Inicio / Alerta Temprana / Vulnerabilidades / CVE-2022-31258

Vulnerabilidad en un enlace simbólico del hook OMD en Checkmk (CVE-2022-31258)

Tipo: 
Incorrecta resolución de una ruta antes de aceder a un fichero (Seguimiento de enlaces)
Gravedad: 
Alta
Fecha publicación : 
20/05/2022
Última modificación: 
07/06/2022
Descripción
En Checkmk versiones anteriores a 1.6.0p29, 2.x anteriores a 2.0.0p25, y 2.1.x anteriores a 2.1.0b10, un usuario del sitio puede escalar a root editando un enlace simbólico del hook OMD
Impacto
Vector de acceso: Local
Complejidad de Acceso: Baja
Autenticación: No requerida para explotarla
Tipo de impacto: Compromiso total de la integridad del sistema + Compromiso total de la confidencialidad del sistema + Compromiso total de la disponibilidad del sistema
Productos y versiones vulnerables
  • cpe:2.3:a:tribe29:checkmk:2.1.0:b9:*:*:*:*:*:*
  • cpe:2.3:a:tribe29:checkmk:2.1.0:b8:*:*:*:*:*:*
  • cpe:2.3:a:tribe29:checkmk:2.1.0:b7:*:*:*:*:*:*
  • cpe:2.3:a:tribe29:checkmk:2.1.0:b6:*:*:*:*:*:*
  • cpe:2.3:a:tribe29:checkmk:2.1.0:b5:*:*:*:*:*:*
  • cpe:2.3:a:tribe29:checkmk:2.1.0:b4:*:*:*:*:*:*
  • cpe:2.3:a:tribe29:checkmk:2.1.0:b3:*:*:*:*:*:*
  • cpe:2.3:a:tribe29:checkmk:2.1.0:b2:*:*:*:*:*:*
  • cpe:2.3:a:tribe29:checkmk:2.1.0:b1:*:*:*:*:*:*
  • cpe:2.3:a:tribe29:checkmk:2.0.0:p9:*:*:*:*:*:*
  • cpe:2.3:a:tribe29:checkmk:2.0.0:p8:*:*:*:*:*:*
  • cpe:2.3:a:tribe29:checkmk:2.0.0:p7:*:*:*:*:*:*
  • cpe:2.3:a:tribe29:checkmk:2.0.0:p6:*:*:*:*:*:*
  • cpe:2.3:a:tribe29:checkmk:2.0.0:p5:*:*:*:*:*:*
  • cpe:2.3:a:tribe29:checkmk:2.0.0:p4:*:*:*:*:*:*
  • cpe:2.3:a:tribe29:checkmk:2.0.0:p3:*:*:*:*:*:*
  • cpe:2.3:a:tribe29:checkmk:2.0.0:p2:*:*:*:*:*:*
  • cpe:2.3:a:tribe29:checkmk:2.0.0:p24:*:*:*:*:*:*
  • cpe:2.3:a:tribe29:checkmk:2.0.0:p23:*:*:*:*:*:*
  • cpe:2.3:a:tribe29:checkmk:2.0.0:p22:*:*:*:*:*:*
  • cpe:2.3:a:tribe29:checkmk:2.0.0:p21:*:*:*:*:*:*
  • cpe:2.3:a:tribe29:checkmk:2.0.0:p20:*:*:*:*:*:*
  • cpe:2.3:a:tribe29:checkmk:2.0.0:p1:*:*:*:*:*:*
  • cpe:2.3:a:tribe29:checkmk:2.0.0:p19:*:*:*:*:*:*
  • cpe:2.3:a:tribe29:checkmk:2.0.0:p18:*:*:*:*:*:*
  • cpe:2.3:a:tribe29:checkmk:2.0.0:p17:*:*:*:*:*:*
  • cpe:2.3:a:tribe29:checkmk:2.0.0:p16:*:*:*:*:*:*
  • cpe:2.3:a:tribe29:checkmk:2.0.0:p15:*:*:*:*:*:*
  • cpe:2.3:a:tribe29:checkmk:2.0.0:p14:*:*:*:*:*:*
  • cpe:2.3:a:tribe29:checkmk:2.0.0:p13:*:*:*:*:*:*
  • cpe:2.3:a:tribe29:checkmk:2.0.0:p12:*:*:*:*:*:*
  • cpe:2.3:a:tribe29:checkmk:2.0.0:p11:*:*:*:*:*:*
  • cpe:2.3:a:tribe29:checkmk:2.0.0:p10:*:*:*:*:*:*
  • cpe:2.3:a:tribe29:checkmk:2.0.0:i1:*:*:*:*:*:*
  • cpe:2.3:a:tribe29:checkmk:2.0.0:b8:*:*:*:*:*:*
  • cpe:2.3:a:tribe29:checkmk:2.0.0:b7:*:*:*:*:*:*
  • cpe:2.3:a:tribe29:checkmk:2.0.0:b6:*:*:*:*:*:*
  • cpe:2.3:a:tribe29:checkmk:2.0.0:b5:*:*:*:*:*:*
