We use cookies to ensure that we give you the best experience on our website.  Visit our Privacy Policy to learn more. If you continue to use this site, we will assume that you are okay with it.

Your choices regarding cookies on this site.
Your preferences have been updated.
In order for the changes to take effect completely please clear your browser cookies and cache. Then reload the page.

Werk #6787: Notification spooler: Fixed file path traversal vulnerability

TitleNotification spooler: Fixed file path traversal vulnerability
Date2018-10-18 09:20:43
Checkmk EditionCheckmk Enterprise Edition (CEE)
Checkmk Version1.4.0p37,1.6.0b1,1.5.0p7
LevelProminent Change
ClassSecurity Fix
CompatibilityCompatible - no manual interaction needed

The notification daemon of one site connects to the notification daemon of another site to exchange notifications between both sites.

The notification daemon was not validating the incoming data correctly which made it possible for an attacker that has access to the notification sending site to compromise the receiving site.

Using this vulnerability it was possible to write write files in directories that are writable by the receiving site user. This could be used to gain access to the site.