Improper Input Validation of LDAP user IDs in Tribe29 Checkmk allows attackers that can control LDAP user IDs to manipulate files on the server. Checkmk <= 2.1.0p19, Checkmk <= 2.0.0p32, and all versions of Checkmk 1.6.0 (EOL) are affected.
2023-01-26T21:18:07.030
2024-11-21T07:36:53.613
Modified
CVSSv3.1: 6.8 (MEDIUM)
| Type | Vendor | Product | Version/Range | Vulnerable? |
|---|---|---|---|---|
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | tribe29 | checkmk | < 2.0.0 | Yes |