CVE-2023-22348

Improper Authorization in RestAPI in Checkmk GmbH's Checkmk versions <2.1.0p28 and <2.2.0b8 allows remote authenticated users to read arbitrary host_configs.
References
Link Resource
https://checkmk.com/werk/13982 Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:tribe29:checkmk:*:*:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.1.0:-:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.1.0:b1:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.1.0:b2:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.1.0:b3:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.1.0:b4:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.1.0:b5:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.1.0:b6:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.1.0:b7:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.1.0:b8:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.1.0:b9:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.1.0:p1:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.1.0:p10:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.1.0:p11:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.1.0:p12:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.1.0:p13:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.1.0:p14:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.1.0:p15:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.1.0:p16:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.1.0:p17:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.1.0:p18:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.1.0:p19:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.1.0:p2:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.1.0:p20:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.1.0:p21:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.1.0:p22:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.1.0:p23:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.1.0:p24:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.1.0:p25:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.1.0:p26:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.1.0:p27:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.1.0:p3:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.1.0:p4:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.1.0:p5:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.1.0:p6:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.1.0:p7:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.1.0:p8:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.1.0:p9:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.2.0:b1:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.2.0:b2:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.2.0:b3:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.2.0:b4:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.2.0:b5:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.2.0:b6:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.2.0:b7:*:*:*:*:*:*

History

25 May 2023, 17:35

Type Values Removed Values Added
References (MISC) https://checkmk.com/werk/13982 - (MISC) https://checkmk.com/werk/13982 - Vendor Advisory
CWE NVD-CWE-Other
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 4.3
CPE cpe:2.3:a:tribe29:checkmk:2.1.0:b5:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.1.0:p24:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.2.0:b6:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.1.0:p27:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.1.0:p5:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.1.0:p19:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.1.0:b4:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.2.0:b7:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.2.0:b1:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.1.0:p9:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.1.0:p23:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.1.0:p14:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.2.0:b3:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.1.0:p3:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.1.0:b7:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.1.0:p16:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.1.0:p21:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.2.0:b5:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.1.0:p6:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.1.0:p22:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.2.0:b4:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.1.0:b1:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.1.0:p11:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:*:*:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.1.0:p7:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.1.0:p1:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.1.0:p15:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.1.0:p2:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.1.0:p12:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.1.0:p26:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.1.0:b9:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.1.0:-:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.1.0:b6:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.1.0:p25:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.2.0:b2:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.1.0:b3:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.1.0:p13:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.1.0:p10:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.1.0:p17:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.1.0:p20:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.1.0:b2:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.1.0:b8:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.1.0:p4:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.1.0:p18:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.1.0:p8:*:*:*:*:*:*

17 May 2023, 17:00

Type Values Removed Values Added
New CVE

Information

Published : 2023-05-17 16:15

Updated : 2024-02-04 23:37


NVD link : CVE-2023-22348

Mitre link : CVE-2023-22348

CVE.ORG link : CVE-2023-22348


JSON object : View

Products Affected

tribe29

  • checkmk
CWE
NVD-CWE-Other CWE-285

Improper Authorization