CVE-2021-40905

** DISPUTED ** The web management console of CheckMK Enterprise Edition (versions 1.5.0 to 2.0.0p9) does not properly sanitise the uploading of ".mkp" files, which are Extension Packages, making remote code execution possible. Successful exploitation requires access to the web management interface, either with valid credentials or with a hijacked session of a user with administrator role. NOTE: the vendor states that this is the intended behavior: admins are supposed to be able to execute code in this manner.
References
Link Resource
http://checkmk.com Product
https://github.com/Edgarloyola/CVE-2021-40905 Exploit Third Party Advisory
http://checkmk.com Product
https://github.com/Edgarloyola/CVE-2021-40905 Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:checkmk:checkmk:2.0.0:-:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:b1:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:b2:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:b3:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:b4:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:b5:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:b6:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:b7:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:b8:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:i1:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:p1:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:p10:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:p11:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:p12:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:p13:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:p14:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:p15:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:p16:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:p17:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:p2:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:p3:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:p4:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:p5:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:p6:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:p7:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:p8:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:p9:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:25

Type Values Removed Values Added
References () http://checkmk.com - Product () http://checkmk.com - Product
References () https://github.com/Edgarloyola/CVE-2021-40905 - Exploit, Third Party Advisory () https://github.com/Edgarloyola/CVE-2021-40905 - Exploit, Third Party Advisory

23 Jul 2024, 19:37

Type Values Removed Values Added
First Time Checkmk checkmk
Checkmk
CPE cpe:2.3:a:tribe29:checkmk:2.0.0:-:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:p4:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:p2:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:b1:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:p3:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:b7:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:p8:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:p13:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:p6:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:b3:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:b5:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:b4:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:p14:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:p7:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:p15:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:b2:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:p5:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:p10:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:p9:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:p12:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:i1:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:b8:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:p17:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:p11:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:p16:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:p1:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:b6:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:p13:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:p14:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:p16:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:-:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:p11:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:p2:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:b7:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:b2:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:b4:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:p6:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:p8:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:b5:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:b8:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:b3:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:b1:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:p12:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:p3:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:p5:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:b6:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:p9:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:p10:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:p7:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:p17:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:p15:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:p1:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:p4:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:2.0.0:i1:*:*:*:*:*:*

30 Aug 2022, 14:15

Type Values Removed Values Added
Summary The web management console of CheckMK Enterprise Edition (versions 1.5.0 to 2.0.0p9) does not properly sanitise the uploading of ".mkp" files, which are Extension Packages, making remote code execution possible. Successful exploitation requires access to the web management interface, either with valid credentials or with a hijacked session of a user with administrator role. ** DISPUTED ** The web management console of CheckMK Enterprise Edition (versions 1.5.0 to 2.0.0p9) does not properly sanitise the uploading of ".mkp" files, which are Extension Packages, making remote code execution possible. Successful exploitation requires access to the web management interface, either with valid credentials or with a hijacked session of a user with administrator role. NOTE: the vendor states that this is the intended behavior: admins are supposed to be able to execute code in this manner.

04 Apr 2022, 15:49

Type Values Removed Values Added
CPE cpe:2.3:a:tribe29:checkmk:2.0.0:b5:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:p7:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:p10:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:p15:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:b2:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:b1:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:*:*:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:-:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:b6:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:p9:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:p3:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:p2:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:i1:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:p12:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:p8:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:p1:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:p13:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:p17:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:b3:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:b4:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:p11:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:p16:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:b8:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:p6:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:p5:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:p4:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:p14:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:b7:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : 6.8
v3 : 8.8
References (MISC) http://checkmk.com - (MISC) http://checkmk.com - Product
References (MISC) https://github.com/Edgarloyola/CVE-2021-40905 - (MISC) https://github.com/Edgarloyola/CVE-2021-40905 - Exploit, Third Party Advisory
CWE CWE-434

25 Mar 2022, 23:37

Type Values Removed Values Added
New CVE

Information

Published : 2022-03-25 23:15

Updated : 2024-11-21 06:25


NVD link : CVE-2021-40905

Mitre link : CVE-2021-40905

CVE.ORG link : CVE-2021-40905


JSON object : View

Products Affected

checkmk

  • checkmk

tribe29

  • checkmk
CWE
CWE-434

Unrestricted Upload of File with Dangerous Type