Broad access controls could allow site users to directly interact with the system Apache installation when providing the reverse proxy configurations for Tribe29s Checkmk <= 2.1.0p6, Checkmk <= 2.0.0p27, and all versions of Checkmk 1.6.0 (EOL) allowing an attacker to perform remote code execution with root privileges on the underlying host.
The product imports, requires, or includes executable functionality (such as a library) from a source that is outside of the intended control sphere.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Checkmk | Tribe29 | 1.6.0 (including) | 1.6.0 (including) |
Checkmk | Tribe29 | 1.6.0-b1 (including) | 1.6.0-b1 (including) |
Checkmk | Tribe29 | 1.6.0-b10 (including) | 1.6.0-b10 (including) |
Checkmk | Tribe29 | 1.6.0-b11 (including) | 1.6.0-b11 (including) |
Checkmk | Tribe29 | 1.6.0-b12 (including) | 1.6.0-b12 (including) |
Checkmk | Tribe29 | 1.6.0-b2 (including) | 1.6.0-b2 (including) |
Checkmk | Tribe29 | 1.6.0-b3 (including) | 1.6.0-b3 (including) |
Checkmk | Tribe29 | 1.6.0-b4 (including) | 1.6.0-b4 (including) |
Checkmk | Tribe29 | 1.6.0-b5 (including) | 1.6.0-b5 (including) |
Checkmk | Tribe29 | 1.6.0-b6 (including) | 1.6.0-b6 (including) |
Checkmk | Tribe29 | 1.6.0-b7 (including) | 1.6.0-b7 (including) |
Checkmk | Tribe29 | 1.6.0-b8 (including) | 1.6.0-b8 (including) |
Checkmk | Tribe29 | 1.6.0-b9 (including) | 1.6.0-b9 (including) |
Checkmk | Tribe29 | 1.6.0-p1 (including) | 1.6.0-p1 (including) |
Checkmk | Tribe29 | 1.6.0-p10 (including) | 1.6.0-p10 (including) |
Checkmk | Tribe29 | 1.6.0-p11 (including) | 1.6.0-p11 (including) |
Checkmk | Tribe29 | 1.6.0-p12 (including) | 1.6.0-p12 (including) |
Checkmk | Tribe29 | 1.6.0-p13 (including) | 1.6.0-p13 (including) |
Checkmk | Tribe29 | 1.6.0-p14 (including) | 1.6.0-p14 (including) |
Checkmk | Tribe29 | 1.6.0-p15 (including) | 1.6.0-p15 (including) |
Checkmk | Tribe29 | 1.6.0-p16 (including) | 1.6.0-p16 (including) |
Checkmk | Tribe29 | 1.6.0-p17 (including) | 1.6.0-p17 (including) |
Checkmk | Tribe29 | 1.6.0-p18 (including) | 1.6.0-p18 (including) |
Checkmk | Tribe29 | 1.6.0-p19 (including) | 1.6.0-p19 (including) |
Checkmk | Tribe29 | 1.6.0-p2 (including) | 1.6.0-p2 (including) |
Checkmk | Tribe29 | 1.6.0-p20 (including) | 1.6.0-p20 (including) |
Checkmk | Tribe29 | 1.6.0-p21 (including) | 1.6.0-p21 (including) |
Checkmk | Tribe29 | 1.6.0-p22 (including) | 1.6.0-p22 (including) |
Checkmk | Tribe29 | 1.6.0-p23 (including) | 1.6.0-p23 (including) |
Checkmk | Tribe29 | 1.6.0-p24 (including) | 1.6.0-p24 (including) |
Checkmk | Tribe29 | 1.6.0-p25 (including) | 1.6.0-p25 (including) |
Checkmk | Tribe29 | 1.6.0-p26 (including) | 1.6.0-p26 (including) |
Checkmk | Tribe29 | 1.6.0-p27 (including) | 1.6.0-p27 (including) |
Checkmk | Tribe29 | 1.6.0-p28 (including) | 1.6.0-p28 (including) |
Checkmk | Tribe29 | 1.6.0-p29 (including) | 1.6.0-p29 (including) |
Checkmk | Tribe29 | 1.6.0-p30 (including) | 1.6.0-p30 (including) |
Checkmk | Tribe29 | 2.0.0 (including) | 2.0.0 (including) |
Checkmk | Tribe29 | 2.0.0-b1 (including) | 2.0.0-b1 (including) |
Checkmk | Tribe29 | 2.0.0-b2 (including) | 2.0.0-b2 (including) |
Checkmk | Tribe29 | 2.0.0-b3 (including) | 2.0.0-b3 (including) |
Checkmk | Tribe29 | 2.0.0-b4 (including) | 2.0.0-b4 (including) |
Checkmk | Tribe29 | 2.0.0-b5 (including) | 2.0.0-b5 (including) |
Checkmk | Tribe29 | 2.0.0-b6 (including) | 2.0.0-b6 (including) |
Checkmk | Tribe29 | 2.0.0-b7 (including) | 2.0.0-b7 (including) |
Checkmk | Tribe29 | 2.0.0-b8 (including) | 2.0.0-b8 (including) |
Checkmk | Tribe29 | 2.0.0-i1 (including) | 2.0.0-i1 (including) |
Checkmk | Tribe29 | 2.0.0-p1 (including) | 2.0.0-p1 (including) |
Checkmk | Tribe29 | 2.0.0-p10 (including) | 2.0.0-p10 (including) |
Checkmk | Tribe29 | 2.0.0-p11 (including) | 2.0.0-p11 (including) |
Checkmk | Tribe29 | 2.0.0-p12 (including) | 2.0.0-p12 (including) |
Checkmk | Tribe29 | 2.0.0-p13 (including) | 2.0.0-p13 (including) |
Checkmk | Tribe29 | 2.0.0-p14 (including) | 2.0.0-p14 (including) |
Checkmk | Tribe29 | 2.0.0-p15 (including) | 2.0.0-p15 (including) |
Checkmk | Tribe29 | 2.0.0-p16 (including) | 2.0.0-p16 (including) |
Checkmk | Tribe29 | 2.0.0-p17 (including) | 2.0.0-p17 (including) |
Checkmk | Tribe29 | 2.0.0-p18 (including) | 2.0.0-p18 (including) |
Checkmk | Tribe29 | 2.0.0-p19 (including) | 2.0.0-p19 (including) |
Checkmk | Tribe29 | 2.0.0-p2 (including) | 2.0.0-p2 (including) |
Checkmk | Tribe29 | 2.0.0-p20 (including) | 2.0.0-p20 (including) |
Checkmk | Tribe29 | 2.0.0-p21 (including) | 2.0.0-p21 (including) |
Checkmk | Tribe29 | 2.0.0-p22 (including) | 2.0.0-p22 (including) |
Checkmk | Tribe29 | 2.0.0-p23 (including) | 2.0.0-p23 (including) |
Checkmk | Tribe29 | 2.0.0-p24 (including) | 2.0.0-p24 (including) |
Checkmk | Tribe29 | 2.0.0-p25 (including) | 2.0.0-p25 (including) |
Checkmk | Tribe29 | 2.0.0-p26 (including) | 2.0.0-p26 (including) |
Checkmk | Tribe29 | 2.0.0-p27 (including) | 2.0.0-p27 (including) |
Checkmk | Tribe29 | 2.0.0-p3 (including) | 2.0.0-p3 (including) |
Checkmk | Tribe29 | 2.0.0-p4 (including) | 2.0.0-p4 (including) |
Checkmk | Tribe29 | 2.0.0-p5 (including) | 2.0.0-p5 (including) |
Checkmk | Tribe29 | 2.0.0-p6 (including) | 2.0.0-p6 (including) |
Checkmk | Tribe29 | 2.0.0-p7 (including) | 2.0.0-p7 (including) |
Checkmk | Tribe29 | 2.0.0-p8 (including) | 2.0.0-p8 (including) |
Checkmk | Tribe29 | 2.0.0-p9 (including) | 2.0.0-p9 (including) |
Checkmk | Tribe29 | 2.1.0 (including) | 2.1.0 (including) |
Checkmk | Tribe29 | 2.1.0-b1 (including) | 2.1.0-b1 (including) |
Checkmk | Tribe29 | 2.1.0-b2 (including) | 2.1.0-b2 (including) |
Checkmk | Tribe29 | 2.1.0-b3 (including) | 2.1.0-b3 (including) |
Checkmk | Tribe29 | 2.1.0-b4 (including) | 2.1.0-b4 (including) |
Checkmk | Tribe29 | 2.1.0-b5 (including) | 2.1.0-b5 (including) |
Checkmk | Tribe29 | 2.1.0-b6 (including) | 2.1.0-b6 (including) |
Checkmk | Tribe29 | 2.1.0-b7 (including) | 2.1.0-b7 (including) |
Checkmk | Tribe29 | 2.1.0-b8 (including) | 2.1.0-b8 (including) |
Checkmk | Tribe29 | 2.1.0-b9 (including) | 2.1.0-b9 (including) |
Checkmk | Tribe29 | 2.1.0-p1 (including) | 2.1.0-p1 (including) |
Checkmk | Tribe29 | 2.1.0-p2 (including) | 2.1.0-p2 (including) |
Checkmk | Tribe29 | 2.1.0-p3 (including) | 2.1.0-p3 (including) |
Checkmk | Tribe29 | 2.1.0-p4 (including) | 2.1.0-p4 (including) |
Checkmk | Tribe29 | 2.1.0-p5 (including) | 2.1.0-p5 (including) |
Checkmk | Tribe29 | 2.1.0-p6 (including) | 2.1.0-p6 (including) |
Check-mk | Ubuntu | bionic | * |
Check-mk | Ubuntu | trusty | * |
Check-mk | Ubuntu | xenial | * |
When including third-party functionality, such as a web widget, library, or other source of functionality, the product must effectively trust that functionality. Without sufficient protection mechanisms, the functionality could be malicious in nature (either by coming from an untrusted source, being spoofed, or being modified in transit from a trusted source). The functionality might also contain its own weaknesses, or grant access to additional functionality and state information that should be kept private to the base system, such as system state information, sensitive application data, or the DOM of a web application. This might lead to many different consequences depending on the included functionality, but some examples include injection of malware, information exposure by granting excessive privileges or permissions to the untrusted functionality, DOM-based XSS vulnerabilities, stealing user’s cookies, or open redirect to malware (CWE-601).