Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2022-48321: Fix limited SSRF in agent-receiver API

Limited Server-Side Request Forgery (SSRF) in agent-receiver in Tribe29’s Checkmk <= 2.1.0p11 allows an attacker to communicate with local network restricted endpoints by use of the host registration API.

CVE
#vulnerability#ssrf

Component

Core & setup

Title

Fix limited SSRF in agent-receiver API

Date

Aug 30, 2022

Checkmk Edition

Checkmk Raw (CRE)

Checkmk Version

2.2.0b1 2.1.0p12

Level

Trivial Change

Class

Security Fix

Compatibility

Compatible - no manual interaction needed

Prior to this Werk attackers could use the host registration API for Server Side Request Forgery.

An attacker would have been able to make the Checkmk server issue local requests to endpoints that should only be accessible from localhost. In order to exploit this vulnerability attackers would have needed the privileges to register hosts. This vulnerability was caused by insufficient sanitization of the hostname of the host to be registered.

We thank Stefan Schiller (SonarSource) for reporting this issue.

Affected Versions: 2.1

Mitigations: The affected API can be disabled using omd stop agent-receiver. Note however, that this makes it impossible to register new hosts.

Vulnerability Management: We have rated the issue with a CVSS Score of 5.0 (Medium) with the following CVSS vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N. A CVE has been requested.

Changes: This Werk adds validation for the hostname and ensures hostnames are escaped in requests to the REST API.

To the list of all Werks

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907