Lucene search

K
cve[email protected]CVE-2022-46302
HistoryApr 20, 2023 - 2:15 p.m.

CVE-2022-46302

2023-04-2014:15:08
CWE-829
web.nvd.nist.gov
16
cve-2022-46302
site users
reverse proxy configurations
tribe29's checkmk
remote code execution
nvd
access controls

8.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

8.9 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

21.6%

Broad access controls could allow site users to directly interact with the system Apache installation when providing the reverse proxy configurations for Tribe29’s Checkmk <= 2.1.0p6, Checkmk <= 2.0.0p27, and all versions of Checkmk 1.6.0 (EOL) allowing an attacker to perform remote code execution with root privileges on the underlying host.

Affected configurations

NVD
Node
tribe29checkmkMatch1.6.0-
OR
tribe29checkmkMatch1.6.0b1
OR
tribe29checkmkMatch1.6.0b10
OR
tribe29checkmkMatch1.6.0b11
OR
tribe29checkmkMatch1.6.0b12
OR
tribe29checkmkMatch1.6.0b2
OR
tribe29checkmkMatch1.6.0b3
OR
tribe29checkmkMatch1.6.0b4
OR
tribe29checkmkMatch1.6.0b5
OR
tribe29checkmkMatch1.6.0b6
OR
tribe29checkmkMatch1.6.0b7
OR
tribe29checkmkMatch1.6.0b8
OR
tribe29checkmkMatch1.6.0b9
OR
tribe29checkmkMatch1.6.0p1
OR
tribe29checkmkMatch1.6.0p10
OR
tribe29checkmkMatch1.6.0p11
OR
tribe29checkmkMatch1.6.0p12
OR
tribe29checkmkMatch1.6.0p13
OR
tribe29checkmkMatch1.6.0p14
OR
tribe29checkmkMatch1.6.0p15
OR
tribe29checkmkMatch1.6.0p16
OR
tribe29checkmkMatch1.6.0p17
OR
tribe29checkmkMatch1.6.0p18
OR
tribe29checkmkMatch1.6.0p19
OR
tribe29checkmkMatch1.6.0p2
OR
tribe29checkmkMatch1.6.0p20
OR
tribe29checkmkMatch1.6.0p21
OR
tribe29checkmkMatch1.6.0p22
OR
tribe29checkmkMatch1.6.0p23
OR
tribe29checkmkMatch1.6.0p24
OR
tribe29checkmkMatch1.6.0p25
OR
tribe29checkmkMatch1.6.0p26
OR
tribe29checkmkMatch1.6.0p27
OR
tribe29checkmkMatch1.6.0p28
OR
tribe29checkmkMatch1.6.0p29
OR
tribe29checkmkMatch1.6.0p30
OR
tribe29checkmkMatch2.0.0-
OR
tribe29checkmkMatch2.0.0b1
OR
tribe29checkmkMatch2.0.0b2
OR
tribe29checkmkMatch2.0.0b3
OR
tribe29checkmkMatch2.0.0b4
OR
tribe29checkmkMatch2.0.0b5
OR
tribe29checkmkMatch2.0.0b6
OR
tribe29checkmkMatch2.0.0b7
OR
tribe29checkmkMatch2.0.0b8
OR
tribe29checkmkMatch2.0.0i1
OR
tribe29checkmkMatch2.0.0p1
OR
tribe29checkmkMatch2.0.0p10
OR
tribe29checkmkMatch2.0.0p11
OR
tribe29checkmkMatch2.0.0p12
OR
tribe29checkmkMatch2.0.0p13
OR
tribe29checkmkMatch2.0.0p14
OR
tribe29checkmkMatch2.0.0p15
OR
tribe29checkmkMatch2.0.0p16
OR
tribe29checkmkMatch2.0.0p17
OR
tribe29checkmkMatch2.0.0p18
OR
tribe29checkmkMatch2.0.0p19
OR
tribe29checkmkMatch2.0.0p2
OR
tribe29checkmkMatch2.0.0p20
OR
tribe29checkmkMatch2.0.0p21
OR
tribe29checkmkMatch2.0.0p22
OR
tribe29checkmkMatch2.0.0p23
OR
tribe29checkmkMatch2.0.0p24
OR
tribe29checkmkMatch2.0.0p25
OR
tribe29checkmkMatch2.0.0p26
OR
tribe29checkmkMatch2.0.0p27
OR
tribe29checkmkMatch2.0.0p3
OR
tribe29checkmkMatch2.0.0p4
OR
tribe29checkmkMatch2.0.0p5
OR
tribe29checkmkMatch2.0.0p6
OR
tribe29checkmkMatch2.0.0p7
OR
tribe29checkmkMatch2.0.0p8
OR
tribe29checkmkMatch2.0.0p9
OR
tribe29checkmkMatch2.1.0-
OR
tribe29checkmkMatch2.1.0b1
OR
tribe29checkmkMatch2.1.0b2
OR
tribe29checkmkMatch2.1.0b3
OR
tribe29checkmkMatch2.1.0b4
OR
tribe29checkmkMatch2.1.0b5
OR
tribe29checkmkMatch2.1.0b6
OR
tribe29checkmkMatch2.1.0b7
OR
tribe29checkmkMatch2.1.0b8
OR
tribe29checkmkMatch2.1.0b9
OR
tribe29checkmkMatch2.1.0p1
OR
tribe29checkmkMatch2.1.0p2
OR
tribe29checkmkMatch2.1.0p3
OR
tribe29checkmkMatch2.1.0p4
OR
tribe29checkmkMatch2.1.0p5
OR
tribe29checkmkMatch2.1.0p6

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "Checkmk",
    "vendor": "Tribe29",
    "versions": [
      {
        "lessThanOrEqual": "2.0.0p27",
        "status": "affected",
        "version": "2.0.0",
        "versionType": "semver"
      },
      {
        "lessThanOrEqual": "2.1.0p6",
        "status": "affected",
        "version": "2.1.0",
        "versionType": "semver"
      },
      {
        "lessThanOrEqual": "1.6.0p30",
        "status": "affected",
        "version": "1.6.0",
        "versionType": "semver"
      }
    ]
  }
]

8.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

8.9 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

21.6%