CVE-2023-31210

Usage of user controlled LD_LIBRARY_PATH in agent in Checkmk 2.2.0p10 up to 2.2.0p16 allows malicious Checkmk site user to escalate rights via injection of malicious libraries
References
Link Resource
https://checkmk.com/werk/16226 Vendor Advisory
https://checkmk.com/werk/16226 Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:checkmk:checkmk:2.2.0:p10:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p11:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p12:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p13:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p14:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p15:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p16:*:*:*:*:*:*

History

21 Nov 2024, 08:01

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 7.8
v2 : unknown
v3 : 8.8
References () https://checkmk.com/werk/16226 - Vendor Advisory () https://checkmk.com/werk/16226 - Vendor Advisory

23 Jul 2024, 19:37

Type Values Removed Values Added
First Time Checkmk checkmk
Checkmk
CPE cpe:2.3:a:tribe29:checkmk:2.2.0:p14:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.2.0:p11:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.2.0:p13:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.2.0:p10:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.2.0:p16:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.2.0:p15:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.2.0:p12:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p11:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p16:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p14:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p13:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p15:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p10:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.2.0:p12:*:*:*:*:*:*

18 Dec 2023, 17:31

Type Values Removed Values Added
New CVE

Information

Published : 2023-12-13 09:15

Updated : 2024-11-21 08:01


NVD link : CVE-2023-31210

Mitre link : CVE-2023-31210

CVE.ORG link : CVE-2023-31210


JSON object : View

Products Affected

checkmk

  • checkmk
CWE
CWE-427

Uncontrolled Search Path Element