Lucene search

K
openvasCopyright (C) 2023 Greenbone AGOPENVAS:1361412562310149852
HistoryJun 27, 2023 - 12:00 a.m.

Checkmk 2.2.x < 2.2.0p5 Information Disclosure Vulnerability

2023-06-2700:00:00
Copyright (C) 2023 Greenbone AG
plugins.openvas.org
3
information disclosure
vulnerability
authenticated user
enumerate
restapi
checkmk
version 2.2.0p5

CVSS3

4.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

AI Score

6.7

Confidence

Low

EPSS

0.001

Percentile

17.7%

Checkmk is prone to an information disclosure vulnerability.

# SPDX-FileCopyrightText: 2023 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

CPE = "cpe:/a:check_mk_project:check_mk";

if (description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.149852");
  script_version("2023-12-20T05:05:58+0000");
  script_tag(name:"last_modification", value:"2023-12-20 05:05:58 +0000 (Wed, 20 Dec 2023)");
  script_tag(name:"creation_date", value:"2023-06-27 02:52:57 +0000 (Tue, 27 Jun 2023)");
  script_tag(name:"cvss_base", value:"4.0");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:S/C:P/I:N/A:N");
  script_tag(name:"severity_vector", value:"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N");
  script_tag(name:"severity_origin", value:"NVD");
  script_tag(name:"severity_date", value:"2023-07-03 16:53:00 +0000 (Mon, 03 Jul 2023)");

  script_cve_id("CVE-2023-22359");

  script_tag(name:"qod_type", value:"remote_banner");

  script_tag(name:"solution_type", value:"VendorFix");

  script_name("Checkmk 2.2.x < 2.2.0p5 Information Disclosure Vulnerability");

  script_category(ACT_GATHER_INFO);

  script_copyright("Copyright (C) 2023 Greenbone AG");
  script_family("Web application abuses");
  script_dependencies("gb_check_mk_web_detect.nasl");
  script_mandatory_keys("check_mk/detected");

  script_tag(name:"summary", value:"Checkmk is prone to an information disclosure vulnerability.");

  script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present on the target host.");

  script_tag(name:"impact", value:"An authenticated user is able to enumerate username with the
  RestAPI.");

  script_tag(name:"affected", value:"Checkmk versions 2.2.x prior to 2.2.0p5.");

  script_tag(name:"solution", value:"Update to version 2.2.0p5 or later.");

  script_xref(name:"URL", value:"https://checkmk.com/werk/15890");

  exit(0);
}

include("host_details.inc");
include("version_func.inc");

if(!port = get_app_port(cpe: CPE))
  exit(0);

if (!infos = get_app_version_and_location(cpe: CPE, port: port, exit_no_version: TRUE))
  exit(0);

version = infos["version"];
location = infos["location"];

if (version_in_range_exclusive(version: version, test_version_lo: "2.2.0", test_version_up: "2.2.0p5")) {
  report = report_fixed_ver(installed_version: version, fixed_version: "2.2.0p5", install_path: location);
  security_message(port: port, data: report);
  exit(0);
}

exit(99);

CVSS3

4.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

AI Score

6.7

Confidence

Low

EPSS

0.001

Percentile

17.7%

Related for OPENVAS:1361412562310149852