CVE-2023-0284

Published on: Not Yet Published

Last Modified on: 02/06/2023 04:46:00 PM UTC

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H

Certain versions of Checkmk from Tribe29 contain the following vulnerability:

Improper Input Validation of LDAP user IDs in Tribe29 Checkmk allows attackers that can control LDAP user IDs to manipulate files on the server. Checkmk <= 2.1.0p19, Checkmk <= 2.0.0p32, and all versions of Checkmk 1.6.0 (EOL) are affected.

  • CVE-2023-0284 has been assigned by URL Logo [email protected] to track the vulnerability - currently rated as HIGH severity.
  • Affected Vendor/Software: URL Logo Tribe29 - Checkmk version = 2.0.0
  • Affected Vendor/Software: URL Logo Tribe29 - Checkmk version = 2.1.0
  • Affected Vendor/Software: URL Logo Tribe29 - Checkmk version = 1.6.0

CVSS3 Score: 8.1 - HIGH

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
NETWORK LOW LOW NONE
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED NONE HIGH HIGH

CVE References

Description Tags Link
Improper validation of LDAP user IDs checkmk.com
text/html
URL Logo MISC checkmk.com/werk/15181

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
ApplicationTribe29CheckmkAllAllAllAll
ApplicationTribe29Checkmk2.0.0-AllAll
ApplicationTribe29Checkmk2.0.0b1AllAll
ApplicationTribe29Checkmk2.0.0b2AllAll
ApplicationTribe29Checkmk2.0.0b3AllAll
ApplicationTribe29Checkmk2.0.0b4AllAll
ApplicationTribe29Checkmk2.0.0b5AllAll
ApplicationTribe29Checkmk2.0.0b6AllAll
ApplicationTribe29Checkmk2.0.0b7AllAll
ApplicationTribe29Checkmk2.0.0b8AllAll
ApplicationTribe29Checkmk2.0.0i1AllAll
ApplicationTribe29Checkmk2.0.0p1AllAll
ApplicationTribe29Checkmk2.0.0p10AllAll
ApplicationTribe29Checkmk2.0.0p11AllAll
ApplicationTribe29Checkmk2.0.0p12AllAll
ApplicationTribe29Checkmk2.0.0p13AllAll
ApplicationTribe29Checkmk2.0.0p14AllAll
ApplicationTribe29Checkmk2.0.0p15AllAll
ApplicationTribe29Checkmk2.0.0p16AllAll
ApplicationTribe29Checkmk2.0.0p17AllAll
ApplicationTribe29Checkmk2.0.0p18AllAll
ApplicationTribe29Checkmk2.0.0p19AllAll
ApplicationTribe29Checkmk2.0.0p2AllAll
ApplicationTribe29Checkmk2.0.0p20AllAll
ApplicationTribe29Checkmk2.0.0p21AllAll
ApplicationTribe29Checkmk2.0.0p22AllAll
ApplicationTribe29Checkmk2.0.0p23AllAll
ApplicationTribe29Checkmk2.0.0p24AllAll
ApplicationTribe29Checkmk2.0.0p25AllAll
ApplicationTribe29Checkmk2.0.0p26AllAll
ApplicationTribe29Checkmk2.0.0p27AllAll
ApplicationTribe29Checkmk2.0.0p28AllAll
ApplicationTribe29Checkmk2.0.0p29AllAll
ApplicationTribe29Checkmk2.0.0p3AllAll
ApplicationTribe29Checkmk2.0.0p30AllAll
ApplicationTribe29Checkmk2.0.0p31AllAll
ApplicationTribe29Checkmk2.0.0p32AllAll
ApplicationTribe29Checkmk2.0.0p4AllAll
