Checkmk Conference #6 goes digital. Get your tickets here!
|Title||WATO backups: Fix file path traversal vulnerability|
|Checkmk Edition||Checkmk Raw Edition (CRE)|
|Compatibility||Compatible - no manual interaction needed|
The backup target directory was not validated correctly which made it possible for an attacker that has access to WATO backups to compromise the site.
Using this vulnerability it was possible to write backup files to directories that are writable by the site user.
Thanks to Robin `ypid` Schneider.