First published: Mon Feb 20 2023(Updated: )
Limited Server-Side Request Forgery (SSRF) in agent-receiver in Tribe29's Checkmk <= 2.1.0p11 allows an attacker to communicate with local network restricted endpoints by use of the host registration API.
Credit: security@checkmk.com security@checkmk.com
Affected Software | Affected Version | How to fix |
---|---|---|
Tribe29 Checkmk | =2.1.0 | |
Tribe29 Checkmk | =2.1.0-b1 | |
Tribe29 Checkmk | =2.1.0-b2 | |
Tribe29 Checkmk | =2.1.0-b3 | |
Tribe29 Checkmk | =2.1.0-b4 | |
Tribe29 Checkmk | =2.1.0-b5 | |
Tribe29 Checkmk | =2.1.0-b6 | |
Tribe29 Checkmk | =2.1.0-b7 | |
Tribe29 Checkmk | =2.1.0-b8 | |
Tribe29 Checkmk | =2.1.0-b9 | |
Tribe29 Checkmk | =2.1.0-p1 | |
Tribe29 Checkmk | =2.1.0-p10 | |
Tribe29 Checkmk | =2.1.0-p11 | |
Tribe29 Checkmk | =2.1.0-p2 | |
Tribe29 Checkmk | =2.1.0-p3 | |
Tribe29 Checkmk | =2.1.0-p4 | |
Tribe29 Checkmk | =2.1.0-p5 | |
Tribe29 Checkmk | =2.1.0-p6 | |
Tribe29 Checkmk | =2.1.0-p7 | |
Tribe29 Checkmk | =2.1.0-p8 | |
Tribe29 Checkmk | =2.1.0-p9 | |
Checkmk Checkmk | =2.1.0 | |
Checkmk Checkmk | =2.1.0-b1 | |
Checkmk Checkmk | =2.1.0-b2 | |
Checkmk Checkmk | =2.1.0-b3 | |
Checkmk Checkmk | =2.1.0-b4 | |
Checkmk Checkmk | =2.1.0-b5 | |
Checkmk Checkmk | =2.1.0-b6 | |
Checkmk Checkmk | =2.1.0-b7 | |
Checkmk Checkmk | =2.1.0-b8 | |
Checkmk Checkmk | =2.1.0-b9 | |
Checkmk Checkmk | =2.1.0-p1 | |
Checkmk Checkmk | =2.1.0-p10 | |
Checkmk Checkmk | =2.1.0-p11 | |
Checkmk Checkmk | =2.1.0-p2 | |
Checkmk Checkmk | =2.1.0-p3 | |
Checkmk Checkmk | =2.1.0-p4 | |
Checkmk Checkmk | =2.1.0-p5 | |
Checkmk Checkmk | =2.1.0-p6 | |
Checkmk Checkmk | =2.1.0-p7 | |
Checkmk Checkmk | =2.1.0-p8 | |
Checkmk Checkmk | =2.1.0-p9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-48321 is a vulnerability in Tribe29's Checkmk <= 2.1.0p11 that allows an attacker to communicate with local network restricted endpoints by using the host registration API.
CVE-2022-48321 has a severity rating of 7.8, which is classified as high.
CVE-2022-48321 affects Tribe29 Checkmk versions 2.1.0 to 2.1.0p11, including the beta versions.
An attacker can exploit CVE-2022-48321 by performing a limited Server-Side Request Forgery (SSRF) in the agent-receiver component of Tribe29 Checkmk, allowing them to communicate with restricted local network endpoints.
Yes, there is a fix available for CVE-2022-48321. Users should update to Checkmk version 2.1.0p12 or a later version to mitigate the vulnerability.