CVE-2022-31258
20.05.2022, 23:15
In Checkmk before 1.6.0p29, 2.x before 2.0.0p25, and 2.1.x before 2.1.0b10, a site user can escalate to root by editing an OMD hook symlink.
Vendor | Product | Version |
---|---|---|
checkmk | checkmk | 𝑥 < 1.6.0 |
checkmk | checkmk | 1.6.0:b1 |
checkmk | checkmk | 1.6.0:b10 |
checkmk | checkmk | 1.6.0:b12 |
checkmk | checkmk | 1.6.0:b3 |
checkmk | checkmk | 1.6.0:b4 |
checkmk | checkmk | 1.6.0:b5 |
checkmk | checkmk | 1.6.0:b9 |
checkmk | checkmk | 1.6.0:p1 |
checkmk | checkmk | 1.6.0:p10 |
checkmk | checkmk | 1.6.0:p11 |
checkmk | checkmk | 1.6.0:p12 |
checkmk | checkmk | 1.6.0:p13 |
checkmk | checkmk | 1.6.0:p14 |
checkmk | checkmk | 1.6.0:p15 |
checkmk | checkmk | 1.6.0:p16 |
checkmk | checkmk | 1.6.0:p19 |
checkmk | checkmk | 1.6.0:p2 |
checkmk | checkmk | 1.6.0:p20 |
checkmk | checkmk | 1.6.0:p21 |
checkmk | checkmk | 1.6.0:p22 |
checkmk | checkmk | 1.6.0:p23 |
checkmk | checkmk | 1.6.0:p24 |
checkmk | checkmk | 1.6.0:p25 |
checkmk | checkmk | 1.6.0:p26 |
checkmk | checkmk | 1.6.0:p27 |
checkmk | checkmk | 1.6.0:p28 |
checkmk | checkmk | 1.6.0:p3 |
checkmk | checkmk | 1.6.0:p4 |
checkmk | checkmk | 1.6.0:p5 |
checkmk | checkmk | 1.6.0:p6 |
checkmk | checkmk | 1.6.0:p7 |
checkmk | checkmk | 1.6.0:p8 |
checkmk | checkmk | 1.6.0:p9 |
checkmk | checkmk | 2.0.0 |
checkmk | checkmk | 2.0.0:b1 |
checkmk | checkmk | 2.0.0:b2 |
checkmk | checkmk | 2.0.0:b3 |
checkmk | checkmk | 2.0.0:b4 |
checkmk | checkmk | 2.0.0:b5 |
checkmk | checkmk | 2.0.0:b6 |
checkmk | checkmk | 2.0.0:b7 |
checkmk | checkmk | 2.0.0:b8 |
checkmk | checkmk | 2.0.0:i1 |
checkmk | checkmk | 2.0.0:p1 |
checkmk | checkmk | 2.0.0:p10 |
checkmk | checkmk | 2.0.0:p11 |
checkmk | checkmk | 2.0.0:p12 |
checkmk | checkmk | 2.0.0:p13 |
checkmk | checkmk | 2.0.0:p14 |
checkmk | checkmk | 2.0.0:p15 |
checkmk | checkmk | 2.0.0:p16 |
checkmk | checkmk | 2.0.0:p17 |
checkmk | checkmk | 2.0.0:p18 |
checkmk | checkmk | 2.0.0:p19 |
checkmk | checkmk | 2.0.0:p2 |
checkmk | checkmk | 2.0.0:p20 |
checkmk | checkmk | 2.0.0:p21 |
checkmk | checkmk | 2.0.0:p22 |
checkmk | checkmk | 2.0.0:p23 |
checkmk | checkmk | 2.0.0:p24 |
checkmk | checkmk | 2.0.0:p3 |
checkmk | checkmk | 2.0.0:p4 |
checkmk | checkmk | 2.0.0:p5 |
checkmk | checkmk | 2.0.0:p6 |
checkmk | checkmk | 2.0.0:p7 |
checkmk | checkmk | 2.0.0:p8 |
checkmk | checkmk | 2.0.0:p9 |
checkmk | checkmk | 2.1.0:b1 |
checkmk | checkmk | 2.1.0:b2 |
checkmk | checkmk | 2.1.0:b3 |
checkmk | checkmk | 2.1.0:b4 |
checkmk | checkmk | 2.1.0:b5 |
checkmk | checkmk | 2.1.0:b6 |
checkmk | checkmk | 2.1.0:b7 |
checkmk | checkmk | 2.1.0:b8 |
checkmk | checkmk | 2.1.0:b9 |
tribe29 | checkmk | 1.6.0b10:b10 |
tribe29 | checkmk | 1.6.0b11:b11 |
tribe29 | checkmk | 1.6.0p10:p10 |
tribe29 | checkmk | 1.6.0p11:p11 |
tribe29 | checkmk | 1.6.0p12:p12 |
tribe29 | checkmk | 1.6.0p13:p13 |
tribe29 | checkmk | 1.6.0p14:p14 |
tribe29 | checkmk | 1.6.0p15:p15 |
tribe29 | checkmk | 1.6.0p16:p16 |
tribe29 | checkmk | 1.6.0p17:p17 |
tribe29 | checkmk | 1.6.0p18:p18 |
𝑥
= Vulnerable software versions