Path-Traversal in MKP storing in Tribe29 Checkmk <=2.0.0p32 and <= 2.1.0p18 allows an administrator to write mkp files to arbitrary locations via a malicious mkp file.
2023-01-09T17:15:11.117
2024-11-21T07:36:08.353
Modified
CVSSv3.1: 3.5 (LOW)
| Type | Vendor | Product | Version/Range | Vulnerable? |
|---|---|---|---|---|
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |