Expired sessions were not securely terminated in the RestAPI for Tribe29's Checkmk <= 2.1.0p10 and Checkmk <= 2.0.0p28 allowing an attacker to use expired session tokens when communicating with the RestAPI.
References
Link | Resource |
---|---|
https://checkmk.com/werk/14485 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Information
Published : 2023-02-20 09:15
Updated : 2023-03-06 11:26
NVD link : CVE-2022-48317
Mitre link : CVE-2022-48317
JSON object : View
CWE
CWE-613
Insufficient Session Expiration
Products Affected
tribe29
- checkmk