Werk #6787: Notification spooler: Fixed file path traversal vulnerability
Komponente | Notifications |
Titel | Notification spooler: Fixed file path traversal vulnerability |
Datum | 18.10.2018 |
Checkmk Edition | Checkmk Enterprise (CEE) |
Checkmk-Version | 1.4.0p37 1.5.0p7 1.6.0b1 |
Level | Bedeutende Änderung |
Klasse | Sicherheitsfix |
Kompatibilität | Kompatibel - benötigt kein manuelles Eingreifen |
The notification daemon of one site connects to the notification daemon of another site to exchange notifications between both sites.
The notification daemon was not validating the incoming data correctly which made it possible for an attacker that has access to the notification sending site to compromise the receiving site.
Using this vulnerability it was possible to write write files in directories that are writable by the receiving site user. This could be used to gain access to the site.