA-195F-4CD6-861B-72FE1C8A407F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p30:*:*:*:*:*:*",
              "matchCriteriaId": "009D2C7B-39B8-400F-80A5-06D56319232C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p31:*:*:*:*:*:*",
              "matchCriteriaId": "3D5AEB8D-772E-401F-975C-61BDD30B481E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p32:*:*:*:*:*:*",
              "matchCriteriaId": "2ECAB6C5-518C-4CA4-8B2B-D51115612A8B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p33:*:*:*:*:*:*",
              "matchCriteriaId": "FECC252C-02AA-41EC-BB84-5C1A6BC0FB8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p34:*:*:*:*:*:*",
              "matchCriteriaId": "238324F5-7225-40DD-82E8-52F30F0D3776",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p35:*:*:*:*:*:*",
              "matchCriteriaId": "4F3C9510-BD43-4F67-9C30-4F82B5D230E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p36:*:*:*:*:*:*",
              "matchCriteriaId": "51941654-F6FF-4323-AECA-5D1D84308CD2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p37:*:*:*:*:*:*",
              "matchCriteriaId": "6E800133-1D28-41D1-8D73-9437D741F83B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p4:*:*:*:*:*:*",
              "matchCriteriaId": "63043834-98E5-47C2-91F1-41B98270ABCA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p5:*:*:*:*:*:*",
              "matchCriteriaId": "FCF745D0-2EA6-4414-90BC-99D3ED08BB01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p6:*:*:*:*:*:*",
              "matchCriteriaId": "4823087F-D7FA-4594-8FD3-412DE5EA1F02",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p7:*:*:*:*:*:*",
              "matchCriteriaId": "6429F9CE-D477-4CFF-B6E0-4BF11B61ED0E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p8:*:*:*:*:*:*",
              "matchCriteriaId": "A50C58F9-94ED-4D85-8331-2D81F8E0760A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p9:*:*:*:*:*:*",
              "matchCriteriaId": "9A6AC0BD-FB65-4FAA-B344-66F87F16F8B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "C66704F1-0B5E-4B43-8748-987022F378F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b1:*:*:*:*:*:*",
              "matchCriteriaId": "B068974F-6F67-4CBB-B567-FCED86E28F22",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b2:*:*:*:*:*:*",
              "matchCriteriaId": "EA70F36A-EEF6-48DC-B15E-055D0DE8A052",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b3:*:*:*:*:*:*",
              "matchCriteriaId": "B2017F38-38DB-4E96-B34F-160BC731CBBE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b4:*:*:*:*:*:*",
              "matchCriteriaId": "0949F399-371B-409C-AF9F-32690D881440",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b5:*:*:*:*:*:*",
              "matchCriteriaId": "42E1E31A-B5CC-45F2-A2E5-3EEF735499BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b6:*:*:*:*:*:*",
              "matchCriteriaId": "4B364FCA-500C-458E-B997-82CD0B1D24F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b7:*:*:*:*:*:*",
              "matchCriteriaId": "0B32E657-917B-482B-B6A4-3D3746992A4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b8:*:*:*:*:*:*",
              "matchCriteriaId": "2119C732-E024-4DA6-8E47-9E08E5E12602",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:i1:*:*:*:*:*:*",
              "matchCriteriaId": "4F0B99A8-A124-43BD-B8AA-EECC9112346F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p1:*:*:*:*:*:*",
              "matchCriteriaId": "3FB7221E-BE9F-4529-8E07-8AD547FA3208",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p10:*:*:*:*:*:*",
              "matchCriteriaId": "30A074AD-9499-46E3-AB67-D6CEE3AA01C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p11:*:*:*:*:*:*",
              "matchCriteriaId": "A8BD0240-A22B-4273-BD47-C35A8C12E127",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p12:*:*:*:*:*:*",
              "matchCriteriaId": "DAA5680F-1DD0-48AA-BB7F-15B27365F0FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p13:*:*:*:*:*:*",
              "matchCriteriaId": "BC2F31CA-D4EB-44E6-9A09-5255D33F4A88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p14:*:*:*:*:*:*",
              "matchCriteriaId": "CD80BD69-20C6-4E17-B165-98689179A5A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p15:*:*:*:*:*:*",
