CVE-2021-40905

The web management console of CheckMK Enterprise Edition (versions 1.5.0 to 2.0.0p9) does not properly sanitise the uploading of ".mkp" files, which are Extension Packages, making remote code execution possible. Successful exploitation requires access to the web management interface, either with valid credentials or with a hijacked session of a user with administrator role. NOTE: the vendor states that this is the intended behavior: admins are supposed to be able to execute code in this manner
References
Link Resource
http://checkmk.com Product
https://github.com/Edgarloyola/CVE-2021-40905 Exploit Third Party Advisory
http://checkmk.com Product
https://github.com/Edgarloyola/CVE-2021-40905 Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:checkmk:checkmk:2.0.0:-:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:b1:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:b2:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:b3:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:b4:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:b5:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:b6:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:b7:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:b8:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:i1:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:p1:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:p10:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:p11:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:p12:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:p13:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:p14:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:p15:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:p16:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:p17:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:p2:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:p3:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:p4:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:p5:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:p6:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:p7:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:p8:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:p9:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:25

Type Values Removed Values Added
References () http://checkmk.com - Product () http://checkmk.com - Product
References () https://github.com/Edgarloyola/CVE-2021-40905 - Exploit, Third Party Advisory () https://github.com/Edgarloyola/CVE-2021-40905 - Exploit, Third Party Advisory

23 Jul 2024, 19:37

Type Values Removed Values Added
CPE cpe:2.3:a:tribe29:checkmk:2.0.0:-:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:p10:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:p4:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:b5:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:p17:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:b6:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:p15:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:i1:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:p16:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:p14:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:p9:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:p3:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:p5:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:p7:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:p6:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:p13:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:p2:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:p1:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:b7:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:b1:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:b4:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:b3:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:p12:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:p11:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:p8:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:b8:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:b2:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:b4:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:-:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:p9:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:b3:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:p7:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:b8:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:p10:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:p15:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:b1:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:i1:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:p16:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:b5:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:p5:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:b6:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:p8:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:p13:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:p14:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:p3:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:b7:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:p2:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:p1:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:p17:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:b2:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:p12:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:p6:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:p4:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:p11:*:*:*:*:*:*
First Time Checkmk checkmk
Checkmk

07 Nov 2023, 03:38

Type Values Removed Values Added
Summary ** DISPUTED ** The web management console of CheckMK Enterprise Edition (versions 1.5.0 to 2.0.0p9) does not properly sanitise the uploading of ".mkp" files, which are Extension Packages, making remote code execution possible. Successful exploitation requires access to the web management interface, either with valid credentials or with a hijacked session of a user with administrator role. NOTE: the vendor states that this is the intended behavior: admins are supposed to be able to execute code in this manner. The web management console of CheckMK Enterprise Edition (versions 1.5.0 to 2.0.0p9) does not properly sanitise the uploading of ".mkp" files, which are Extension Packages, making remote code execution possible. Successful exploitation requires access to the web management interface, either with valid credentials or with a hijacked session of a user with administrator role. NOTE: the vendor states that this is the intended behavior: admins are supposed to be able to execute code in this manner

Information

Published : 2022-03-25 23:15

Updated : 2024-11-21 06:25


NVD link : CVE-2021-40905

Mitre link : CVE-2021-40905

CVE.ORG link : CVE-2021-40905


JSON object : View

Products Affected

tribe29

  • checkmk

checkmk

  • checkmk
CWE
CWE-434

Unrestricted Upload of File with Dangerous Type