The web management console of CheckMK Raw Edition (versions 1.5.0 to 1.6.0) allows a misconfiguration of the web-app Dokuwiki (installed by default), which allows embedded php code. As a result, remote code execution is achieved. Successful exploitation requires access to the web management interface, either with valid credentials or with a hijacked session by a user with the role of administrator.
References
Link | Resource |
---|---|
http://checkmk.com | Product |
https://github.com/Edgarloyola/CVE-2021-40904 | Exploit Patch Third Party Advisory |
http://checkmk.com | Product |
https://github.com/Edgarloyola/CVE-2021-40904 | Exploit Patch Third Party Advisory |
Configurations
History
21 Nov 2024, 06:25
Type | Values Removed | Values Added |
---|---|---|
References | () http://checkmk.com - Product | |
References | () https://github.com/Edgarloyola/CVE-2021-40904 - Exploit, Patch, Third Party Advisory |
23 Jul 2024, 19:37
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:checkmk:checkmk:*:*:*:*:*:*:*:* | |
First Time |
Checkmk checkmk
Checkmk |
Information
Published : 2022-03-25 23:15
Updated : 2024-11-21 06:25
NVD link : CVE-2021-40904
Mitre link : CVE-2021-40904
CVE.ORG link : CVE-2021-40904
JSON object : View
Products Affected
checkmk
- checkmk
CWE
CWE-276
Incorrect Default Permissions