              "matchCriteriaId": "B044D43B-0233-4A0D-A356-B9F9324E2777",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p16:*:*:*:*:*:*",
              "matchCriteriaId": "7DE79896-EBE5-42F2-A126-2A871BBA1071",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p17:*:*:*:*:*:*",
              "matchCriteriaId": "51A44E69-EEA1-4B01-B7B3-5BF7B39819E3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p2:*:*:*:*:*:*",
              "matchCriteriaId": "7BCEB6FF-668F-4313-9264-0BF021AFC45F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p3:*:*:*:*:*:*",
              "matchCriteriaId": "E2342E2D-58B0-43E7-8C01-DF4678520F39",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p4:*:*:*:*:*:*",
              "matchCriteriaId": "1871B646-CA69-477F-B113-B901AC7B3934",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p5:*:*:*:*:*:*",
              "matchCriteriaId": "EEC65A72-CAE1-4E28-83EF-7ECAFE921BB6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tribe29:checkmk:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AF09C00-1AEF-4502-8C7B-3B68F2C35D34",
              "versionEndIncluding": "2.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Privilege escalation in mk_tsm agent plugin in Checkmk before 2.2.0p18, 2.1.0p38 and 2.0.0p39 allows local user to escalate privileges"
    },
    {
      "lang": "es",
      "value": "La escalada de privilegios en el complemento del agente mk_tsm en Checkmk anterior a 2.2.0p17, 2.1.0p37 y 2.0.0p39 permite al usuario local escalar privilegios"
    }
  ],
  "id": "CVE-2023-6735",
  "lastModified": "2024-11-21T08:44:26.960",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.0,
        "impactScore": 6.0,
        "source": "security@checkmk.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-01-12T08:15:43.650",
  "references": [
    {
      "source": "security@checkmk.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://checkmk.com/werk/16273"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://checkmk.com/werk/16273"
    }
  ],
  "sourceIdentifier": "security@checkmk.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-95"
        }
      ],
      "source": "security@checkmk.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-269"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2023-31209

Vulnerability from fkie_nvd - Published: 2023-08-10 09:15 - Updated: 2024-11-21 08:01
Summary
Improper neutralization of active check command arguments in Checkmk < 2.1.0p32, < 2.0.0p38, < 2.2.0p4 leads to arbitrary command execution for authenticated users.
Impacted products
Vendor Product Version
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.0.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.1.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
checkmk checkmk 2.2.0
tribe29 checkmk *

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "F8EDFDCA-0778-4540-B1D5-D3A986258028",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:b1:*:*:*:*:*:*",
              "matchCriteriaId": "54031390-D7E7-4A14-AA2F-923768B3685F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:b2:*:*:*:*:*:*",
              "matchCriteriaId": "F1B7E35F-5A07-424E-AA09-AC54104D612B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:b3:*:*:*:*:*:*",
              "matchCriteriaId": "8D4AC302-C8F5-4A2B-A73A-982D0AA2495A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:b4:*:*:*:*:*:*",
              "matchCriteriaId": "7A058C71-C39E-4109-B570-4A061013D033",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:b5:*:*:*:*:*:*",
              "matchCriteriaId": "22BCFA79-B3D6-4FFF-A3D3-8C4C97AF17C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:b6:*:*:*:*:*:*",
              "matchCriteriaId": "2A1703D9-8EEB-432D-90E2-F847CDC4C204",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:b7:*:*:*:*:*:*",
              "matchCriteriaId": "1A4C72BA-6D78-4911-83E4-4DABB2CAC47F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:b8:*:*:*:*:*:*",
              "matchCriteriaId": "081FD127-1066-4019-B521-9FADB85DBD4A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:i1:*:*:*:*:*:*",
              "matchCriteriaId": "C1A4F005-4823-4B2B-B4EF-4EFDB04CFB9B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p1:*:*:*:*:*:*",
              "matchCriteriaId": "357240B1-F0DA-4FA8-B782-D998951F4B54",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p10:*:*:*:*:*:*",
