FKIE_CVE-2022-48318
Vulnerability from fkie_nvd - Published: 2023-02-20 17:15 - Updated: 2024-11-21 07:33
Severity ?
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Summary
No authorisation controls in the RestAPI documentation for Tribe29's Checkmk <= 2.1.0p13 and Checkmk <= 2.0.0p29 which may lead to unintended information disclosure through automatically generated user specific tags within Rest API documentation.
References
| URL | Tags | ||
|---|---|---|---|
| security@checkmk.com | https://checkmk.com/werk/14509 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://checkmk.com/werk/14509 | Vendor Advisory |
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:-:*:*:*:*:*:*",
"matchCriteriaId": "1AE224D8-742B-4D1F-ABBE-3DDA3EA5C5AD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:b1:*:*:*:*:*:*",
"matchCriteriaId": "1E6FCE7B-7ECE-42A4-82C5-12A647B0CCC8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:b2:*:*:*:*:*:*",
"matchCriteriaId": "923AA113-D5E7-4F78-88BA-B72EF250F3EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:b3:*:*:*:*:*:*",
"matchCriteriaId": "B1984F57-A313-48AC-B8F9-F352D82824D6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:b4:*:*:*:*:*:*",
"matchCriteriaId": "A38DB527-72A6-40B8-B46F-B8E78BFFDB1F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:b5:*:*:*:*:*:*",
"matchCriteriaId": "67643E11-91A1-4580-BC4C-574074C862CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:b6:*:*:*:*:*:*",
"matchCriteriaId": "350B7E0F-D234-4D7C-91E4-F35E73579A24",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:b7:*:*:*:*:*:*",
"matchCriteriaId": "DE58ACA9-8078-46A7-8487-C06E4E38F372",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:b8:*:*:*:*:*:*",
"matchCriteriaId": "B3D8CF4D-E1F8-4D8D-A8A9-1783CAC869E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:b9:*:*:*:*:*:*",
"matchCriteriaId": "58B0B051-7D3C-4EC7-96B0-38A1CC108D61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p1:*:*:*:*:*:*",
"matchCriteriaId": "B783A741-AAF2-43EE-8272-9239133A01E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p10:*:*:*:*:*:*",
"matchCriteriaId": "A5F275A3-A99E-40E1-BD77-694FA568541F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p11:*:*:*:*:*:*",
"matchCriteriaId": "3A44BF1A-5BE0-4412-B51D-055445758B61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p12:*:*:*:*:*:*",
"matchCriteriaId": "A31BAE94-9096-4320-AC19-AA204E8EC08D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p13:*:*:*:*:*:*",
"matchCriteriaId": "1B0784EA-98E8-4490-B97B-894F188A223D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p2:*:*:*:*:*:*",
"matchCriteriaId": "4DA8F776-A724-48FC-B7EF-13788BC69753",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p3:*:*:*:*:*:*",
"matchCriteriaId": "076463AA-195F-4CD6-861B-72FE1C8A407F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p4:*:*:*:*:*:*",
"matchCriteriaId": "63043834-98E5-47C2-91F1-41B98270ABCA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p5:*:*:*:*:*:*",
"matchCriteriaId": "FCF745D0-2EA6-4414-90BC-99D3ED08BB01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p6:*:*:*:*:*:*",
"matchCriteriaId": "4823087F-D7FA-4594-8FD3-412DE5EA1F02",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p7:*:*:*:*:*:*",
"matchCriteriaId": "6429F9CE-D477-4CFF-B6E0-4BF11B61ED0E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p8:*:*:*:*:*:*",
"matchCriteriaId": "A50C58F9-94ED-4D85-8331-2D81F8E0760A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.1.0:p9:*:*:*:*:*:*",
"matchCriteriaId": "9A6AC0BD-FB65-4FAA-B344-66F87F16F8B3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:-:*:*:*:*:*:*",
"matchCriteriaId": "F8EDFDCA-0778-4540-B1D5-D3A986258028",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:b1:*:*:*:*:*:*",
"matchCriteriaId": "54031390-D7E7-4A14-AA2F-923768B3685F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:b2:*:*:*:*:*:*",
"matchCriteriaId": "F1B7E35F-5A07-424E-AA09-AC54104D612B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:b3:*:*:*:*:*:*",
"matchCriteriaId": "8D4AC302-C8F5-4A2B-A73A-982D0AA2495A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:b4:*:*:*:*:*:*",
"matchCriteriaId": "7A058C71-C39E-4109-B570-4A061013D033",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:b5:*:*:*:*:*:*",
"matchCriteriaId": "22BCFA79-B3D6-4FFF-A3D3-8C4C97AF17C5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:b6:*:*:*:*:*:*",
"matchCriteriaId": "2A1703D9-8EEB-432D-90E2-F847CDC4C204",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:b7:*:*:*:*:*:*",
"matchCriteriaId": "1A4C72BA-6D78-4911-83E4-4DABB2CAC47F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:b8:*:*:*:*:*:*",
"matchCriteriaId": "081FD127-1066-4019-B521-9FADB85DBD4A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:i1:*:*:*:*:*:*",