ApplicationTribe29Checkmk2.0.0p5AllAll
ApplicationTribe29Checkmk2.0.0p6AllAll
ApplicationTribe29Checkmk2.0.0p7AllAll
ApplicationTribe29Checkmk2.0.0p8AllAll
ApplicationTribe29Checkmk2.0.0p9AllAll
ApplicationTribe29Checkmk2.1.0b1AllAll
ApplicationTribe29Checkmk2.1.0b2AllAll
ApplicationTribe29Checkmk2.1.0b3AllAll
ApplicationTribe29Checkmk2.1.0b4AllAll
ApplicationTribe29Checkmk2.1.0b5AllAll
ApplicationTribe29Checkmk2.1.0b6AllAll
ApplicationTribe29Checkmk2.1.0b7AllAll
ApplicationTribe29Checkmk2.1.0b8AllAll
ApplicationTribe29Checkmk2.1.0b9AllAll
ApplicationTribe29Checkmk2.1.0p1AllAll
ApplicationTribe29Checkmk2.1.0p10AllAll
ApplicationTribe29Checkmk2.1.0p11AllAll
ApplicationTribe29Checkmk2.1.0p12AllAll
ApplicationTribe29Checkmk2.1.0p13AllAll
ApplicationTribe29Checkmk2.1.0p14AllAll
ApplicationTribe29Checkmk2.1.0p15AllAll
ApplicationTribe29Checkmk2.1.0p16AllAll
ApplicationTribe29Checkmk2.1.0p17AllAll
ApplicationTribe29Checkmk2.1.0p18AllAll
ApplicationTribe29Checkmk2.1.0p19AllAll
ApplicationTribe29Checkmk2.1.0p2AllAll
ApplicationTribe29Checkmk2.1.0p3AllAll
ApplicationTribe29Checkmk2.1.0p4AllAll
ApplicationTribe29Checkmk2.1.0p5AllAll
ApplicationTribe29Checkmk2.1.0p6AllAll
ApplicationTribe29Checkmk2.1.0p7AllAll
ApplicationTribe29Checkmk2.1.0p8AllAll
ApplicationTribe29Checkmk2.1.0p9AllAll
  • cpe:2.3:a:tribe29:checkmk:*:*:*:*:*:*:*:*:
  • cpe:2.3:a:tribe29:checkmk:2.0.0:-:*:*:*:*:*:*:
  • cpe:2.3:a:tribe29:checkmk:2.0.0:b1:*:*:*:*:*:*:
  • cpe:2.3:a:tribe29:checkmk:2.0.0:b2:*:*:*:*:*:*:
  • cpe:2.3:a:tribe29:checkmk:2.0.0:b3:*:*:*:*:*:*:
  • cpe:2.3:a:tribe29:checkmk:2.0.0:b4:*:*:*:*:*:*:
  • cpe:2.3:a:tribe29:checkmk:2.0.0:b5:*:*:*:*:*:*:
  • cpe:2.3:a:tribe29:checkmk:2.0.0:b6:*:*:*:*:*:*:
  • cpe:2.3:a:tribe29:checkmk:2.0.0:b7:*:*:*:*:*:*:
  • cpe:2.3:a:tribe29:checkmk:2.0.0:b8:*:*:*:*:*:*:
  • cpe:2.3:a:tribe29:checkmk:2.0.0:i1:*:*:*:*:*:*:
  • cpe:2.3:a:tribe29:checkmk:2.0.0:p1:*:*:*:*:*:*:
  • cpe:2.3:a:tribe29:checkmk:2.0.0:p10:*:*:*:*:*:*:
  • cpe:2.3:a:tribe29:checkmk:2.0.0:p11:*:*:*:*:*:*:
  • cpe:2.3:a:tribe29:checkmk:2.0.0:p12:*:*:*:*:*:*:
  • cpe:2.3:a:tribe29:checkmk:2.0.0:p13:*:*:*:*:*:*:
  • cpe:2.3:a:tribe29:checkmk:2.0.0:p14:*:*:*:*:*:*:
  • cpe:2.3:a:tribe29:checkmk:2.0.0:p15:*:*:*:*:*:*:
  • cpe:2.3:a:tribe29:checkmk:2.0.0:p16:*:*:*:*:*:*:
  • cpe:2.3:a:tribe29:checkmk:2.0.0:p17:*:*:*:*:*:*:
  • cpe:2.3:a:tribe29:checkmk:2.0.0:p18:*:*:*:*:*:*:
  • cpe:2.3:a:tribe29:checkmk:2.0.0:p19:*:*:*:*:*:*:
  • cpe:2.3:a:tribe29:checkmk:2.0.0:p2:*:*:*:*:*:*:
  • cpe:2.3:a:tribe29:checkmk:2.0.0:p20:*:*:*:*:*:*:
  • cpe:2.3:a:tribe29:checkmk:2.0.0:p21:*:*:*:*:*:*:
  • cpe:2.3:a:tribe29:checkmk:2.0.0:p22:*:*:*:*:*:*:
