Check_MK 1.2.2p2, 1.2.2p3, and 1.2.3i5 allows remote authenticated users to execute arbitrary Python code via a crafted rules.mk file in a snapshot. NOTE: this can be exploited by remote attackers by leveraging CVE-2014-2330.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:06
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/archive/1/531594 - | |
References | () http://www.securityfocus.com/archive/1/531656 - |
Information
Published : 2015-08-31 18:59
Updated : 2024-11-21 02:06
NVD link : CVE-2014-2331
Mitre link : CVE-2014-2331
CVE.ORG link : CVE-2014-2331
JSON object : View
Products Affected
check_mk_project
- check_mk
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')