Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2014-5340

Опубликовано: 02 сент. 2014
Источник: nvd
CVSS2: 9.3
EPSS Низкий

Описание

The wato component in Check_MK before 1.2.4p4 and 1.2.5 before 1.2.5i4 uses the pickle Python module unsafely, which allows remote attackers to execute arbitrary code via a crafted serialized object, related to an automation URL.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:check_mk_project:check_mk:*:p3:*:*:*:*:*:*
Версия до 1.2.4 (включая)
cpe:2.3:a:check_mk_project:check_mk:1.2.4:*:*:*:*:*:*:*
cpe:2.3:a:check_mk_project:check_mk:1.2.4:p1:*:*:*:*:*:*
cpe:2.3:a:check_mk_project:check_mk:1.2.4:p2:*:*:*:*:*:*
cpe:2.3:a:check_mk_project:check_mk:1.2.5:i1:*:*:*:*:*:*
cpe:2.3:a:check_mk_project:check_mk:1.2.5:i2:*:*:*:*:*:*
cpe:2.3:a:check_mk_project:check_mk:1.2.5:i3:*:*:*:*:*:*

EPSS

Процентиль: 87%
0.0315
Низкий

9.3 Critical

CVSS2

Дефекты

CWE-94

Связанные уязвимости

ubuntu
больше 11 лет назад

The wato component in Check_MK before 1.2.4p4 and 1.2.5 before 1.2.5i4 uses the pickle Python module unsafely, which allows remote attackers to execute arbitrary code via a crafted serialized object, related to an automation URL.

redhat
почти 12 лет назад

The wato component in Check_MK before 1.2.4p4 and 1.2.5 before 1.2.5i4 uses the pickle Python module unsafely, which allows remote attackers to execute arbitrary code via a crafted serialized object, related to an automation URL.

debian
больше 11 лет назад

The wato component in Check_MK before 1.2.4p4 and 1.2.5 before 1.2.5i4 ...

github
больше 3 лет назад

The wato component in Check_MK before 1.2.4p4 and 1.2.5 before 1.2.5i4 uses the pickle Python module unsafely, which allows remote attackers to execute arbitrary code via a crafted serialized object, related to an automation URL.

EPSS

Процентиль: 87%
0.0315
Низкий

9.3 Critical

CVSS2

Дефекты

CWE-94