CVE-2023-2020
18.04.2023, 12:15
Insufficient permission checks in the REST API in Tribe29 Checkmk <= 2.1.0p27 and <= 2.2.0b4 (beta) allow unauthorized users to schedule downtimes for any host.Enginsight
Vendor | Product | Version |
---|---|---|
checkmk | checkmk | 2.1.0 |
checkmk | checkmk | 2.1.0:b1 |
checkmk | checkmk | 2.1.0:b2 |
checkmk | checkmk | 2.1.0:b3 |
checkmk | checkmk | 2.1.0:b4 |
checkmk | checkmk | 2.1.0:b5 |
checkmk | checkmk | 2.1.0:b6 |
checkmk | checkmk | 2.1.0:b7 |
checkmk | checkmk | 2.1.0:b8 |
checkmk | checkmk | 2.1.0:b9 |
checkmk | checkmk | 2.1.0:p1 |
checkmk | checkmk | 2.1.0:p10 |
checkmk | checkmk | 2.1.0:p11 |
checkmk | checkmk | 2.1.0:p12 |
checkmk | checkmk | 2.1.0:p13 |
checkmk | checkmk | 2.1.0:p14 |
checkmk | checkmk | 2.1.0:p15 |
checkmk | checkmk | 2.1.0:p16 |
checkmk | checkmk | 2.1.0:p17 |
checkmk | checkmk | 2.1.0:p18 |
checkmk | checkmk | 2.1.0:p2 |
checkmk | checkmk | 2.1.0:p20 |
checkmk | checkmk | 2.1.0:p21 |
checkmk | checkmk | 2.1.0:p22 |
checkmk | checkmk | 2.1.0:p23 |
checkmk | checkmk | 2.1.0:p24 |
checkmk | checkmk | 2.1.0:p25 |
checkmk | checkmk | 2.1.0:p26 |
checkmk | checkmk | 2.1.0:p27 |
checkmk | checkmk | 2.1.0:p3 |
checkmk | checkmk | 2.1.0:p4 |
checkmk | checkmk | 2.1.0:p5 |
checkmk | checkmk | 2.1.0:p6 |
checkmk | checkmk | 2.1.0:p7 |
checkmk | checkmk | 2.1.0:p8 |
checkmk | checkmk | 2.1.0:p9 |
checkmk | checkmk | 2.2.0:b1 |
checkmk | checkmk | 2.2.0:b2 |
checkmk | checkmk | 2.2.0:b3 |
checkmk | checkmk | 2.2.0:b4 |
checkmk | checkmk | 2.2.0:i1 |
𝑥
= Vulnerable software versions

Ubuntu Releases
Common Weakness Enumeration
- CWE-280 - Improper Handling of Insufficient Permissions or PrivilegesThe application does not handle or incorrectly handles when it has insufficient privileges to access resources or functionality as specified by their permissions. This may cause it to follow unexpected code paths that may leave the application in an invalid state.
- CWE-863 - Incorrect AuthorizationThe software performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check. This allows attackers to bypass intended access restrictions.