CVE-2014-2331

Check_MK 1.2.2p2, 1.2.2p3, and 1.2.3i5 allows remote authenticated users to execute arbitrary Python code via a crafted rules.mk file in a snapshot. NOTE: this can be exploited by remote attackers by leveraging CVE-2014-2330.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:check_mk_project:check_mk:*:*:*:*:*:*:*:*
cpe:2.3:a:check_mk_project:check_mk:*:*:*:*:*:*:*:*

History

21 Nov 2024, 02:06

Type Values Removed Values Added
References () http://www.securityfocus.com/archive/1/531594 - () http://www.securityfocus.com/archive/1/531594 -
References () http://www.securityfocus.com/archive/1/531656 - () http://www.securityfocus.com/archive/1/531656 -

Information

Published : 2015-08-31 18:59

Updated : 2024-11-21 02:06


NVD link : CVE-2014-2331

Mitre link : CVE-2014-2331

CVE.ORG link : CVE-2014-2331


JSON object : View

Products Affected

check_mk_project

  • check_mk
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')