gsd-2022-48321
Vulnerability from gsd
Modified
2023-12-13 01:19
Details
Limited Server-Side Request Forgery (SSRF) in agent-receiver in Tribe29's Checkmk <= 2.1.0p11 allows an attacker to communicate with local network restricted endpoints by use of the host registration API.
Aliases
Aliases



{
  "GSD": {
    "alias": "CVE-2022-48321",
    "description": "Limited Server-Side Request Forgery (SSRF) in agent-receiver in Tribe29\u0027s Checkmk \u003c= 2.1.0p11 allows an attacker to communicate with local network restricted endpoints by use of the host registration API.",
    "id": "GSD-2022-48321"
  },
  "gsd": {
    "metadata": {
      "exploitCode": "unknown",
      "remediation": "unknown",
      "reportConfidence": "confirmed",
      "type": "vulnerability"
    },
    "osvSchema": {
      "aliases": [
        "CVE-2022-48321"
      ],
      "details": "Limited Server-Side Request Forgery (SSRF) in agent-receiver in Tribe29\u0027s Checkmk \u003c= 2.1.0p11 allows an attacker to communicate with local network restricted endpoints by use of the host registration API.",
      "id": "GSD-2022-48321",
      "modified": "2023-12-13T01:19:25.986058Z",
      "schema_version": "1.4.0"
    }
  },
  "namespaces": {
    "cve.org": {
      "CVE_data_meta": {
        "ASSIGNER": "security@checkmk.com",
        "ID": "CVE-2022-48321",
        "STATE": "PUBLIC"
      },
      "affects": {
        "vendor": {
          "vendor_data": [
            {
              "product": {
                "product_data": [
                  {
                    "product_name": "Checkmk",
                    "version": {
                      "version_data": [
                        {
                          "version_affected": "\u003c=",
                          "version_name": "2.1.0",
                          "version_value": "2.1.0p11"
                        }
                      ]
                    }
                  }
                ]
              },
              "vendor_name": "Tribe29"
            }
          ]
        }
      },
      "credits": [
        {
          "lang": "en",
          "value": "Stefan Schiller (SonarSource)"
        }
      ],
      "data_format": "MITRE",
      "data_type": "CVE",
      "data_version": "4.0",
      "description": {
        "description_data": [
          {
            "lang": "eng",
            "value": "Limited Server-Side Request Forgery (SSRF) in agent-receiver in Tribe29\u0027s Checkmk \u003c= 2.1.0p11 allows an attacker to communicate with local network restricted endpoints by use of the host registration API."
          }
        ]
      },
      "impact": {
        "cvss": [
          {
            "baseScore": 6.8,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L",
            "version": "3.1"
          }
        ]
      },
      "problemtype": {
        "problemtype_data": [
          {
            "description": [
              {
                "cweId": "CWE-20",
                "lang": "eng",
                "value": "CWE-20 Improper Input Validation"
              }
            ]
          }
        ]
      },
      "references": {
        "reference_data": [
          {
            "name": "https://checkmk.com/werk/14385",
            "refsource": "MISC",
            "url": "https://checkmk.com/werk/14385"
          },
          {
            "name": "https://www.sonarsource.com/blog/checkmk-rce-chain-1/",
            "refsource": "MISC",
            "url": "https://www.sonarsource.com/blog/checkmk-rce-chain-1/"
          }
        ]
      }
    },
    "nvd.nist.gov": {
      "cve": {
        "configurations": [
          {
            "nodes": [
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:a:tribe29:checkmk:2.1.0:-:*:*:*:*:*:*",
                    "matchCriteriaId": "BC0AC5A2-3724-4942-ABE2-CA9F3B9B4BDA",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:tribe29:checkmk:2.1.0:b1:*:*:*:*:*:*",
                    "matchCriteriaId": "E3AAC1AD-C2F5-4171-BD92-95A8BA09E79A",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:tribe29:checkmk:2.1.0:b2:*:*:*:*:*:*",
                    "matchCriteriaId": "8CB8C4BB-4AE6-4EA2-8F38-780B627721ED",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:tribe29:checkmk:2.1.0:b3:*:*:*:*:*:*",
                    "matchCriteriaId": "D0F14106-2A3D-4FC7-A0C7-6EDA75D1A8F7",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:tribe29:checkmk:2.1.0:b4:*:*:*:*:*:*",
                    "matchCriteriaId": "F8C2DA36-8419-4846-BFA0-A729BE7D72C5",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:tribe29:checkmk:2.1.0:b5:*:*:*:*:*:*",
                    "matchCriteriaId": "8AA4FA3D-7A59-4597-9D79-B6B020D86BD1",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:tribe29:checkmk:2.1.0:b6:*:*:*:*:*:*",
                    "matchCriteriaId": "79F0CF88-FF11-4741-AFF6-9F88F57C2140",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:tribe29:checkmk:2.1.0:b7:*:*:*:*:*:*",
                    "matchCriteriaId": "8E93629E-C0CB-4636-B343-1C0646D8228E",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:tribe29:checkmk:2.1.0:b8:*:*:*:*:*:*",
                    "matchCriteriaId": "58102464-E66F-49CD-8952-3F3F9A6A45CC",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:tribe29:checkmk:2.1.0:b9:*:*:*:*:*:*",
