CVE Vulnerabilities

CVE-2022-48317

Insufficient Session Expiration

Published: Feb 20, 2023 | Modified: Nov 21, 2024
CVSS 3.x
9.8
CRITICAL
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

Expired sessions were not securely terminated in the RestAPI for Tribe29s Checkmk <= 2.1.0p10 and Checkmk <= 2.0.0p28 allowing an attacker to use expired session tokens when communicating with the RestAPI.

Weakness

According to WASC, “Insufficient Session Expiration is when a web site permits an attacker to reuse old session credentials or session IDs for authorization.”

Affected Software

NameVendorStart VersionEnd Version
CheckmkCheckmk2.1.0 (including)2.1.0 (including)
CheckmkCheckmk2.1.0-b1 (including)2.1.0-b1 (including)
CheckmkCheckmk2.1.0-b2 (including)2.1.0-b2 (including)
CheckmkCheckmk2.1.0-b3 (including)2.1.0-b3 (including)
CheckmkCheckmk2.1.0-b4 (including)2.1.0-b4 (including)
CheckmkCheckmk2.1.0-b5 (including)2.1.0-b5 (including)
CheckmkCheckmk2.1.0-b6 (including)2.1.0-b6 (including)
CheckmkCheckmk2.1.0-b7 (including)2.1.0-b7 (including)
CheckmkCheckmk2.1.0-b8 (including)2.1.0-b8 (including)
CheckmkCheckmk2.1.0-b9 (including)2.1.0-b9 (including)
CheckmkCheckmk2.1.0-p1 (including)2.1.0-p1 (including)
CheckmkCheckmk2.1.0-p10 (including)2.1.0-p10 (including)
CheckmkCheckmk2.1.0-p2 (including)2.1.0-p2 (including)
CheckmkCheckmk2.1.0-p3 (including)2.1.0-p3 (including)
CheckmkCheckmk2.1.0-p4 (including)2.1.0-p4 (including)
CheckmkCheckmk2.1.0-p5 (including)2.1.0-p5 (including)
CheckmkCheckmk2.1.0-p6 (including)2.1.0-p6 (including)
CheckmkCheckmk2.1.0-p7 (including)2.1.0-p7 (including)
CheckmkCheckmk2.1.0-p8 (including)2.1.0-p8 (including)
CheckmkCheckmk2.1.0-p9 (including)2.1.0-p9 (including)
Check-mkUbuntubionic*
Check-mkUbuntutrusty*
Check-mkUbuntuxenial*

Potential Mitigations

References