Vulnerabilites related to Tribe29 - Checkmk Appliance
CVE-2023-22318 (GCVE-0-2023-22318)
Vulnerability from cvelistv5
Published
2023-05-15 08:34
Modified
2025-01-23 19:19
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-412 - Unrestricted Externally Accessible Lock
Summary
Denial of service in Webconf in Tribe29 Checkmk Appliance before 1.6.5.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Tribe29 | Checkmk Appliance |
Version: 0 ≤ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T10:07:06.219Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://checkmk.com/werk/9526" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-22318", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-01-23T19:18:05.392756Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-01-23T19:19:35.769Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Checkmk Appliance", "vendor": "Tribe29", "versions": [ { "lessThan": "1.6.5", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "Denial of service in Webconf in Tribe29 Checkmk Appliance before 1.6.5." } ], "impacts": [ { "capecId": "CAPEC-469", "descriptions": [ { "lang": "en", "value": "CAPEC-469: HTTP DoS" } ] } ], "metrics": [ { "cvssV3_1": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-412", "description": "CWE-412: Unrestricted Externally Accessible Lock", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-15T08:34:43.641Z", "orgId": "f7d6281c-4801-44ce-ace2-493291dedb0f", "shortName": "Tribe29" }, "references": [ { "url": "https://checkmk.com/werk/9526" } ], "title": "Denial of service against webconf" } }, "cveMetadata": { "assignerOrgId": "f7d6281c-4801-44ce-ace2-493291dedb0f", "assignerShortName": "Tribe29", "cveId": "CVE-2023-22318", "datePublished": "2023-05-15T08:34:43.641Z", "dateReserved": "2023-01-18T15:32:06.483Z", "dateUpdated": "2025-01-23T19:19:35.769Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-22307 (GCVE-0-2023-22307)
Vulnerability from cvelistv5
Published
2023-04-18 18:57
Modified
2025-02-05 21:21
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
Sensitive data exposure in Webconf in Tribe29 Checkmk Appliance before 1.6.4 allows local attacker to retrieve passwords via reading log files.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Tribe29 | Checkmk Appliance |
Version: 0 ≤ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T10:07:05.998Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://checkmk.com/werk/9522" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-22307", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-02-05T21:20:52.188590Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-02-05T21:21:07.125Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Checkmk Appliance", "vendor": "Tribe29", "versions": [ { "lessThan": "1.6.4", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "Sensitive data exposure in Webconf in Tribe29 Checkmk Appliance before 1.6.4 allows local attacker to retrieve passwords via reading log files." } ], "impacts": [ { "capecId": "CAPEC-37", "descriptions": [ { "lang": "en", "value": "CAPEC-37 Retrieve Embedded Sensitive Data" } ] } ], "metrics": [ { "cvssV3_1": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-200", "description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-598", "description": "CWE-598: Use of GET Request Method With Sensitive Query Strings", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-04-18T18:57:53.574Z", "orgId": "f7d6281c-4801-44ce-ace2-493291dedb0f", "shortName": "Tribe29" }, "references": [ { "url": "https://checkmk.com/werk/9522" } ], "title": "Site-Passwords in GET parameters" } }, "cveMetadata": { "assignerOrgId": "f7d6281c-4801-44ce-ace2-493291dedb0f", "assignerShortName": "Tribe29", "cveId": "CVE-2023-22307", "datePublished": "2023-04-18T18:57:53.574Z", "dateReserved": "2023-01-18T15:32:06.435Z", "dateUpdated": "2025-02-05T21:21:07.125Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-22294 (GCVE-0-2023-22294)
Vulnerability from cvelistv5
Published
2023-04-18 18:59
Modified
2025-02-05 21:22
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-732 - Incorrect Permission Assignment for Critical Resource
Summary
Privilege escalation in Tribe29 Checkmk Appliance before 1.6.4 allows authenticated site users to escalate privileges via incorrectly set permissions.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Tribe29 | Checkmk Appliance |
Version: 0 ≤ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T10:07:06.102Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://checkmk.com/werk/9520" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-22294", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-02-05T21:22:12.909789Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-02-05T21:22:34.383Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Checkmk Appliance", "vendor": "Tribe29", "versions": [ { "lessThan": "1.6.4", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "Privilege escalation in Tribe29 Checkmk Appliance before 1.6.4 allows authenticated site users to escalate privileges via incorrectly set permissions." } ], "impacts": [ { "capecId": "CAPEC-233", "descriptions": [ { "lang": "en", "value": "CAPEC-233 Privilege Escalation" } ] } ], "metrics": [ { "cvssV3_1": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-732", "description": "CWE-732: Incorrect Permission Assignment for Critical Resource", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-04-18T18:59:33.380Z", "orgId": "f7d6281c-4801-44ce-ace2-493291dedb0f", "shortName": "Tribe29" }, "references": [ { "url": "https://checkmk.com/werk/9520" } ], "title": "Privilege escalation in Checkmk Appliance" } }, "cveMetadata": { "assignerOrgId": "f7d6281c-4801-44ce-ace2-493291dedb0f", "assignerShortName": "Tribe29", "cveId": "CVE-2023-22294", "datePublished": "2023-04-18T18:59:33.380Z", "dateReserved": "2023-01-18T15:32:06.452Z", "dateUpdated": "2025-02-05T21:22:34.383Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-22309 (GCVE-0-2023-22309)
Vulnerability from cvelistv5
Published
2023-04-20 13:05
Modified
2025-02-04 21:43
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-80 - Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)
Summary
Reflective Cross-Site-Scripting in Webconf in Tribe29 Checkmk Appliance before 1.6.4.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Tribe29 | Checkmk Appliance |
Version: 0 ≤ |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T10:07:06.322Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://checkmk.com/werk/9523" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-22309", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-02-04T21:43:34.690088Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-02-04T21:43:45.579Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Checkmk Appliance", "vendor": "Tribe29", "versions": [ { "lessThan": "1.6.4", "status": "affected", "version": "0", "versionType": "semver" } ] } ], "descriptions": [ { "lang": "en", "value": "Reflective Cross-Site-Scripting in Webconf in Tribe29 Checkmk Appliance before 1.6.4." } ], "impacts": [ { "capecId": "CAPEC-32", "descriptions": [ { "lang": "en", "value": "CAPEC-32: XSS Through HTTP Query Strings" } ] } ], "metrics": [ { "cvssV3_1": { "baseScore": 6.1, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-80", "description": "CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-04-20T13:05:27.510Z", "orgId": "f7d6281c-4801-44ce-ace2-493291dedb0f", "shortName": "Tribe29" }, "references": [ { "url": "https://checkmk.com/werk/9523" } ], "title": "Reflected Cross Site Scripting (XSS)" } }, "cveMetadata": { "assignerOrgId": "f7d6281c-4801-44ce-ace2-493291dedb0f", "assignerShortName": "Tribe29", "cveId": "CVE-2023-22309", "datePublished": "2023-04-20T13:05:27.510Z", "dateReserved": "2023-01-18T15:32:06.467Z", "dateUpdated": "2025-02-04T21:43:45.579Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }