2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2021-40905" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2022-03-25T23:15:08.237" ,
2024-11-23 15:12:23 +00:00
"lastModified" : "2024-11-21T06:25:04.480" ,
2023-11-07 21:03:21 +00:00
"vulnStatus" : "Modified" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [
{
"sourceIdentifier" : "cve@mitre.org" ,
"tags" : [
"disputed"
]
}
] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
2023-11-07 21:03:21 +00:00
"value" : "The web management console of CheckMK Enterprise Edition (versions 1.5.0 to 2.0.0p9) does not properly sanitise the uploading of \".mkp\" files, which are Extension Packages, making remote code execution possible. Successful exploitation requires access to the web management interface, either with valid credentials or with a hijacked session of a user with administrator role. NOTE: the vendor states that this is the intended behavior: admins are supposed to be able to execute code in this manner"
2023-04-24 12:24:31 +02:00
} ,
{
"lang" : "es" ,
"value" : "** EN DISTPUTA ** La consola de administraci\u00f3n web de CheckMK Enterprise Edition (versiones 1.5.0 a 2.0.0p9) no sanea correctamente la carga de archivos \".mkp\", que son Paquetes de Extensi\u00f3n, haciendo posible una ejecuci\u00f3n de c\u00f3digo remota. Una explotaci\u00f3n con \u00e9xito requiere el acceso a la interfaz de administraci\u00f3n web, ya sea con credenciales v\u00e1lidas o con una sesi\u00f3n secuestrada de un usuario con rol de administrador. NOTA: el proveedor afirma que este es el comportamiento previsto: se supone que los administradores pueden ejecutar c\u00f3digo de esta manera"
}
] ,
"metrics" : {
"cvssMetricV31" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" ,
2024-11-23 15:12:23 +00:00
"baseScore" : 8.8 ,
"baseSeverity" : "HIGH" ,
2023-04-24 12:24:31 +02:00
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "REQUIRED" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
2024-11-23 15:12:23 +00:00
"availabilityImpact" : "HIGH"
2023-04-24 12:24:31 +02:00
} ,
"exploitabilityScore" : 2.8 ,
"impactScore" : 5.9
2024-08-01 14:03:18 +00:00
} ,
{
"source" : "134c704f-9b21-4f2e-91b3-4a467353bcc0" ,
"type" : "Secondary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" ,
2024-11-23 15:12:23 +00:00
"baseScore" : 8.8 ,
"baseSeverity" : "HIGH" ,
2024-08-01 14:03:18 +00:00
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "REQUIRED" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
2024-11-23 15:12:23 +00:00
"availabilityImpact" : "HIGH"
2024-08-01 14:03:18 +00:00
} ,
"exploitabilityScore" : 2.8 ,
"impactScore" : 5.9
2023-04-24 12:24:31 +02:00
}
] ,
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:M/Au:N/C:P/I:P/A:P" ,
2024-11-23 15:12:23 +00:00
"baseScore" : 6.8 ,
2023-04-24 12:24:31 +02:00
"accessVector" : "NETWORK" ,
"accessComplexity" : "MEDIUM" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "PARTIAL" ,
"integrityImpact" : "PARTIAL" ,
2024-11-23 15:12:23 +00:00
"availabilityImpact" : "PARTIAL"
2023-04-24 12:24:31 +02:00
} ,
"baseSeverity" : "MEDIUM" ,
"exploitabilityScore" : 8.6 ,
"impactScore" : 6.4 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : true
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-434"
}
]
