Lucene search

K
ubuntucveUbuntu.comUB:CVE-2022-48317
HistoryFeb 20, 2023 - 12:00 a.m.

CVE-2022-48317

2023-02-2000:00:00
ubuntu.com
ubuntu.com
12
checkmk
restapi
expired sessions

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.002

Percentile

58.6%

Expired sessions were not securely terminated in the RestAPI for Tribe29’s
Checkmk <= 2.1.0p10 and Checkmk <= 2.0.0p28 allowing an attacker to use
expired session tokens when communicating with the RestAPI.

OSVersionArchitecturePackageVersionFilename
ubuntu18.04noarchcheck-mk< anyUNKNOWN
ubuntu16.04noarchcheck-mk< anyUNKNOWN

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS

0.002

Percentile

58.6%

Related for UB:CVE-2022-48317