              "matchCriteriaId": "2F828F54-04E2-4B98-91A7-B09ED833E88B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p11:*:*:*:*:*:*",
              "matchCriteriaId": "A4B8B300-8264-40AB-A839-7EACB988163B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p12:*:*:*:*:*:*",
              "matchCriteriaId": "EB76A8DF-C870-482F-A488-DB2917ABD971",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p13:*:*:*:*:*:*",
              "matchCriteriaId": "04947B1B-CF67-4C11-8FE3-6C17FD35E2EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p14:*:*:*:*:*:*",
              "matchCriteriaId": "591AEC3C-2F48-4E91-9881-42EEDD039C5D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p15:*:*:*:*:*:*",
              "matchCriteriaId": "C5CA04C8-2C80-4C7E-B329-3FFCBEDEE663",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p16:*:*:*:*:*:*",
              "matchCriteriaId": "47A1C5AC-C8B7-495A-A5F4-CD4790358A2E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p17:*:*:*:*:*:*",
              "matchCriteriaId": "B87D8B46-5B04-460D-BBA1-BB19234DA19D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p18:*:*:*:*:*:*",
              "matchCriteriaId": "C59EA30A-0B7D-4E58-A503-8C2F16B45004",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p19:*:*:*:*:*:*",
              "matchCriteriaId": "F2849E4C-09D1-48A5-B28E-F7A4CD3E8967",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p2:*:*:*:*:*:*",
              "matchCriteriaId": "F1E5549E-3272-478D-85D0-6F53EE731183",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p20:*:*:*:*:*:*",
              "matchCriteriaId": "CD0EA35B-EBFF-4E6F-BD2E-4BE165E81A3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p21:*:*:*:*:*:*",
              "matchCriteriaId": "3F2C76F2-D457-4C7C-BE76-515CA45CA161",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p22:*:*:*:*:*:*",
              "matchCriteriaId": "0E5A374E-56C5-4EBA-967C-CDFE6A967DFD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p23:*:*:*:*:*:*",
              "matchCriteriaId": "7D4568F0-8CCD-4517-B4E9-7E2CA228D659",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p24:*:*:*:*:*:*",
              "matchCriteriaId": "96893FF5-B85E-45AF-9020-5D767E954D6D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p25:*:*:*:*:*:*",
              "matchCriteriaId": "425ABB56-3A2E-40E3-9701-E638F16E6ADD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p26:*:*:*:*:*:*",
              "matchCriteriaId": "9EEF6054-B3B5-4AAC-B24B-147A38564992",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p27:*:*:*:*:*:*",
              "matchCriteriaId": "462C2826-237E-4061-8F14-3DE09CE9952C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p28:*:*:*:*:*:*",
              "matchCriteriaId": "8DE8F008-1FC0-416C-B0D4-5A560CF985F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p29:*:*:*:*:*:*",
              "matchCriteriaId": "53AA0AB2-E814-4378-9486-D9192293C1DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p3:*:*:*:*:*:*",
              "matchCriteriaId": "D884D3AF-7D57-4DF6-82E8-556C35319ED2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p30:*:*:*:*:*:*",
              "matchCriteriaId": "2F6A123B-D6D3-4C46-9595-4D8138FC31C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p31:*:*:*:*:*:*",
              "matchCriteriaId": "4245029F-D95D-4364-BB29-8C60F5461070",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p32:*:*:*:*:*:*",
              "matchCriteriaId": "C67473D2-A96B-4ACD-B248-A0AF2E3C9738",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p33:*:*:*:*:*:*",
              "matchCriteriaId": "B22FDFE4-844F-449B-88D7-E7EDC92EC752",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p34:*:*:*:*:*:*",
              "matchCriteriaId": "01D13D8E-61F2-406C-8EE5-FDDD9BDCCF71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p35:*:*:*:*:*:*",
              "matchCriteriaId": "CA0DCBEB-CAED-4A39-B700-64311E7742DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p36:*:*:*:*:*:*",
              "matchCriteriaId": "0D8C138E-C8C2-46F7-A1D6-D33562FB86BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p37:*:*:*:*:*:*",
              "matchCriteriaId": "D4BE7A6A-C3BB-405A-8757-E60E2F611ACD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p4:*:*:*:*:*:*",
