CVE-2014-0243

Check_MK through 1.2.5i2p1 allows local users to read arbitrary files via a symlink attack to a file in /var/lib/check_mk_agent/job.
References
Link Resource
http://git.mathias-kettner.de/git/?p=check_mk.git%3Ba=commit%3Bh=0426323df1641596c4f01ef5a716a3b65276f01c
http://git.mathias-kettner.de/git/?p=check_mk.git%3Ba=commit%3Bh=a2ef8d00c53ec9cbd05c4ae2f09b50761130e7ce
http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134160.html Exploit Mailing List Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134166.html Exploit Mailing List Third Party Advisory
http://packetstormsecurity.com/files/126857/Check_MK-Arbitrary-File-Disclosure.html Exploit Third Party Advisory VDB Entry
http://seclists.org/fulldisclosure/2014/May/145 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2014/05/28/1 Exploit Mailing List Third Party Advisory
http://www.securityfocus.com/bid/67674 Third Party Advisory VDB Entry
https://bugzilla.redhat.com/show_bug.cgi?id=1101669 Issue Tracking Patch Third Party Advisory
https://secuniaresearch.flexerasoftware.com/advisories/58536 Permissions Required Third Party Advisory
https://www.securityfocus.com/archive/1/532224/100/0/threaded Exploit Third Party Advisory VDB Entry
http://git.mathias-kettner.de/git/?p=check_mk.git%3Ba=commit%3Bh=0426323df1641596c4f01ef5a716a3b65276f01c
http://git.mathias-kettner.de/git/?p=check_mk.git%3Ba=commit%3Bh=a2ef8d00c53ec9cbd05c4ae2f09b50761130e7ce
http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134160.html Exploit Mailing List Third Party Advisory
http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134166.html Exploit Mailing List Third Party Advisory
http://packetstormsecurity.com/files/126857/Check_MK-Arbitrary-File-Disclosure.html Exploit Third Party Advisory VDB Entry
http://seclists.org/fulldisclosure/2014/May/145 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2014/05/28/1 Exploit Mailing List Third Party Advisory
http://www.securityfocus.com/bid/67674 Third Party Advisory VDB Entry
https://bugzilla.redhat.com/show_bug.cgi?id=1101669 Issue Tracking Patch Third Party Advisory
https://secuniaresearch.flexerasoftware.com/advisories/58536 Permissions Required Third Party Advisory
https://www.securityfocus.com/archive/1/532224/100/0/threaded Exploit Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:check_mk_project:check_mk:*:*:*:*:*:*:*:*
cpe:2.3:a:check_mk_project:check_mk:1.2.5:i2p1:*:*:*:*:*:*

History

21 Nov 2024, 02:01

Type Values Removed Values Added
References () http://git.mathias-kettner.de/git/?p=check_mk.git%3Ba=commit%3Bh=0426323df1641596c4f01ef5a716a3b65276f01c - () http://git.mathias-kettner.de/git/?p=check_mk.git%3Ba=commit%3Bh=0426323df1641596c4f01ef5a716a3b65276f01c -
References () http://git.mathias-kettner.de/git/?p=check_mk.git%3Ba=commit%3Bh=a2ef8d00c53ec9cbd05c4ae2f09b50761130e7ce - () http://git.mathias-kettner.de/git/?p=check_mk.git%3Ba=commit%3Bh=a2ef8d00c53ec9cbd05c4ae2f09b50761130e7ce -
References () http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134160.html - Exploit, Mailing List, Third Party Advisory () http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134160.html - Exploit, Mailing List, Third Party Advisory
References () http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134166.html - Exploit, Mailing List, Third Party Advisory () http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134166.html - Exploit, Mailing List, Third Party Advisory
References () http://packetstormsecurity.com/files/126857/Check_MK-Arbitrary-File-Disclosure.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/126857/Check_MK-Arbitrary-File-Disclosure.html - Exploit, Third Party Advisory, VDB Entry
References () http://seclists.org/fulldisclosure/2014/May/145 - Mailing List, Third Party Advisory () http://seclists.org/fulldisclosure/2014/May/145 - Mailing List, Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2014/05/28/1 - Exploit, Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2014/05/28/1 - Exploit, Mailing List, Third Party Advisory
References () http://www.securityfocus.com/bid/67674 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/67674 - Third Party Advisory, VDB Entry
References () https://bugzilla.redhat.com/show_bug.cgi?id=1101669 - Issue Tracking, Patch, Third Party Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=1101669 - Issue Tracking, Patch, Third Party Advisory
References () https://secuniaresearch.flexerasoftware.com/advisories/58536 - Permissions Required, Third Party Advisory () https://secuniaresearch.flexerasoftware.com/advisories/58536 - Permissions Required, Third Party Advisory
References () https://www.securityfocus.com/archive/1/532224/100/0/threaded - Exploit, Third Party Advisory, VDB Entry () https://www.securityfocus.com/archive/1/532224/100/0/threaded - Exploit, Third Party Advisory, VDB Entry

07 Nov 2023, 02:18

Type Values Removed Values Added
References
  • {'url': 'http://git.mathias-kettner.de/git/?p=check_mk.git;a=commit;h=0426323df1641596c4f01ef5a716a3b65276f01c', 'name': 'http://git.mathias-kettner.de/git/?p=check_mk.git;a=commit;h=0426323df1641596c4f01ef5a716a3b65276f01c', 'tags': ['Patch', 'Third Party Advisory'], 'refsource': 'CONFIRM'}
  • {'url': 'http://git.mathias-kettner.de/git/?p=check_mk.git;a=commit;h=a2ef8d00c53ec9cbd05c4ae2f09b50761130e7ce', 'name': 'http://git.mathias-kettner.de/git/?p=check_mk.git;a=commit;h=a2ef8d00c53ec9cbd05c4ae2f09b50761130e7ce', 'tags': ['Patch', 'Third Party Advisory'], 'refsource': 'CONFIRM'}
  • () http://git.mathias-kettner.de/git/?p=check_mk.git%3Ba=commit%3Bh=0426323df1641596c4f01ef5a716a3b65276f01c -
  • () http://git.mathias-kettner.de/git/?p=check_mk.git%3Ba=commit%3Bh=a2ef8d00c53ec9cbd05c4ae2f09b50761130e7ce -

Information

Published : 2018-07-19 17:29

Updated : 2024-11-21 02:01


NVD link : CVE-2014-0243

Mitre link : CVE-2014-0243

CVE.ORG link : CVE-2014-0243


JSON object : View

Products Affected

check_mk_project

  • check_mk
CWE
CWE-59

Improper Link Resolution Before File Access ('Link Following')