2024-08-01 14:03:18 +00:00
} ,
{
"source" : "134c704f-9b21-4f2e-91b3-4a467353bcc0" ,
"type" : "Secondary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-434"
}
]
2023-04-24 12:24:31 +02:00
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
2024-07-23 20:03:11 +00:00
"criteria" : "cpe:2.3:a:checkmk:checkmk:2.0.0:-:*:*:*:*:*:*" ,
"matchCriteriaId" : "F8EDFDCA-0778-4540-B1D5-D3A986258028"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2024-07-23 20:03:11 +00:00
"criteria" : "cpe:2.3:a:checkmk:checkmk:2.0.0:b1:*:*:*:*:*:*" ,
"matchCriteriaId" : "54031390-D7E7-4A14-AA2F-923768B3685F"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2024-07-23 20:03:11 +00:00
"criteria" : "cpe:2.3:a:checkmk:checkmk:2.0.0:b2:*:*:*:*:*:*" ,
"matchCriteriaId" : "F1B7E35F-5A07-424E-AA09-AC54104D612B"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2024-07-23 20:03:11 +00:00
"criteria" : "cpe:2.3:a:checkmk:checkmk:2.0.0:b3:*:*:*:*:*:*" ,
"matchCriteriaId" : "8D4AC302-C8F5-4A2B-A73A-982D0AA2495A"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2024-07-23 20:03:11 +00:00
"criteria" : "cpe:2.3:a:checkmk:checkmk:2.0.0:b4:*:*:*:*:*:*" ,
"matchCriteriaId" : "7A058C71-C39E-4109-B570-4A061013D033"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2024-07-23 20:03:11 +00:00
"criteria" : "cpe:2.3:a:checkmk:checkmk:2.0.0:b5:*:*:*:*:*:*" ,
"matchCriteriaId" : "22BCFA79-B3D6-4FFF-A3D3-8C4C97AF17C5"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2024-07-23 20:03:11 +00:00
"criteria" : "cpe:2.3:a:checkmk:checkmk:2.0.0:b6:*:*:*:*:*:*" ,
"matchCriteriaId" : "2A1703D9-8EEB-432D-90E2-F847CDC4C204"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2024-07-23 20:03:11 +00:00
"criteria" : "cpe:2.3:a:checkmk:checkmk:2.0.0:b7:*:*:*:*:*:*" ,
"matchCriteriaId" : "1A4C72BA-6D78-4911-83E4-4DABB2CAC47F"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2024-07-23 20:03:11 +00:00
"criteria" : "cpe:2.3:a:checkmk:checkmk:2.0.0:b8:*:*:*:*:*:*" ,
"matchCriteriaId" : "081FD127-1066-4019-B521-9FADB85DBD4A"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2024-07-23 20:03:11 +00:00
"criteria" : "cpe:2.3:a:checkmk:checkmk:2.0.0:i1:*:*:*:*:*:*" ,
"matchCriteriaId" : "C1A4F005-4823-4B2B-B4EF-4EFDB04CFB9B"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2024-07-23 20:03:11 +00:00
"criteria" : "cpe:2.3:a:checkmk:checkmk:2.0.0:p1:*:*:*:*:*:*" ,
"matchCriteriaId" : "357240B1-F0DA-4FA8-B782-D998951F4B54"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2024-07-23 20:03:11 +00:00
"criteria" : "cpe:2.3:a:checkmk:checkmk:2.0.0:p10:*:*:*:*:*:*" ,
"matchCriteriaId" : "2F828F54-04E2-4B98-91A7-B09ED833E88B"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2024-07-23 20:03:11 +00:00
"criteria" : "cpe:2.3:a:checkmk:checkmk:2.0.0:p11:*:*:*:*:*:*" ,
"matchCriteriaId" : "A4B8B300-8264-40AB-A839-7EACB988163B"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2024-07-23 20:03:11 +00:00
"criteria" : "cpe:2.3:a:checkmk:checkmk:2.0.0:p12:*:*:*:*:*:*" ,
"matchCriteriaId" : "EB76A8DF-C870-482F-A488-DB2917ABD971"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2024-07-23 20:03:11 +00:00
"criteria" : "cpe:2.3:a:checkmk:checkmk:2.0.0:p13:*:*:*:*:*:*" ,
"matchCriteriaId" : "04947B1B-CF67-4C11-8FE3-6C17FD35E2EF"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2024-07-23 20:03:11 +00:00