              "matchCriteriaId": "528BAFA3-ED39-45B5-8C81-A6FD76DDB49B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p5:*:*:*:*:*:*",
              "matchCriteriaId": "02DA7C50-7360-4679-93A5-92C8DC5E8E46",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p6:*:*:*:*:*:*",
              "matchCriteriaId": "71B49D90-9522-46C6-8948-B9C21CEA473C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p7:*:*:*:*:*:*",
              "matchCriteriaId": "98C29296-D1F3-45A2-BF0A-22333150F416",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p8:*:*:*:*:*:*",
              "matchCriteriaId": "339226E6-532F-4FE2-A543-6B166A9BA7F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p9:*:*:*:*:*:*",
              "matchCriteriaId": "986FDFA6-BE12-4268-9B90-F7D469BBE517",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "1AE224D8-742B-4D1F-ABBE-3DDA3EA5C5AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:b1:*:*:*:*:*:*",
              "matchCriteriaId": "1E6FCE7B-7ECE-42A4-82C5-12A647B0CCC8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:b2:*:*:*:*:*:*",
              "matchCriteriaId": "923AA113-D5E7-4F78-88BA-B72EF250F3EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:b3:*:*:*:*:*:*",
              "matchCriteriaId": "B1984F57-A313-48AC-B8F9-F352D82824D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:b4:*:*:*:*:*:*",
              "matchCriteriaId": "A38DB527-72A6-40B8-B46F-B8E78BFFDB1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:b5:*:*:*:*:*:*",
              "matchCriteriaId": "67643E11-91A1-4580-BC4C-574074C862CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:b6:*:*:*:*:*:*",
              "matchCriteriaId": "350B7E0F-D234-4D7C-91E4-F35E73579A24",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:b7:*:*:*:*:*:*",
              "matchCriteriaId": "DE58ACA9-8078-46A7-8487-C06E4E38F372",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:b8:*:*:*:*:*:*",
              "matchCriteriaId": "B3D8CF4D-E1F8-4D8D-A8A9-1783CAC869E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:b9:*:*:*:*:*:*",
              "matchCriteriaId": "58B0B051-7D3C-4EC7-96B0-38A1CC108D61",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p1:*:*:*:*:*:*",
              "matchCriteriaId": "B783A741-AAF2-43EE-8272-9239133A01E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p10:*:*:*:*:*:*",
              "matchCriteriaId": "A5F275A3-A99E-40E1-BD77-694FA568541F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p11:*:*:*:*:*:*",
              "matchCriteriaId": "3A44BF1A-5BE0-4412-B51D-055445758B61",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p12:*:*:*:*:*:*",
              "matchCriteriaId": "A31BAE94-9096-4320-AC19-AA204E8EC08D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p13:*:*:*:*:*:*",
              "matchCriteriaId": "1B0784EA-98E8-4490-B97B-894F188A223D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p14:*:*:*:*:*:*",
              "matchCriteriaId": "A56A901F-1040-4DB9-9BE3-FE1999C514CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p15:*:*:*:*:*:*",
              "matchCriteriaId": "58A904FC-C015-469D-8502-E678D5FDBD06",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p16:*:*:*:*:*:*",
              "matchCriteriaId": "1B5D109C-60AA-4FA4-9B10-2191AAF109F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p17:*:*:*:*:*:*",
              "matchCriteriaId": "37297866-24BB-4044-8744-EC0A8C29F152",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p18:*:*:*:*:*:*",
              "matchCriteriaId": "F9D4A171-CCB3-43B8-8B70-78610423E7C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p19:*:*:*:*:*:*",
              "matchCriteriaId": "5E1145FF-426D-407C-9F4B-EF773BD191EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p2:*:*:*:*:*:*",
              "matchCriteriaId": "4DA8F776-A724-48FC-B7EF-13788BC69753",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p20:*:*:*:*:*:*",
              "matchCriteriaId": "46F42A22-99F2-4DF5-9B00-3123396F87AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p21:*:*:*:*:*:*",
              "matchCriteriaId": "1C59D4D3-D526-4E6B-B3AA-FE485D030190",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p22:*:*:*:*:*:*",
              "matchCriteriaId": "65E5CAE6-DC8B-47B3-84A0-D79B0C33EB45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p23:*:*:*:*:*:*",
              "matchCriteriaId": "8B9E0D89-79E2-476A-8A3E-8443316BC310",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p24:*:*:*:*:*:*",
              "matchCriteriaId": "38EA0591-C30B-4102-8A06-1B922FD3A0C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p25:*:*:*:*:*:*",
              "matchCriteriaId": "5E9AF0D3-8DD6-4EC7-BB33-54401D4025FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p26:*:*:*:*:*:*",
              "matchCriteriaId": "983604CC-DD2C-42A9-8B9D-A9A261CE8BA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p27:*:*:*:*:*:*",
              "matchCriteriaId": "224960F7-695C-415B-B991-E8C01859AA80",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p28:*:*:*:*:*:*",
              "matchCriteriaId": "1F6D86E4-738B-4ADA-858E-C12CCED9FAAA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p29:*:*:*:*:*:*",
              "matchCriteriaId": "BD8EBF09-9B70-4972-85B1-82F41488BE3F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p3:*:*:*:*:*:*",
              "matchCriteriaId": "076463AA-195F-4CD6-861B-72FE1C8A407F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p30:*:*:*:*:*:*",
              "matchCriteriaId": "009D2C7B-39B8-400F-80A5-06D56319232C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p31:*:*:*:*:*:*",
              "matchCriteriaId": "3D5AEB8D-772E-401F-975C-61BDD30B481E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p4:*:*:*:*:*:*",
              "matchCriteriaId": "63043834-98E5-47C2-91F1-41B98270ABCA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p5:*:*:*:*:*:*",
              "matchCriteriaId": "FCF745D0-2EA6-4414-90BC-99D3ED08BB01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p6:*:*:*:*:*:*",
              "matchCriteriaId": "4823087F-D7FA-4594-8FD3-412DE5EA1F02",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p7:*:*:*:*:*:*",
              "matchCriteriaId": "6429F9CE-D477-4CFF-B6E0-4BF11B61ED0E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p8:*:*:*:*:*:*",
              "matchCriteriaId": "A50C58F9-94ED-4D85-8331-2D81F8E0760A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p9:*:*:*:*:*:*",
              "matchCriteriaId": "9A6AC0BD-FB65-4FAA-B344-66F87F16F8B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "C66704F1-0B5E-4B43-8748-987022F378F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b1:*:*:*:*:*:*",
              "matchCriteriaId": "B068974F-6F67-4CBB-B567-FCED86E28F22",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b2:*:*:*:*:*:*",
              "matchCriteriaId": "EA70F36A-EEF6-48DC-B15E-055D0DE8A052",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b3:*:*:*:*:*:*",
              "matchCriteriaId": "B2017F38-38DB-4E96-B34F-160BC731CBBE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b4:*:*:*:*:*:*",
              "matchCriteriaId": "0949F399-371B-409C-AF9F-32690D881440",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b5:*:*:*:*:*:*",
              "matchCriteriaId": "42E1E31A-B5CC-45F2-A2E5-3EEF735499BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b6:*:*:*:*:*:*",
              "matchCriteriaId": "4B364FCA-500C-458E-B997-82CD0B1D24F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b7:*:*:*:*:*:*",
              "matchCriteriaId": "0B32E657-917B-482B-B6A4-3D3746992A4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b8:*:*:*:*:*:*",
              "matchCriteriaId": "2119C732-E024-4DA6-8E47-9E08E5E12602",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:i1:*:*:*:*:*:*",
              "matchCriteriaId": "4F0B99A8-A124-43BD-B8AA-EECC9112346F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p1:*:*:*:*:*:*",
              "matchCriteriaId": "3FB7221E-BE9F-4529-8E07-8AD547FA3208",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p2:*:*:*:*:*:*",
              "matchCriteriaId": "7BCEB6FF-668F-4313-9264-0BF021AFC45F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:p3:*:*:*:*:*:*",
              "matchCriteriaId": "E2342E2D-58B0-43E7-8C01-DF4678520F39",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tribe29:checkmk:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA066B19-D5EC-4BAA-A842-1E792607D51B",
              "versionEndExcluding": "2.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper neutralization of active check command arguments in Checkmk \u003c 2.1.0p32, \u003c 2.0.0p38, \u003c 2.2.0p4 leads to arbitrary command execution for authenticated users."
