CVE-2014-5340

EUVD-2014-5229
The wato component in Check_MK before 1.2.4p4 and 1.2.5 before 1.2.5i4 uses the pickle Python module unsafely, which allows remote attackers to execute arbitrary code via a crafted serialized object, related to an automation URL.
Code Injection
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
9.3 UNKNOWN
NETWORK
MEDIUM
AV:N/AC:M/Au:N/C:C/I:C/A:C
Base Score
CVSS 3.x
EPSS Score
Percentile: 86%
Affected Products (NVD)
VendorProductVersion
check_mk_projectcheck_mk
𝑥
≤ 1.2.4
check_mk_projectcheck_mk
1.2.4
check_mk_projectcheck_mk
1.2.4:p1
check_mk_projectcheck_mk
1.2.4:p2
check_mk_projectcheck_mk
1.2.5:i1
check_mk_projectcheck_mk
1.2.5:i2
check_mk_projectcheck_mk
1.2.5:i3
𝑥
= Vulnerable software versions
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
check-mk
artful
ignored
bionic
not-affected
cosmic
not-affected
disco
not-affected
lucid
dne
precise
ignored
trusty
dne
utopic
ignored
vivid
ignored
wily
ignored
xenial
not-affected
yakkety
ignored
zesty
ignored