"criteria" : "cpe:2.3:a:checkmk:checkmk:2.0.0:p14:*:*:*:*:*:*" ,
"matchCriteriaId" : "591AEC3C-2F48-4E91-9881-42EEDD039C5D"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2024-07-23 20:03:11 +00:00
"criteria" : "cpe:2.3:a:checkmk:checkmk:2.0.0:p15:*:*:*:*:*:*" ,
"matchCriteriaId" : "C5CA04C8-2C80-4C7E-B329-3FFCBEDEE663"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2024-07-23 20:03:11 +00:00
"criteria" : "cpe:2.3:a:checkmk:checkmk:2.0.0:p16:*:*:*:*:*:*" ,
"matchCriteriaId" : "47A1C5AC-C8B7-495A-A5F4-CD4790358A2E"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2024-07-23 20:03:11 +00:00
"criteria" : "cpe:2.3:a:checkmk:checkmk:2.0.0:p17:*:*:*:*:*:*" ,
"matchCriteriaId" : "B87D8B46-5B04-460D-BBA1-BB19234DA19D"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2024-07-23 20:03:11 +00:00
"criteria" : "cpe:2.3:a:checkmk:checkmk:2.0.0:p2:*:*:*:*:*:*" ,
"matchCriteriaId" : "F1E5549E-3272-478D-85D0-6F53EE731183"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2024-07-23 20:03:11 +00:00
"criteria" : "cpe:2.3:a:checkmk:checkmk:2.0.0:p3:*:*:*:*:*:*" ,
"matchCriteriaId" : "D884D3AF-7D57-4DF6-82E8-556C35319ED2"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2024-07-23 20:03:11 +00:00
"criteria" : "cpe:2.3:a:checkmk:checkmk:2.0.0:p4:*:*:*:*:*:*" ,
"matchCriteriaId" : "528BAFA3-ED39-45B5-8C81-A6FD76DDB49B"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2024-07-23 20:03:11 +00:00
"criteria" : "cpe:2.3:a:checkmk:checkmk:2.0.0:p5:*:*:*:*:*:*" ,
"matchCriteriaId" : "02DA7C50-7360-4679-93A5-92C8DC5E8E46"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2024-07-23 20:03:11 +00:00
"criteria" : "cpe:2.3:a:checkmk:checkmk:2.0.0:p6:*:*:*:*:*:*" ,
"matchCriteriaId" : "71B49D90-9522-46C6-8948-B9C21CEA473C"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2024-07-23 20:03:11 +00:00
"criteria" : "cpe:2.3:a:checkmk:checkmk:2.0.0:p7:*:*:*:*:*:*" ,
"matchCriteriaId" : "98C29296-D1F3-45A2-BF0A-22333150F416"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2024-07-23 20:03:11 +00:00
"criteria" : "cpe:2.3:a:checkmk:checkmk:2.0.0:p8:*:*:*:*:*:*" ,
"matchCriteriaId" : "339226E6-532F-4FE2-A543-6B166A9BA7F3"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2024-07-23 20:03:11 +00:00
"criteria" : "cpe:2.3:a:checkmk:checkmk:2.0.0:p9:*:*:*:*:*:*" ,
"matchCriteriaId" : "986FDFA6-BE12-4268-9B90-F7D469BBE517"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2024-07-23 20:03:11 +00:00
"criteria" : "cpe:2.3:a:tribe29:checkmk:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "1.5.0" ,
"versionEndExcluding" : "2.0.0" ,
"matchCriteriaId" : "564469A7-7D79-40BF-9177-2D95D502AD2F"
2023-04-24 12:24:31 +02:00
}
]
}
]
}
] ,
"references" : [
{
"url" : "http://checkmk.com" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Product"
]
} ,
{
"url" : "https://github.com/Edgarloyola/CVE-2021-40905" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Exploit" ,
"Third Party Advisory"
]
2024-11-23 15:12:23 +00:00
} ,
{
"url" : "http://checkmk.com" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Product"
]
} ,
{
"url" : "https://github.com/Edgarloyola/CVE-2021-40905" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Exploit" ,
"Third Party Advisory"
]
2023-04-24 12:24:31 +02:00
}
]
}