Werk #15191: Livestatus command injection in RestAPI
Komponente | REST API | ||||||||
Titel | Livestatus command injection in RestAPI | ||||||||
Datum | 11.05.2023 | ||||||||
Level | Kleine Änderung | ||||||||
Klasse | Sicherheitsfix | ||||||||
Kompatibilität | Kompatibel - benötigt kein manuelles Eingreifen | ||||||||
Checkmk versions & editions |
|
Prior to this Werk all RestAPI endpoints that use Livestatus filter operators were susceptible to injection of Livestatus commands. Any user authorized to use the affected RestAPI routes could hence execute arbitrary Livestatus commands.
This issue was uncovered by internal review.
Affected Versions: * 2.2.0 (beta) * 2.1.0 * 2.0.0
Vulnerability Management: We have rated the issue with a CVSS Score of 8.3 (High) with the following CVSS vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H and assigned CVE CVE-2023-31208.