  • cpe:2.3:a:tribe29:checkmk:2.0.0:b4:*:*:*:*:*:*
  • cpe:2.3:a:tribe29:checkmk:2.0.0:b3:*:*:*:*:*:*
  • cpe:2.3:a:tribe29:checkmk:2.0.0:b2:*:*:*:*:*:*
  • cpe:2.3:a:tribe29:checkmk:2.0.0:b1:*:*:*:*:*:*
  • cpe:2.3:a:tribe29:checkmk:2.0.0:-:*:*:*:*:*:*
  • cpe:2.3:a:tribe29:checkmk:1.6.0p18:*:*:*:*:*:*:*
  • cpe:2.3:a:tribe29:checkmk:1.6.0p17:*:*:*:*:*:*:*
  • cpe:2.3:a:tribe29:checkmk:1.6.0p16:*:*:*:*:*:*:*
  • cpe:2.3:a:tribe29:checkmk:1.6.0p15:*:*:*:*:*:*:*
  • cpe:2.3:a:tribe29:checkmk:1.6.0p14:*:*:*:*:*:*:*
  • cpe:2.3:a:tribe29:checkmk:1.6.0p13:*:*:*:*:*:*:*
  • cpe:2.3:a:tribe29:checkmk:1.6.0p12:*:*:*:*:*:*:*
  • cpe:2.3:a:tribe29:checkmk:1.6.0p11:*:*:*:*:*:*:*
  • cpe:2.3:a:tribe29:checkmk:1.6.0p10:*:*:*:*:*:*:*
  • cpe:2.3:a:tribe29:checkmk:1.6.0b11:*:*:*:*:*:*:*
  • cpe:2.3:a:tribe29:checkmk:1.6.0b10:*:*:*:*:*:*:*
  • cpe:2.3:a:tribe29:checkmk:1.6.0:p9:*:*:*:*:*:*
  • cpe:2.3:a:tribe29:checkmk:1.6.0:p8:*:*:*:*:*:*
  • cpe:2.3:a:tribe29:checkmk:1.6.0:p7:*:*:*:*:*:*
  • cpe:2.3:a:tribe29:checkmk:1.6.0:p6:*:*:*:*:*:*
  • cpe:2.3:a:tribe29:checkmk:1.6.0:p5:*:*:*:*:*:*
  • cpe:2.3:a:tribe29:checkmk:1.6.0:p4:*:*:*:*:*:*
  • cpe:2.3:a:tribe29:checkmk:1.6.0:p3:*:*:*:*:*:*
  • cpe:2.3:a:tribe29:checkmk:1.6.0:p2:*:*:*:*:*:*
  • cpe:2.3:a:tribe29:checkmk:1.6.0:p28:*:*:*:*:*:*
  • cpe:2.3:a:tribe29:checkmk:1.6.0:p27:*:*:*:*:*:*
  • cpe:2.3:a:tribe29:checkmk:1.6.0:p26:*:*:*:*:*:*
  • cpe:2.3:a:tribe29:checkmk:1.6.0:p25:*:*:*:*:*:*
  • cpe:2.3:a:tribe29:checkmk:1.6.0:p24:*:*:*:*:*:*
  • cpe:2.3:a:tribe29:checkmk:1.6.0:p23:*:*:*:*:*:*
  • cpe:2.3:a:tribe29:checkmk:1.6.0:p22:*:*:*:*:*:*
  • cpe:2.3:a:tribe29:checkmk:1.6.0:p21:*:*:*:*:*:*
  • cpe:2.3:a:tribe29:checkmk:1.6.0:p20:*:*:*:*:*:*
  • cpe:2.3:a:tribe29:checkmk:1.6.0:p1:*:*:*:*:*:*
  • cpe:2.3:a:tribe29:checkmk:1.6.0:p19:*:*:*:*:*:*
  • cpe:2.3:a:tribe29:checkmk:1.6.0:p16:*:*:*:*:*:*
  • cpe:2.3:a:tribe29:checkmk:1.6.0:p15:*:*:*:*:*:*
  • cpe:2.3:a:tribe29:checkmk:1.6.0:p14:*:*:*:*:*:*
  • cpe:2.3:a:tribe29:checkmk:1.6.0:p13:*:*:*:*:*:*
  • cpe:2.3:a:tribe29:checkmk:1.6.0:p12:*:*:*:*:*:*
  • cpe:2.3:a:tribe29:checkmk:1.6.0:p11:*:*:*:*:*:*
  • cpe:2.3:a:tribe29:checkmk:1.6.0:p10:*:*:*:*:*:*
  • cpe:2.3:a:tribe29:checkmk:1.6.0:b9:*:*:*:*:*:*
  • cpe:2.3:a:tribe29:checkmk:1.6.0:b5:*:*:*:*:*:*
  • cpe:2.3:a:tribe29:checkmk:1.6.0:b4:*:*:*:*:*:*
  • cpe:2.3:a:tribe29:checkmk:1.6.0:b3:*:*:*:*:*:*
  • cpe:2.3:a:tribe29:checkmk:1.6.0:b1:*:*:*:*:*:*
  • cpe:2.3:a:tribe29:checkmk:1.6.0:b12:*:*:*:*:*:*
  • cpe:2.3:a:tribe29:checkmk:1.6.0:b10:*:*:*:*:*:*
  • cpe:2.3:a:tribe29:checkmk:*:*:*:*:*:*:*:*
Para consultar la lista completa de productos y versiones ver esta página
Referencias a soluciones, herramientas e información
Explicación de los campos