Lucene search

K
cveMitreCVE-2021-40905
HistoryMar 25, 2022 - 11:15 p.m.

CVE-2021-40905

2022-03-2523:15:08
CWE-434
mitre
web.nvd.nist.gov
69
3
checkmk
enterprise edition
cve-2021-40905
remote code execution
web management
security vulnerability

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

AI Score

8.9

Confidence

High

EPSS

0.006

Percentile

78.1%

The web management console of CheckMK Enterprise Edition (versions 1.5.0 to 2.0.0p9) does not properly sanitise the uploading of “.mkp” files, which are Extension Packages, making remote code execution possible. Successful exploitation requires access to the web management interface, either with valid credentials or with a hijacked session of a user with administrator role. NOTE: the vendor states that this is the intended behavior: admins are supposed to be able to execute code in this manner

Affected configurations

Nvd
Node
checkmkcheckmkMatch2.0.0-
OR
checkmkcheckmkMatch2.0.0b1
OR
checkmkcheckmkMatch2.0.0b2
OR
checkmkcheckmkMatch2.0.0b3
OR
checkmkcheckmkMatch2.0.0b4
OR
checkmkcheckmkMatch2.0.0b5
OR
checkmkcheckmkMatch2.0.0b6
OR
checkmkcheckmkMatch2.0.0b7
OR
checkmkcheckmkMatch2.0.0b8
OR
checkmkcheckmkMatch2.0.0i1
OR
checkmkcheckmkMatch2.0.0p1
OR
checkmkcheckmkMatch2.0.0p10
OR
checkmkcheckmkMatch2.0.0p11
OR
checkmkcheckmkMatch2.0.0p12
OR
checkmkcheckmkMatch2.0.0p13
OR
checkmkcheckmkMatch2.0.0p14
OR
checkmkcheckmkMatch2.0.0p15
OR
checkmkcheckmkMatch2.0.0p16
OR
checkmkcheckmkMatch2.0.0p17
OR
checkmkcheckmkMatch2.0.0p2
OR
checkmkcheckmkMatch2.0.0p3
OR
checkmkcheckmkMatch2.0.0p4
OR
checkmkcheckmkMatch2.0.0p5
OR
checkmkcheckmkMatch2.0.0p6
OR
checkmkcheckmkMatch2.0.0p7
OR
checkmkcheckmkMatch2.0.0p8
OR
checkmkcheckmkMatch2.0.0p9
OR
tribe29checkmkRange1.5.02.0.0
VendorProductVersionCPE
checkmkcheckmk2.0.0cpe:2.3:a:checkmk:checkmk:2.0.0:-:*:*:*:*:*:*
checkmkcheckmk2.0.0cpe:2.3:a:checkmk:checkmk:2.0.0:b1:*:*:*:*:*:*
checkmkcheckmk2.0.0cpe:2.3:a:checkmk:checkmk:2.0.0:b2:*:*:*:*:*:*
checkmkcheckmk2.0.0cpe:2.3:a:checkmk:checkmk:2.0.0:b3:*:*:*:*:*:*
checkmkcheckmk2.0.0cpe:2.3:a:checkmk:checkmk:2.0.0:b4:*:*:*:*:*:*
checkmkcheckmk2.0.0cpe:2.3:a:checkmk:checkmk:2.0.0:b5:*:*:*:*:*:*
checkmkcheckmk2.0.0cpe:2.3:a:checkmk:checkmk:2.0.0:b6:*:*:*:*:*:*
checkmkcheckmk2.0.0cpe:2.3:a:checkmk:checkmk:2.0.0:b7:*:*:*:*:*:*
checkmkcheckmk2.0.0cpe:2.3:a:checkmk:checkmk:2.0.0:b8:*:*:*:*:*:*
checkmkcheckmk2.0.0cpe:2.3:a:checkmk:checkmk:2.0.0:i1:*:*:*:*:*:*
Rows per page:
1-10 of 281

Social References

More

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

AI Score

8.9

Confidence

High

EPSS

0.006

Percentile

78.1%