Description
The web management console of CheckMK Enterprise Edition (versions 1.5.0 to 2.0.0p9) does not properly sanitise the uploading of ".mkp" files, which are Extension Packages, making remote code execution possible. Successful exploitation requires access to the web management interface, either with valid credentials or with a hijacked session of a user with administrator role. NOTE: the vendor states that this is the intended behavior: admins are supposed to be able to execute code in this manner
Exploits (1)
References (2)
Core 2
Core References
Product x_refsource_misc
http://checkmk.com
Exploit, Third Party Advisory x_refsource_misc
https://github.com/Edgarloyola/CVE-2021-40905
Scores
CVSS v3
8.8
EPSS
0.0488
EPSS Percentile
89.6%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
total
Details
CWE
CWE-434
Status
published
Products (2)
checkmk/checkmk
2.0.0 (27 CPE variants)
tribe29/checkmk
1.5.0 - 2.0.0
Published
Mar 25, 2022
Tracked Since
Feb 18, 2026