"matchCriteriaId": "C1A4F005-4823-4B2B-B4EF-4EFDB04CFB9B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p1:*:*:*:*:*:*",
"matchCriteriaId": "357240B1-F0DA-4FA8-B782-D998951F4B54",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p10:*:*:*:*:*:*",
"matchCriteriaId": "2F828F54-04E2-4B98-91A7-B09ED833E88B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p11:*:*:*:*:*:*",
"matchCriteriaId": "A4B8B300-8264-40AB-A839-7EACB988163B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p12:*:*:*:*:*:*",
"matchCriteriaId": "EB76A8DF-C870-482F-A488-DB2917ABD971",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p13:*:*:*:*:*:*",
"matchCriteriaId": "04947B1B-CF67-4C11-8FE3-6C17FD35E2EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p14:*:*:*:*:*:*",
"matchCriteriaId": "591AEC3C-2F48-4E91-9881-42EEDD039C5D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p15:*:*:*:*:*:*",
"matchCriteriaId": "C5CA04C8-2C80-4C7E-B329-3FFCBEDEE663",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p16:*:*:*:*:*:*",
"matchCriteriaId": "47A1C5AC-C8B7-495A-A5F4-CD4790358A2E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p17:*:*:*:*:*:*",
"matchCriteriaId": "B87D8B46-5B04-460D-BBA1-BB19234DA19D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p18:*:*:*:*:*:*",
"matchCriteriaId": "C59EA30A-0B7D-4E58-A503-8C2F16B45004",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p19:*:*:*:*:*:*",
"matchCriteriaId": "F2849E4C-09D1-48A5-B28E-F7A4CD3E8967",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p2:*:*:*:*:*:*",
"matchCriteriaId": "F1E5549E-3272-478D-85D0-6F53EE731183",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p20:*:*:*:*:*:*",
"matchCriteriaId": "CD0EA35B-EBFF-4E6F-BD2E-4BE165E81A3F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p21:*:*:*:*:*:*",
"matchCriteriaId": "3F2C76F2-D457-4C7C-BE76-515CA45CA161",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p22:*:*:*:*:*:*",
"matchCriteriaId": "0E5A374E-56C5-4EBA-967C-CDFE6A967DFD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p23:*:*:*:*:*:*",
"matchCriteriaId": "7D4568F0-8CCD-4517-B4E9-7E2CA228D659",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p24:*:*:*:*:*:*",
"matchCriteriaId": "96893FF5-B85E-45AF-9020-5D767E954D6D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p25:*:*:*:*:*:*",
"matchCriteriaId": "425ABB56-3A2E-40E3-9701-E638F16E6ADD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p26:*:*:*:*:*:*",
"matchCriteriaId": "9EEF6054-B3B5-4AAC-B24B-147A38564992",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p27:*:*:*:*:*:*",
"matchCriteriaId": "462C2826-237E-4061-8F14-3DE09CE9952C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p28:*:*:*:*:*:*",
"matchCriteriaId": "8DE8F008-1FC0-416C-B0D4-5A560CF985F4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p29:*:*:*:*:*:*",
"matchCriteriaId": "53AA0AB2-E814-4378-9486-D9192293C1DE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p3:*:*:*:*:*:*",
"matchCriteriaId": "D884D3AF-7D57-4DF6-82E8-556C35319ED2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p4:*:*:*:*:*:*",
"matchCriteriaId": "528BAFA3-ED39-45B5-8C81-A6FD76DDB49B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p5:*:*:*:*:*:*",
"matchCriteriaId": "02DA7C50-7360-4679-93A5-92C8DC5E8E46",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p6:*:*:*:*:*:*",
"matchCriteriaId": "71B49D90-9522-46C6-8948-B9C21CEA473C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p7:*:*:*:*:*:*",
"matchCriteriaId": "98C29296-D1F3-45A2-BF0A-22333150F416",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p8:*:*:*:*:*:*",
"matchCriteriaId": "339226E6-532F-4FE2-A543-6B166A9BA7F3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkmk:checkmk:2.0.0:p9:*:*:*:*:*:*",
"matchCriteriaId": "986FDFA6-BE12-4268-9B90-F7D469BBE517",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "No authorisation controls in the RestAPI documentation for Tribe29\u0027s Checkmk \u003c= 2.1.0p13 and Checkmk \u003c= 2.0.0p29 which may lead to unintended information disclosure through automatically generated user specific tags within Rest API documentation."
}
],
"id": "CVE-2022-48318",
"lastModified": "2024-11-21T07:33:09.080",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4,
"source": "security@checkmk.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2023-02-20T17:15:12.380",
"references": [
{
"source": "security@checkmk.com",
"tags": [
"Vendor Advisory"
],
"url": "https://checkmk.com/werk/14509"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://checkmk.com/werk/14509"
}
],
"sourceIdentifier": "security@checkmk.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-862"
}
],
"source": "security@checkmk.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-862"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…