Insertion of Sensitive Information into Log File in Checkmk GmbH's Checkmk versions <2.3.0p7, <2.2.0p28, <2.1.0p45 and <=2.0.0p39 (EOL) causes automation user secrets to be written to audit log files accessible to administrators.
2024-06-26T08:15:09.630
2024-12-04T16:12:51.557
Analyzed
CVSSv3.1: 2.7 (LOW)
| Type | Vendor | Product | Version/Range | Vulnerable? |
|---|---|---|---|---|
| Application | checkmk | checkmk | ≤ 2.0.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.1.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.2.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |
| Application | checkmk | checkmk | 2.3.0 | Yes |