Lucene search

K
nvd[email protected]NVD:CVE-2022-46303
HistoryFeb 20, 2023 - 5:15 p.m.

CVE-2022-46303

2023-02-2017:15:12
CWE-20
CWE-78
web.nvd.nist.gov
15
command injection
tribe29 checkmk
arbitrary commands

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

8.1

Confidence

High

EPSS

0.001

Percentile

44.1%

Command injection in SMS notifications in Tribe29 Checkmk <= 2.1.0p10, Checkmk <= 2.0.0p27, and Checkmk <= 1.6.0p29 allows an attacker with User Management permissions, as well as LDAP administrators in certain scenarios, to perform arbitrary commands within the context of the application’s local permissions.

Affected configurations

Nvd
Node
checkmkcheckmkMatch2.1.0-
OR
checkmkcheckmkMatch2.1.0b1
OR
checkmkcheckmkMatch2.1.0b2
OR
checkmkcheckmkMatch2.1.0b3
OR
checkmkcheckmkMatch2.1.0b4
OR
checkmkcheckmkMatch2.1.0b5
OR
checkmkcheckmkMatch2.1.0b6
OR
checkmkcheckmkMatch2.1.0b7
OR
checkmkcheckmkMatch2.1.0b8
OR
checkmkcheckmkMatch2.1.0b9
OR
checkmkcheckmkMatch2.1.0p1
OR
checkmkcheckmkMatch2.1.0p10
OR
checkmkcheckmkMatch2.1.0p2
OR
checkmkcheckmkMatch2.1.0p3
OR
checkmkcheckmkMatch2.1.0p4
OR
checkmkcheckmkMatch2.1.0p5
OR
checkmkcheckmkMatch2.1.0p6
OR
checkmkcheckmkMatch2.1.0p7
OR
checkmkcheckmkMatch2.1.0p8
OR
checkmkcheckmkMatch2.1.0p9
Node
checkmkcheckmkMatch2.0.0-
OR
checkmkcheckmkMatch2.0.0b1
OR
checkmkcheckmkMatch2.0.0b2
OR
checkmkcheckmkMatch2.0.0b3
OR
checkmkcheckmkMatch2.0.0b4
OR
checkmkcheckmkMatch2.0.0b5
OR
checkmkcheckmkMatch2.0.0b6
OR
checkmkcheckmkMatch2.0.0b7
OR
checkmkcheckmkMatch2.0.0b8
OR
checkmkcheckmkMatch2.0.0i1
OR
checkmkcheckmkMatch2.0.0p1
OR
checkmkcheckmkMatch2.0.0p10
OR
checkmkcheckmkMatch2.0.0p11
OR
checkmkcheckmkMatch2.0.0p12
OR
checkmkcheckmkMatch2.0.0p13
OR
checkmkcheckmkMatch2.0.0p14
OR
checkmkcheckmkMatch2.0.0p15
OR
checkmkcheckmkMatch2.0.0p16
OR
checkmkcheckmkMatch2.0.0p17
OR
checkmkcheckmkMatch2.0.0p18
OR
checkmkcheckmkMatch2.0.0p19
OR
checkmkcheckmkMatch2.0.0p2
OR
checkmkcheckmkMatch2.0.0p20
OR
checkmkcheckmkMatch2.0.0p21
OR
checkmkcheckmkMatch2.0.0p22
OR
checkmkcheckmkMatch2.0.0p23
OR
checkmkcheckmkMatch2.0.0p24
OR
checkmkcheckmkMatch2.0.0p25
OR
checkmkcheckmkMatch2.0.0p26
OR
checkmkcheckmkMatch2.0.0p27
OR
checkmkcheckmkMatch2.0.0p3
OR
checkmkcheckmkMatch2.0.0p4
OR
checkmkcheckmkMatch2.0.0p5
OR
checkmkcheckmkMatch2.0.0p6
OR
checkmkcheckmkMatch2.0.0p7
OR
checkmkcheckmkMatch2.0.0p8
OR
checkmkcheckmkMatch2.0.0p9
Node
checkmkcheckmkMatch1.6.0-
OR
checkmkcheckmkMatch1.6.0b1
OR
checkmkcheckmkMatch1.6.0b10
OR
checkmkcheckmkMatch1.6.0b11
OR
checkmkcheckmkMatch1.6.0b12
OR
checkmkcheckmkMatch1.6.0b2
OR
checkmkcheckmkMatch1.6.0b3
OR
checkmkcheckmkMatch1.6.0b4
OR
checkmkcheckmkMatch1.6.0b5
OR
checkmkcheckmkMatch1.6.0b6
OR
checkmkcheckmkMatch1.6.0b7
OR
checkmkcheckmkMatch1.6.0b8
OR
checkmkcheckmkMatch1.6.0b9
OR
checkmkcheckmkMatch1.6.0p1
OR
checkmkcheckmkMatch1.6.0p10
OR
checkmkcheckmkMatch1.6.0p11
OR
checkmkcheckmkMatch1.6.0p12
OR
checkmkcheckmkMatch1.6.0p13
OR
checkmkcheckmkMatch1.6.0p14
OR
checkmkcheckmkMatch1.6.0p15
OR
checkmkcheckmkMatch1.6.0p16
OR
checkmkcheckmkMatch1.6.0p17
OR
checkmkcheckmkMatch1.6.0p18
OR
checkmkcheckmkMatch1.6.0p19
OR
checkmkcheckmkMatch1.6.0p2
OR
checkmkcheckmkMatch1.6.0p20
OR
checkmkcheckmkMatch1.6.0p21
OR
checkmkcheckmkMatch1.6.0p22
OR
checkmkcheckmkMatch1.6.0p23
OR
checkmkcheckmkMatch1.6.0p24
OR
checkmkcheckmkMatch1.6.0p25
OR
checkmkcheckmkMatch1.6.0p26
OR
checkmkcheckmkMatch1.6.0p27
OR
checkmkcheckmkMatch1.6.0p28
OR
checkmkcheckmkMatch1.6.0p29
OR
checkmkcheckmkMatch1.6.0p3
OR
checkmkcheckmkMatch1.6.0p4
OR
checkmkcheckmkMatch1.6.0p5
OR
checkmkcheckmkMatch1.6.0p6
OR
checkmkcheckmkMatch1.6.0p7
OR
checkmkcheckmkMatch1.6.0p8
OR
checkmkcheckmkMatch1.6.0p9
VendorProductVersionCPE
checkmkcheckmk2.1.0cpe:2.3:a:checkmk:checkmk:2.1.0:-:*:*:*:*:*:*
checkmkcheckmk2.1.0cpe:2.3:a:checkmk:checkmk:2.1.0:b1:*:*:*:*:*:*
checkmkcheckmk2.1.0cpe:2.3:a:checkmk:checkmk:2.1.0:b2:*:*:*:*:*:*
checkmkcheckmk2.1.0cpe:2.3:a:checkmk:checkmk:2.1.0:b3:*:*:*:*:*:*
checkmkcheckmk2.1.0cpe:2.3:a:checkmk:checkmk:2.1.0:b4:*:*:*:*:*:*
checkmkcheckmk2.1.0cpe:2.3:a:checkmk:checkmk:2.1.0:b5:*:*:*:*:*:*
checkmkcheckmk2.1.0cpe:2.3:a:checkmk:checkmk:2.1.0:b6:*:*:*:*:*:*
checkmkcheckmk2.1.0cpe:2.3:a:checkmk:checkmk:2.1.0:b7:*:*:*:*:*:*
checkmkcheckmk2.1.0cpe:2.3:a:checkmk:checkmk:2.1.0:b8:*:*:*:*:*:*
checkmkcheckmk2.1.0cpe:2.3:a:checkmk:checkmk:2.1.0:b9:*:*:*:*:*:*
Rows per page:
1-10 of 991

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

8.1

Confidence

High

EPSS

0.001

Percentile

44.1%

Related for NVD:CVE-2022-46303