CVE-2022-46303

Command injection in SMS notifications in Tribe29 Checkmk <= 2.1.0p10, Checkmk <= 2.0.0p27, and Checkmk <= 1.6.0p29 allows an attacker with User Management permissions, as well as LDAP administrators in certain scenarios, to perform arbitrary commands within the context of the application's local permissions.
References
Link Resource
https://checkmk.com/werk/14381 Mitigation Vendor Advisory
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

OR cpe:2.3:a:tribe29:checkmk:2.1.0:b2:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.1.0:b3:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.1.0:b4:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.1.0:b5:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.1.0:b6:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.1.0:b7:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.1.0:b8:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.1.0:b9:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.1.0:b1:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.1.0:p1:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.1.0:p2:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.1.0:p3:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.1.0:p4:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.1.0:p5:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.1.0:p6:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.1.0:p7:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.1.0:p8:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.1.0:p9:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.1.0:p10:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.1.0:-:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:tribe29:checkmk:2.0.0:p19:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:-:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:b1:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:b2:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:b3:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:b4:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:b5:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:b6:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:b7:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:b8:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:i1:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:p1:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:p10:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:p11:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:p12:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:p13:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:p14:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:p15:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:p16:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:p17:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:p18:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:p2:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:p3:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:p4:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:p5:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:p6:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:p7:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:p9:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:p8:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:p21:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:p22:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:p23:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:p24:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:p20:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:p25:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:p26:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:p27:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:a:tribe29:checkmk:1.6.0:p5:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:p6:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:p7:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:p8:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:p9:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:p10:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:p11:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:p12:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:p13:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:p14:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:p15:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:p16:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:-:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:p4:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:p3:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:p2:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:p1:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:p17:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:p18:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:b1:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:b10:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:b12:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:b3:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:b4:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:b5:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:b9:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:p19:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:p20:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:p21:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:p22:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:p23:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:p24:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:p25:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:p26:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:p27:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:p28:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:p29:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:b2:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:b6:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:b7:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:b8:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:b11:*:*:*:*:*:*

Information

Published : 2023-02-20 09:15

Updated : 2023-03-06 07:31


NVD link : CVE-2022-46303

Mitre link : CVE-2022-46303


JSON object : View

CWE
CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')

Advertisement

dedicated server usa

Products Affected

tribe29

  • checkmk