CVE-2023-23548 – XSS in business intelligence
https://notcve.org/view.php?id=CVE-2023-23548
Reflected XSS in business intelligence in Checkmk <2.2.0p8, <2.1.0p32, <2.0.0p38, <=1.6.0p30. • https://checkmk.com/werk/15691 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) •
CVE-2023-22348 – Reading host_configs does not honour contact groups
https://notcve.org/view.php?id=CVE-2023-22348
Improper Authorization in RestAPI in Checkmk GmbH's Checkmk versions <2.1.0p28 and <2.2.0b8 allows remote authenticated users to read arbitrary host_configs. • https://checkmk.com/werk/13982 • CWE-285: Improper Authorization •
CVE-2023-31208 – Livestatus command injection in RestAPI
https://notcve.org/view.php?id=CVE-2023-31208
Improper neutralization of livestatus command delimiters in the RestAPI in Checkmk < 2.0.0p36, < 2.1.0p28, and < 2.2.0b8 (beta) allows arbitrary livestatus command execution for authorized users. • https://checkmk.com/werk/15191 • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') CWE-140: Improper Neutralization of Delimiters •
CVE-2023-31207 – Automation user secret logged to Apache access log
https://notcve.org/view.php?id=CVE-2023-31207
Transmission of credentials within query parameters in Checkmk <= 2.1.0p26, <= 2.0.0p35, and <= 2.2.0b6 (beta) may cause the automation user's secret to be written to the site Apache access log. • https://checkmk.com/werk/15189 • CWE-532: Insertion of Sensitive Information into Log File •
CVE-2022-46302 – Remote Code Execution with Root Privileges via Broad Apache Permissions
https://notcve.org/view.php?id=CVE-2022-46302
Broad access controls could allow site users to directly interact with the system Apache installation when providing the reverse proxy configurations for Tribe29's Checkmk <= 2.1.0p6, Checkmk <= 2.0.0p27, and all versions of Checkmk 1.6.0 (EOL) allowing an attacker to perform remote code execution with root privileges on the underlying host. • https://checkmk.com/werk/14281 • CWE-829: Inclusion of Functionality from Untrusted Control Sphere •