    }
  ],
  "id": "CVE-2023-31209",
  "lastModified": "2024-11-21T08:01:37.683",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "security@checkmk.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-08-10T09:15:12.123",
  "references": [
    {
      "source": "security@checkmk.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://checkmk.com/werk/15194"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://checkmk.com/werk/15194"
    }
  ],
  "sourceIdentifier": "security@checkmk.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-78"
        }
      ],
      "source": "security@checkmk.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-74"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2023-22348

Vulnerability from fkie_nvd - Published: 2023-05-17 16:15 - Updated: 2024-11-21 07:44
Summary
Improper Authorization in RestAPI in Checkmk GmbH's Checkmk versions <2.1.0p28 and <2.2.0b8 allows remote authenticated users to read arbitrary host_configs.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:-:*:*:*:*:*:*",
              "matchCriteriaId": "1AE224D8-742B-4D1F-ABBE-3DDA3EA5C5AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:b1:*:*:*:*:*:*",
              "matchCriteriaId": "1E6FCE7B-7ECE-42A4-82C5-12A647B0CCC8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:b2:*:*:*:*:*:*",
              "matchCriteriaId": "923AA113-D5E7-4F78-88BA-B72EF250F3EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:b3:*:*:*:*:*:*",
              "matchCriteriaId": "B1984F57-A313-48AC-B8F9-F352D82824D6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:b4:*:*:*:*:*:*",
              "matchCriteriaId": "A38DB527-72A6-40B8-B46F-B8E78BFFDB1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:b5:*:*:*:*:*:*",
              "matchCriteriaId": "67643E11-91A1-4580-BC4C-574074C862CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:b6:*:*:*:*:*:*",
              "matchCriteriaId": "350B7E0F-D234-4D7C-91E4-F35E73579A24",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:b7:*:*:*:*:*:*",
              "matchCriteriaId": "DE58ACA9-8078-46A7-8487-C06E4E38F372",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:b8:*:*:*:*:*:*",
              "matchCriteriaId": "B3D8CF4D-E1F8-4D8D-A8A9-1783CAC869E4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:b9:*:*:*:*:*:*",
              "matchCriteriaId": "58B0B051-7D3C-4EC7-96B0-38A1CC108D61",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p1:*:*:*:*:*:*",
              "matchCriteriaId": "B783A741-AAF2-43EE-8272-9239133A01E8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p10:*:*:*:*:*:*",
              "matchCriteriaId": "A5F275A3-A99E-40E1-BD77-694FA568541F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p11:*:*:*:*:*:*",
              "matchCriteriaId": "3A44BF1A-5BE0-4412-B51D-055445758B61",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p12:*:*:*:*:*:*",
              "matchCriteriaId": "A31BAE94-9096-4320-AC19-AA204E8EC08D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p13:*:*:*:*:*:*",
              "matchCriteriaId": "1B0784EA-98E8-4490-B97B-894F188A223D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p14:*:*:*:*:*:*",
              "matchCriteriaId": "A56A901F-1040-4DB9-9BE3-FE1999C514CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p15:*:*:*:*:*:*",
              "matchCriteriaId": "58A904FC-C015-469D-8502-E678D5FDBD06",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p16:*:*:*:*:*:*",
              "matchCriteriaId": "1B5D109C-60AA-4FA4-9B10-2191AAF109F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p17:*:*:*:*:*:*",
              "matchCriteriaId": "37297866-24BB-4044-8744-EC0A8C29F152",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p18:*:*:*:*:*:*",
              "matchCriteriaId": "F9D4A171-CCB3-43B8-8B70-78610423E7C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p19:*:*:*:*:*:*",
              "matchCriteriaId": "5E1145FF-426D-407C-9F4B-EF773BD191EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p2:*:*:*:*:*:*",
              "matchCriteriaId": "4DA8F776-A724-48FC-B7EF-13788BC69753",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p20:*:*:*:*:*:*",
              "matchCriteriaId": "46F42A22-99F2-4DF5-9B00-3123396F87AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p21:*:*:*:*:*:*",
              "matchCriteriaId": "1C59D4D3-D526-4E6B-B3AA-FE485D030190",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p22:*:*:*:*:*:*",
              "matchCriteriaId": "65E5CAE6-DC8B-47B3-84A0-D79B0C33EB45",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p23:*:*:*:*:*:*",
              "matchCriteriaId": "8B9E0D89-79E2-476A-8A3E-8443316BC310",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p24:*:*:*:*:*:*",
              "matchCriteriaId": "38EA0591-C30B-4102-8A06-1B922FD3A0C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p25:*:*:*:*:*:*",
              "matchCriteriaId": "5E9AF0D3-8DD6-4EC7-BB33-54401D4025FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p26:*:*:*:*:*:*",
              "matchCriteriaId": "983604CC-DD2C-42A9-8B9D-A9A261CE8BA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p27:*:*:*:*:*:*",
              "matchCriteriaId": "224960F7-695C-415B-B991-E8C01859AA80",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p3:*:*:*:*:*:*",
              "matchCriteriaId": "076463AA-195F-4CD6-861B-72FE1C8A407F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p4:*:*:*:*:*:*",
              "matchCriteriaId": "63043834-98E5-47C2-91F1-41B98270ABCA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p5:*:*:*:*:*:*",
              "matchCriteriaId": "FCF745D0-2EA6-4414-90BC-99D3ED08BB01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p6:*:*:*:*:*:*",
              "matchCriteriaId": "4823087F-D7FA-4594-8FD3-412DE5EA1F02",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p7:*:*:*:*:*:*",
              "matchCriteriaId": "6429F9CE-D477-4CFF-B6E0-4BF11B61ED0E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p8:*:*:*:*:*:*",
              "matchCriteriaId": "A50C58F9-94ED-4D85-8331-2D81F8E0760A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p9:*:*:*:*:*:*",
              "matchCriteriaId": "9A6AC0BD-FB65-4FAA-B344-66F87F16F8B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b1:*:*:*:*:*:*",
              "matchCriteriaId": "B068974F-6F67-4CBB-B567-FCED86E28F22",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b2:*:*:*:*:*:*",
              "matchCriteriaId": "EA70F36A-EEF6-48DC-B15E-055D0DE8A052",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b3:*:*:*:*:*:*",
              "matchCriteriaId": "B2017F38-38DB-4E96-B34F-160BC731CBBE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b4:*:*:*:*:*:*",
              "matchCriteriaId": "0949F399-371B-409C-AF9F-32690D881440",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b5:*:*:*:*:*:*",
              "matchCriteriaId": "42E1E31A-B5CC-45F2-A2E5-3EEF735499BA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b6:*:*:*:*:*:*",
              "matchCriteriaId": "4B364FCA-500C-458E-B997-82CD0B1D24F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:checkmk:checkmk:2.2.0:b7:*:*:*:*:*:*",
              "matchCriteriaId": "0B32E657-917B-482B-B6A4-3D3746992A4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:tribe29:checkmk:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8909212-9DCE-4B14-A240-5CDA98CFDC6E",
              "versionEndExcluding": "2.1.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper Authorization in RestAPI in Checkmk GmbH\u0027s Checkmk versions \u003c2.1.0p28 and \u003c2.2.0b8 allows remote authenticated users to read arbitrary host_configs."
    }
  ],
  "id": "CVE-2023-22348",
  "lastModified": "2024-11-21T07:44:36.460",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 1.4,
        "source": "security@checkmk.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 1.4,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-05-17T16:15:09.110",
  "references": [
    {
      "source": "security@checkmk.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://checkmk.com/werk/13982"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://checkmk.com/werk/13982"
    }
  ],
  "sourceIdentifier": "security@checkmk.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-285"
        }
      ],
      "source": "security@checkmk.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}