  • cpe:2.3:a:tribe29:checkmk:2.0.0:p23:*:*:*:*:*:*:
  • cpe:2.3:a:tribe29:checkmk:2.0.0:p24:*:*:*:*:*:*:
  • cpe:2.3:a:tribe29:checkmk:2.0.0:p25:*:*:*:*:*:*:
  • cpe:2.3:a:tribe29:checkmk:2.0.0:p26:*:*:*:*:*:*:
  • cpe:2.3:a:tribe29:checkmk:2.0.0:p27:*:*:*:*:*:*:
  • cpe:2.3:a:tribe29:checkmk:2.0.0:p28:*:*:*:*:*:*:
  • cpe:2.3:a:tribe29:checkmk:2.0.0:p29:*:*:*:*:*:*:
  • cpe:2.3:a:tribe29:checkmk:2.0.0:p3:*:*:*:*:*:*:
  • cpe:2.3:a:tribe29:checkmk:2.0.0:p30:*:*:*:*:*:*:
  • cpe:2.3:a:tribe29:checkmk:2.0.0:p31:*:*:*:*:*:*:
  • cpe:2.3:a:tribe29:checkmk:2.0.0:p32:*:*:*:*:*:*:
  • cpe:2.3:a:tribe29:checkmk:2.0.0:p4:*:*:*:*:*:*:
  • cpe:2.3:a:tribe29:checkmk:2.0.0:p5:*:*:*:*:*:*:
  • cpe:2.3:a:tribe29:checkmk:2.0.0:p6:*:*:*:*:*:*:
  • cpe:2.3:a:tribe29:checkmk:2.0.0:p7:*:*:*:*:*:*:
  • cpe:2.3:a:tribe29:checkmk:2.0.0:p8:*:*:*:*:*:*:
  • cpe:2.3:a:tribe29:checkmk:2.0.0:p9:*:*:*:*:*:*:
  • cpe:2.3:a:tribe29:checkmk:2.1.0:b1:*:*:*:*:*:*:
  • cpe:2.3:a:tribe29:checkmk:2.1.0:b2:*:*:*:*:*:*:
  • cpe:2.3:a:tribe29:checkmk:2.1.0:b3:*:*:*:*:*:*:
  • cpe:2.3:a:tribe29:checkmk:2.1.0:b4:*:*:*:*:*:*:
  • cpe:2.3:a:tribe29:checkmk:2.1.0:b5:*:*:*:*:*:*:
  • cpe:2.3:a:tribe29:checkmk:2.1.0:b6:*:*:*:*:*:*:
  • cpe:2.3:a:tribe29:checkmk:2.1.0:b7:*:*:*:*:*:*:
  • cpe:2.3:a:tribe29:checkmk:2.1.0:b8:*:*:*:*:*:*:
  • cpe:2.3:a:tribe29:checkmk:2.1.0:b9:*:*:*:*:*:*:
  • cpe:2.3:a:tribe29:checkmk:2.1.0:p1:*:*:*:*:*:*:
  • cpe:2.3:a:tribe29:checkmk:2.1.0:p10:*:*:*:*:*:*:
  • cpe:2.3:a:tribe29:checkmk:2.1.0:p11:*:*:*:*:*:*:
  • cpe:2.3:a:tribe29:checkmk:2.1.0:p12:*:*:*:*:*:*:
  • cpe:2.3:a:tribe29:checkmk:2.1.0:p13:*:*:*:*:*:*:
  • cpe:2.3:a:tribe29:checkmk:2.1.0:p14:*:*:*:*:*:*:
  • cpe:2.3:a:tribe29:checkmk:2.1.0:p15:*:*:*:*:*:*:
  • cpe:2.3:a:tribe29:checkmk:2.1.0:p16:*:*:*:*:*:*:
  • cpe:2.3:a:tribe29:checkmk:2.1.0:p17:*:*:*:*:*:*:
  • cpe:2.3:a:tribe29:checkmk:2.1.0:p18:*:*:*:*:*:*:
  • cpe:2.3:a:tribe29:checkmk:2.1.0:p19:*:*:*:*:*:*:
  • cpe:2.3:a:tribe29:checkmk:2.1.0:p2:*:*:*:*:*:*:
  • cpe:2.3:a:tribe29:checkmk:2.1.0:p3:*:*:*:*:*:*:
  • cpe:2.3:a:tribe29:checkmk:2.1.0:p4:*:*:*:*:*:*:
  • cpe:2.3:a:tribe29:checkmk:2.1.0:p5:*:*:*:*:*:*:
  • cpe:2.3:a:tribe29:checkmk:2.1.0:p6:*:*:*:*:*:*:
  • cpe:2.3:a:tribe29:checkmk:2.1.0:p7:*:*:*:*:*:*:
  • cpe:2.3:a:tribe29:checkmk:2.1.0:p8:*:*:*:*:*:*:
  • cpe:2.3:a:tribe29:checkmk:2.1.0:p9:*:*:*:*:*:*:

Social Mentions

Source Title Posted (UTC)
Twitter Icon @CVEreport CVE-2023-0284 : Improper Input Validation of LDAP user IDs in Tribe29 Checkmk allows attackers that can control LDA… twitter.com/i/web/status/1… 2023-01-26 21:45:32
© CVE.report 2023 Twitter Nitter Twitter Viewer |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report