CVE-2024-28826
29.05.2024, 10:15
Improper restriction of local upload and download paths in check_sftp in Checkmk before 2.3.0p4, 2.2.0p27, 2.1.0p44, and in Checkmk 2.0.0 (EOL) allows attackers with sufficient permissions to configure the check to read and write local files on the Checkmk site server.Enginsight
Vendor | Product | Version |
---|---|---|
checkmk | checkmk | 2.0.0p39 < 𝑥 < 2.0.0p39 |
checkmk | checkmk | 2.1.0p44 < 𝑥 < 2.1.0p44 |
checkmk | checkmk | 2.2.0p27 < 𝑥 < 2.2.0p27 |
checkmk | checkmk | 2.3.0p4 < 𝑥 < 2.3.0p4 |
checkmk | checkmk | 𝑥 ≤ 2.0.0 |
checkmk | checkmk | 2.1.0 |
checkmk | checkmk | 2.1.0:b1 |
checkmk | checkmk | 2.1.0:b2 |
checkmk | checkmk | 2.1.0:b3 |
checkmk | checkmk | 2.1.0:b4 |
checkmk | checkmk | 2.1.0:b5 |
checkmk | checkmk | 2.1.0:b6 |
checkmk | checkmk | 2.1.0:b7 |
checkmk | checkmk | 2.1.0:b8 |
checkmk | checkmk | 2.1.0:b9 |
checkmk | checkmk | 2.1.0:p1 |
checkmk | checkmk | 2.1.0:p10 |
checkmk | checkmk | 2.1.0:p11 |
checkmk | checkmk | 2.1.0:p12 |
checkmk | checkmk | 2.1.0:p13 |
checkmk | checkmk | 2.1.0:p14 |
checkmk | checkmk | 2.1.0:p15 |
checkmk | checkmk | 2.1.0:p16 |
checkmk | checkmk | 2.1.0:p17 |
checkmk | checkmk | 2.1.0:p18 |
checkmk | checkmk | 2.1.0:p19 |
checkmk | checkmk | 2.1.0:p2 |
checkmk | checkmk | 2.1.0:p20 |
checkmk | checkmk | 2.1.0:p21 |
checkmk | checkmk | 2.1.0:p22 |
checkmk | checkmk | 2.1.0:p23 |
checkmk | checkmk | 2.1.0:p24 |
checkmk | checkmk | 2.1.0:p25 |
checkmk | checkmk | 2.1.0:p26 |
checkmk | checkmk | 2.1.0:p27 |
checkmk | checkmk | 2.1.0:p28 |
checkmk | checkmk | 2.1.0:p29 |
checkmk | checkmk | 2.1.0:p3 |
checkmk | checkmk | 2.1.0:p30 |
checkmk | checkmk | 2.1.0:p31 |
checkmk | checkmk | 2.1.0:p32 |
checkmk | checkmk | 2.1.0:p33 |
checkmk | checkmk | 2.1.0:p34 |
checkmk | checkmk | 2.1.0:p35 |
checkmk | checkmk | 2.1.0:p36 |
checkmk | checkmk | 2.1.0:p37 |
checkmk | checkmk | 2.1.0:p38 |
checkmk | checkmk | 2.1.0:p39 |
checkmk | checkmk | 2.1.0:p4 |
checkmk | checkmk | 2.1.0:p40 |
checkmk | checkmk | 2.1.0:p41 |
checkmk | checkmk | 2.1.0:p42 |
checkmk | checkmk | 2.1.0:p43 |
checkmk | checkmk | 2.1.0:p5 |
checkmk | checkmk | 2.1.0:p6 |
checkmk | checkmk | 2.1.0:p7 |
checkmk | checkmk | 2.1.0:p8 |
checkmk | checkmk | 2.1.0:p9 |
checkmk | checkmk | 2.2.0 |
checkmk | checkmk | 2.2.0:b1 |
checkmk | checkmk | 2.2.0:b2 |
checkmk | checkmk | 2.2.0:b3 |
checkmk | checkmk | 2.2.0:b4 |
checkmk | checkmk | 2.2.0:b5 |
checkmk | checkmk | 2.2.0:b6 |
checkmk | checkmk | 2.2.0:b7 |
checkmk | checkmk | 2.2.0:b8 |
checkmk | checkmk | 2.2.0:i1 |
checkmk | checkmk | 2.2.0:p1 |
checkmk | checkmk | 2.2.0:p10 |
checkmk | checkmk | 2.2.0:p11 |
checkmk | checkmk | 2.2.0:p12 |
checkmk | checkmk | 2.2.0:p13 |
checkmk | checkmk | 2.2.0:p14 |
checkmk | checkmk | 2.2.0:p15 |
checkmk | checkmk | 2.2.0:p16 |
checkmk | checkmk | 2.2.0:p17 |
checkmk | checkmk | 2.2.0:p18 |
checkmk | checkmk | 2.2.0:p19 |
checkmk | checkmk | 2.2.0:p2 |
checkmk | checkmk | 2.2.0:p20 |
checkmk | checkmk | 2.2.0:p21 |
checkmk | checkmk | 2.2.0:p22 |
checkmk | checkmk | 2.2.0:p23 |
checkmk | checkmk | 2.2.0:p24 |
checkmk | checkmk | 2.2.0:p25 |
checkmk | checkmk | 2.2.0:p26 |
checkmk | checkmk | 2.2.0:p3 |
checkmk | checkmk | 2.2.0:p4 |
checkmk | checkmk | 2.2.0:p5 |
checkmk | checkmk | 2.2.0:p6 |
checkmk | checkmk | 2.2.0:p7 |
checkmk | checkmk | 2.2.0:p8 |
checkmk | checkmk | 2.2.0:p9 |
checkmk | checkmk | 2.3.0 |
checkmk | checkmk | 2.3.0:b1 |
checkmk | checkmk | 2.3.0:b2 |
checkmk | checkmk | 2.3.0:b3 |
checkmk | checkmk | 2.3.0:b4 |
checkmk | checkmk | 2.3.0:b5 |
checkmk | checkmk | 2.3.0:b6 |
checkmk | checkmk | 2.3.0:p1 |
checkmk | checkmk | 2.3.0:p2 |
checkmk | checkmk | 2.3.0:p3 |
𝑥
= Vulnerable software versions

Ubuntu Releases
Common Weakness Enumeration
- CWE-73 - External Control of File Name or PathThe software allows user input to control or influence paths or file names that are used in filesystem operations.
- CWE-610 - Externally Controlled Reference to a Resource in Another SphereThe product uses an externally controlled name or reference that resolves to a resource that is outside of the intended control sphere.