                    "matchCriteriaId": "9C98E509-8466-4F95-ABE7-7ECC91640E04",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:tribe29:checkmk:2.1.0:p1:*:*:*:*:*:*",
                    "matchCriteriaId": "A7B89F71-ABD2-4B2D-AE6B-C0F243E89443",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:tribe29:checkmk:2.1.0:p10:*:*:*:*:*:*",
                    "matchCriteriaId": "002EF417-C702-42E2-9C8F-C9593B43AB03",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:tribe29:checkmk:2.1.0:p11:*:*:*:*:*:*",
                    "matchCriteriaId": "B8E358A9-0430-4EF1-8557-7F1C088FFF48",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:tribe29:checkmk:2.1.0:p2:*:*:*:*:*:*",
                    "matchCriteriaId": "960DF373-EDE6-4318-B6E9-07573ED5907A",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:tribe29:checkmk:2.1.0:p3:*:*:*:*:*:*",
                    "matchCriteriaId": "3144AABF-74CB-44EE-A618-8529A8ACFCF6",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:tribe29:checkmk:2.1.0:p4:*:*:*:*:*:*",
                    "matchCriteriaId": "88AC7AB0-40DF-44D1-83EA-FDD4D5346BBD",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:tribe29:checkmk:2.1.0:p5:*:*:*:*:*:*",
                    "matchCriteriaId": "4285A4A3-3DED-456D-93D4-1B9FDB42C1EB",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:tribe29:checkmk:2.1.0:p6:*:*:*:*:*:*",
                    "matchCriteriaId": "098FD286-B6CB-4428-9A62-A5F24B4D9E92",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:tribe29:checkmk:2.1.0:p7:*:*:*:*:*:*",
                    "matchCriteriaId": "8400088B-E56E-4D0B-86D5-76D884C8031A",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:tribe29:checkmk:2.1.0:p8:*:*:*:*:*:*",
                    "matchCriteriaId": "29554684-FEFF-42B2-B62E-6523782F537C",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:a:tribe29:checkmk:2.1.0:p9:*:*:*:*:*:*",
                    "matchCriteriaId": "91AE66E4-AE6B-4F25-9312-6418FC3E221F",
                    "vulnerable": true
                  }
                ],
                "negate": false,
                "operator": "OR"
              }
            ]
          }
        ],
        "descriptions": [
          {
            "lang": "en",
            "value": "Limited Server-Side Request Forgery (SSRF) in agent-receiver in Tribe29\u0027s Checkmk \u003c= 2.1.0p11 allows an attacker to communicate with local network restricted endpoints by use of the host registration API."
          }
        ],
        "id": "CVE-2022-48321",
        "lastModified": "2024-01-09T02:10:28.540",
        "metrics": {
          "cvssMetricV31": [
            {
              "cvssData": {
                "attackComplexity": "LOW",
                "attackVector": "LOCAL",
                "availabilityImpact": "NONE",
                "baseScore": 3.3,
                "baseSeverity": "LOW",
                "confidentialityImpact": "LOW",
                "integrityImpact": "NONE",
                "privilegesRequired": "LOW",
                "scope": "UNCHANGED",
                "userInteraction": "NONE",
                "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
                "version": "3.1"
              },
              "exploitabilityScore": 1.8,
              "impactScore": 1.4,
              "source": "nvd@nist.gov",
              "type": "Primary"
            },
            {
              "cvssData": {
                "attackComplexity": "LOW",
                "attackVector": "LOCAL",
                "availabilityImpact": "LOW",
                "baseScore": 6.8,
                "baseSeverity": "MEDIUM",
                "confidentialityImpact": "LOW",
                "integrityImpact": "LOW",
                "privilegesRequired": "NONE",
                "scope": "CHANGED",
                "userInteraction": "NONE",
                "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L",
                "version": "3.1"
              },
              "exploitabilityScore": 2.5,
              "impactScore": 3.7,
              "source": "security@checkmk.com",
              "type": "Secondary"
            }
          ]
        },
        "published": "2023-02-20T17:15:12.607",
        "references": [
          {
            "source": "security@checkmk.com",
            "tags": [
              "Mitigation",
              "Vendor Advisory"
            ],
            "url": "https://checkmk.com/werk/14385"
          },
          {
            "source": "security@checkmk.com",
            "tags": [
              "Exploit",
              "Third Party Advisory"
            ],
            "url": "https://www.sonarsource.com/blog/checkmk-rce-chain-1/"
          }
        ],
        "sourceIdentifier": "security@checkmk.com",
        "vulnStatus": "Analyzed",
        "weaknesses": [
          {
            "description": [
              {
                "lang": "en",
                "value": "CWE-918"
              }
            ],
            "source": "nvd@nist.gov",
            "type": "Primary"
          },
          {
            "description": [
              {
                "lang": "en",
                "value": "CWE-20"
              }
            ],
            "source": "security@checkmk.com",
            "type": "Secondary"
          }
        ]
      }
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…