CVE-2024-13723

The "NagVis" component within Checkmk is vulnerable to remote code execution. An authenticated attacker with administrative level privileges is able to upload a malicious PHP file and modify specific settings to execute the contents of the file as PHP.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.2 HIGH
NETWORK
LOW
HIGH
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
KoreLogicCNA
---
---
CVEADP
---
---
CISA-ADPADP
7.2 HIGH
NETWORK
LOW
HIGH
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Awaiting analysis
This vulnerability is currently awaiting analysis.
Base Score
CVSS 3.x
EPSS Score
Percentile: 29%
Debian logo
Debian Releases
Debian Product
Codename
nagvis
bullseye
vulnerable
bookworm
no-dsa
bullseye (security)
1:1.9.25-2+deb11u1
fixed
trixie
1:1.9.46-1
fixed
sid
1:1.9.47-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
check-mk
plucky
dne
oracular
dne
noble
dne
jammy
dne
focal
dne
bionic
needs-triage
xenial
needs-triage
nagvis
plucky
not-affected
oracular
not-affected
noble
needs-triage
jammy
needs-triage
focal
dne
bionic
needs-triage
xenial
needs-triage