Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2022-46302

Опубликовано: 20 апр. 2023
Источник: nvd
CVSS3: 8.8
EPSS Низкий

Описание

Broad access controls could allow site users to directly interact with the system Apache installation when providing the reverse proxy configurations for Tribe29's Checkmk <= 2.1.0p6, Checkmk <= 2.0.0p27, and all versions of Checkmk 1.6.0 (EOL) allowing an attacker to perform remote code execution with root privileges on the underlying host.

Ссылки

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:checkmk:checkmk:1.6.0:-:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:b1:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:b10:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:b11:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:b12:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:b2:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:b3:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:b4:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:b5:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:b6:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:b7:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:b8:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:b9:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:p1:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:p10:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:p11:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:p12:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:p13:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:p14:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:p15:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:p16:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:p17:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:p18:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:p19:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:p2:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:p20:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:p21:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:p22:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:p23:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:p24:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:p25:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:p26:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:p27:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:p28:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:p29:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:p30:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:-:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:b1:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:b2:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:b3:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:b4:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:b5:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:b6:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:b7:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:b8:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:i1:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:p1:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:p10:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:p11:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:p12:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:p13:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:p14:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:p15:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:p16:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:p17:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:p18:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:p19:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:p2:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:p20:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:p21:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:p22:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:p23:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:p24:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:p25:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:p26:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:p27:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:p3:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:p4:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:p5:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:p6:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:p7:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:p8:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:p9:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.1.0:-:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.1.0:b1:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.1.0:b2:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.1.0:b3:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.1.0:b4:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.1.0:b5:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.1.0:b6:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.1.0:b7:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.1.0:b8:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.1.0:b9:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.1.0:p1:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.1.0:p2:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.1.0:p3:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.1.0:p4:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.1.0:p5:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.1.0:p6:*:*:*:*:*:*

EPSS

Процентиль: 77%
0.01088
Низкий

8.8 High

CVSS3

Дефекты

CWE-829
CWE-829

Связанные уязвимости

CVSS3: 8.8
ubuntu
почти 3 года назад

Broad access controls could allow site users to directly interact with the system Apache installation when providing the reverse proxy configurations for Tribe29's Checkmk <= 2.1.0p6, Checkmk <= 2.0.0p27, and all versions of Checkmk 1.6.0 (EOL) allowing an attacker to perform remote code execution with root privileges on the underlying host.

CVSS3: 8.8
debian
почти 3 года назад

Broad access controls could allow site users to directly interact with ...

CVSS3: 8.8
github
почти 3 года назад

Broad access controls could allow site users to directly interact with the system Apache installation when providing the reverse proxy configurations for Tribe29's Checkmk <= 2.1.0p6, Checkmk <= 2.0.0p27, and all versions of Checkmk 1.6.0 (EOL) allowing an attacker to perform remote code execution with root privileges on the underlying host.

EPSS

Процентиль: 77%
0.01088
Низкий

8.8 High

CVSS3

Дефекты

CWE-829
CWE-829