Improper Authorization in RestAPI in Checkmk GmbHs Checkmk versions <2.1.0p28 and <2.2.0b8 allows remote authenticated users to read arbitrary host_configs.
The product does not perform or incorrectly performs an authorization check when an actor attempts to access a resource or perform an action.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Checkmk | Checkmk | 2.1.0 (including) | 2.1.0 (including) |
Checkmk | Checkmk | 2.1.0-b1 (including) | 2.1.0-b1 (including) |
Checkmk | Checkmk | 2.1.0-b2 (including) | 2.1.0-b2 (including) |
Checkmk | Checkmk | 2.1.0-b3 (including) | 2.1.0-b3 (including) |
Checkmk | Checkmk | 2.1.0-b4 (including) | 2.1.0-b4 (including) |
Checkmk | Checkmk | 2.1.0-b5 (including) | 2.1.0-b5 (including) |
Checkmk | Checkmk | 2.1.0-b6 (including) | 2.1.0-b6 (including) |
Checkmk | Checkmk | 2.1.0-b7 (including) | 2.1.0-b7 (including) |
Checkmk | Checkmk | 2.1.0-b8 (including) | 2.1.0-b8 (including) |
Checkmk | Checkmk | 2.1.0-b9 (including) | 2.1.0-b9 (including) |
Checkmk | Checkmk | 2.1.0-p1 (including) | 2.1.0-p1 (including) |
Checkmk | Checkmk | 2.1.0-p10 (including) | 2.1.0-p10 (including) |
Checkmk | Checkmk | 2.1.0-p11 (including) | 2.1.0-p11 (including) |
Checkmk | Checkmk | 2.1.0-p12 (including) | 2.1.0-p12 (including) |
Checkmk | Checkmk | 2.1.0-p13 (including) | 2.1.0-p13 (including) |
Checkmk | Checkmk | 2.1.0-p14 (including) | 2.1.0-p14 (including) |
Checkmk | Checkmk | 2.1.0-p15 (including) | 2.1.0-p15 (including) |
Checkmk | Checkmk | 2.1.0-p16 (including) | 2.1.0-p16 (including) |
Checkmk | Checkmk | 2.1.0-p17 (including) | 2.1.0-p17 (including) |
Checkmk | Checkmk | 2.1.0-p18 (including) | 2.1.0-p18 (including) |
Checkmk | Checkmk | 2.1.0-p19 (including) | 2.1.0-p19 (including) |
Checkmk | Checkmk | 2.1.0-p2 (including) | 2.1.0-p2 (including) |
Checkmk | Checkmk | 2.1.0-p20 (including) | 2.1.0-p20 (including) |
Checkmk | Checkmk | 2.1.0-p21 (including) | 2.1.0-p21 (including) |
Checkmk | Checkmk | 2.1.0-p22 (including) | 2.1.0-p22 (including) |
Checkmk | Checkmk | 2.1.0-p23 (including) | 2.1.0-p23 (including) |
Checkmk | Checkmk | 2.1.0-p24 (including) | 2.1.0-p24 (including) |
Checkmk | Checkmk | 2.1.0-p25 (including) | 2.1.0-p25 (including) |
Checkmk | Checkmk | 2.1.0-p26 (including) | 2.1.0-p26 (including) |
Checkmk | Checkmk | 2.1.0-p27 (including) | 2.1.0-p27 (including) |
Checkmk | Checkmk | 2.1.0-p3 (including) | 2.1.0-p3 (including) |
Checkmk | Checkmk | 2.1.0-p4 (including) | 2.1.0-p4 (including) |
Checkmk | Checkmk | 2.1.0-p5 (including) | 2.1.0-p5 (including) |
Checkmk | Checkmk | 2.1.0-p6 (including) | 2.1.0-p6 (including) |
Checkmk | Checkmk | 2.1.0-p7 (including) | 2.1.0-p7 (including) |
Checkmk | Checkmk | 2.1.0-p8 (including) | 2.1.0-p8 (including) |
Checkmk | Checkmk | 2.1.0-p9 (including) | 2.1.0-p9 (including) |
Checkmk | Checkmk | 2.2.0-b1 (including) | 2.2.0-b1 (including) |
Checkmk | Checkmk | 2.2.0-b2 (including) | 2.2.0-b2 (including) |
Checkmk | Checkmk | 2.2.0-b3 (including) | 2.2.0-b3 (including) |
Checkmk | Checkmk | 2.2.0-b4 (including) | 2.2.0-b4 (including) |
Checkmk | Checkmk | 2.2.0-b5 (including) | 2.2.0-b5 (including) |
Checkmk | Checkmk | 2.2.0-b6 (including) | 2.2.0-b6 (including) |
Checkmk | Checkmk | 2.2.0-b7 (including) | 2.2.0-b7 (including) |
Checkmk | Tribe29 | * | 2.1.0 (excluding) |
Check-mk | Ubuntu | bionic | * |
Check-mk | Ubuntu | trusty | * |
Check-mk | Ubuntu | xenial | * |
Assuming a user with a given identity, authorization is the process of determining whether that user can access a given resource, based on the user’s privileges and any permissions or other access-control specifications that apply to the resource. When access control checks are not applied consistently - or not at all - users are able to access data or perform actions that they should not be allowed to perform. This can lead to a wide range of problems, including information exposures, denial of service, and arbitrary code execution.