CVE-2023-0284

Improper Input Validation of LDAP user IDs in Tribe29 Checkmk allows attackers that can control LDAP user IDs to manipulate files on the server. Checkmk <= 2.1.0p19, Checkmk <= 2.0.0p32, and all versions of Checkmk 1.6.0 (EOL) are affected.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
6.8 MEDIUM
NETWORK
HIGH
LOW
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
Tribe29CNA
6.8 MEDIUM
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H
CVEADP
---
---
CISA-ADPADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 62%
VendorProductVersion
checkmkcheckmk
2.0.0
checkmkcheckmk
2.0.0:b1
checkmkcheckmk
2.0.0:b2
checkmkcheckmk
2.0.0:b3
checkmkcheckmk
2.0.0:b4
checkmkcheckmk
2.0.0:b5
checkmkcheckmk
2.0.0:b6
checkmkcheckmk
2.0.0:b7
checkmkcheckmk
2.0.0:b8
checkmkcheckmk
2.0.0:i1
checkmkcheckmk
2.0.0:p1
checkmkcheckmk
2.0.0:p10
checkmkcheckmk
2.0.0:p11
checkmkcheckmk
2.0.0:p12
checkmkcheckmk
2.0.0:p13
checkmkcheckmk
2.0.0:p14
checkmkcheckmk
2.0.0:p15
checkmkcheckmk
2.0.0:p16
checkmkcheckmk
2.0.0:p17
checkmkcheckmk
2.0.0:p18
checkmkcheckmk
2.0.0:p19
checkmkcheckmk
2.0.0:p2
checkmkcheckmk
2.0.0:p20
checkmkcheckmk
2.0.0:p21
checkmkcheckmk
2.0.0:p22
checkmkcheckmk
2.0.0:p23
checkmkcheckmk
2.0.0:p24
checkmkcheckmk
2.0.0:p25
checkmkcheckmk
2.0.0:p26
checkmkcheckmk
2.0.0:p27
checkmkcheckmk
2.0.0:p28
checkmkcheckmk
2.0.0:p29
checkmkcheckmk
2.0.0:p3
checkmkcheckmk
2.0.0:p30
checkmkcheckmk
2.0.0:p31
checkmkcheckmk
2.0.0:p32
checkmkcheckmk
2.0.0:p4
checkmkcheckmk
2.0.0:p5
checkmkcheckmk
2.0.0:p6
checkmkcheckmk
2.0.0:p7
checkmkcheckmk
2.0.0:p8
checkmkcheckmk
2.0.0:p9
checkmkcheckmk
2.1.0:b1
checkmkcheckmk
2.1.0:b2
checkmkcheckmk
2.1.0:b3
checkmkcheckmk
2.1.0:b4
checkmkcheckmk
2.1.0:b5
checkmkcheckmk
2.1.0:b6
checkmkcheckmk
2.1.0:b7
checkmkcheckmk
2.1.0:b8
checkmkcheckmk
2.1.0:b9
checkmkcheckmk
2.1.0:p1
checkmkcheckmk
2.1.0:p10
checkmkcheckmk
2.1.0:p11
checkmkcheckmk
2.1.0:p12
checkmkcheckmk
2.1.0:p13
checkmkcheckmk
2.1.0:p14
checkmkcheckmk
2.1.0:p15
checkmkcheckmk
2.1.0:p16
checkmkcheckmk
2.1.0:p17
checkmkcheckmk
2.1.0:p18
checkmkcheckmk
2.1.0:p19
checkmkcheckmk
2.1.0:p2
checkmkcheckmk
2.1.0:p3
checkmkcheckmk
2.1.0:p4
checkmkcheckmk
2.1.0:p5
checkmkcheckmk
2.1.0:p6
checkmkcheckmk
2.1.0:p7
checkmkcheckmk
2.1.0:p8
checkmkcheckmk
2.1.0:p9
tribe29checkmk
1.6.0 ≤
𝑥
< 2.0.0
𝑥
= Vulnerable software versions
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
check-mk
kinetic
dne
jammy
dne
focal
dne
bionic
needs-triage
xenial
needs-triage
trusty
ignored