Lucene search

K
cve[email protected]CVE-2021-40905
HistoryMar 25, 2022 - 11:15 p.m.

CVE-2021-40905

2022-03-2523:15:08
CWE-434
web.nvd.nist.gov
63
3
checkmk
enterprise edition
cve-2021-40905
remote code execution
web management
security vulnerability

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

8.9 High

AI Score

Confidence

High

6.8 Medium

CVSS2

Access Vector

Access Complexity

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.005 Low

EPSS

Percentile

75.9%

The web management console of CheckMK Enterprise Edition (versions 1.5.0 to 2.0.0p9) does not properly sanitise the uploading of “.mkp” files, which are Extension Packages, making remote code execution possible. Successful exploitation requires access to the web management interface, either with valid credentials or with a hijacked session of a user with administrator role. NOTE: the vendor states that this is the intended behavior: admins are supposed to be able to execute code in this manner

Affected configurations

NVD
Node
tribe29checkmkRange1.5.02.0.0
OR
tribe29checkmkMatch2.0.0-
OR
tribe29checkmkMatch2.0.0b1
OR
tribe29checkmkMatch2.0.0b2
OR
tribe29checkmkMatch2.0.0b3
OR
tribe29checkmkMatch2.0.0b4
OR
tribe29checkmkMatch2.0.0b5
OR
tribe29checkmkMatch2.0.0b6
OR
tribe29checkmkMatch2.0.0b7
OR
tribe29checkmkMatch2.0.0b8
OR
tribe29checkmkMatch2.0.0i1
OR
tribe29checkmkMatch2.0.0p1
OR
tribe29checkmkMatch2.0.0p10
OR
tribe29checkmkMatch2.0.0p11
OR
tribe29checkmkMatch2.0.0p12
OR
tribe29checkmkMatch2.0.0p13
OR
tribe29checkmkMatch2.0.0p14
OR
tribe29checkmkMatch2.0.0p15
OR
tribe29checkmkMatch2.0.0p16
OR
tribe29checkmkMatch2.0.0p17
OR
tribe29checkmkMatch2.0.0p2
OR
tribe29checkmkMatch2.0.0p3
OR
tribe29checkmkMatch2.0.0p4
OR
tribe29checkmkMatch2.0.0p5
OR
tribe29checkmkMatch2.0.0p6
OR
tribe29checkmkMatch2.0.0p7
OR
tribe29checkmkMatch2.0.0p8
OR
tribe29checkmkMatch2.0.0p9
CPENameOperatorVersion
tribe29:checkmktribe29 checkmklt2.0.0

Social References

More

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

8.9 High

AI Score

Confidence

High

6.8 Medium

CVSS2

Access Vector

Access Complexity

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.005 Low

EPSS

Percentile

75.9%