CVE-2022-48319

Sensitive host secret disclosed in cmk-update-agent.log file in Tribe29's Checkmk <= 2.1.0p13, Checkmk <= 2.0.0p29, and all versions of Checkmk 1.6.0 (EOL) allows an attacker to gain access to the host secret through the unprotected agent updater log file.
References
Link Resource
https://checkmk.com/werk/14916 Mitigation Vendor Advisory
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

OR cpe:2.3:a:tribe29:checkmk:2.1.0:b2:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.1.0:b3:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.1.0:b4:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.1.0:b5:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.1.0:b6:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.1.0:b7:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.1.0:b8:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.1.0:b9:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.1.0:b1:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.1.0:p1:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.1.0:p2:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.1.0:p3:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.1.0:p4:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.1.0:p5:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.1.0:p6:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.1.0:p7:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.1.0:p8:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.1.0:p9:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.1.0:p10:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.1.0:p11:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.1.0:p12:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.1.0:p13:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.1.0:-:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:tribe29:checkmk:2.0.0:p19:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:-:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:b1:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:b2:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:b3:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:b4:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:b5:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:b6:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:b7:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:b8:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:i1:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:p1:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:p10:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:p11:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:p12:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:p13:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:p14:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:p15:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:p16:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:p17:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:p18:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:p2:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:p3:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:p4:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:p5:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:p6:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:p7:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:p9:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:p8:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:p21:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:p22:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:p23:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:p24:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:p20:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:p25:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:p26:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:p27:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:p28:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:2.0.0:p29:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:a:tribe29:checkmk:1.6.0:p5:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:p6:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:p7:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:p8:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:p9:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:p10:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:p11:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:p12:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:p13:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:p14:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:p15:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:p16:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:-:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:p4:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:p3:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:p2:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:p1:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:p17:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:p18:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:b1:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:b10:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:b12:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:b3:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:b4:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:b5:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:b9:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:p19:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:p20:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:p21:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:p22:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:p23:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:p24:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:p25:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:p26:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:p27:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:p28:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:p29:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:b2:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:b6:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:b7:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:b8:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:b11:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:p30:*:*:*:*:*:*

Information

Published : 2023-02-20 09:15

Updated : 2023-03-03 09:48


NVD link : CVE-2022-48319

Mitre link : CVE-2022-48319


JSON object : View

CWE
CWE-532

Insertion of Sensitive Information into Log File

Advertisement

dedicated server usa

Products Affected

tribe29

  • checkmk