Werk #16273: Local privilege escalation in agent plugin 'mk_tsm'

Component Checks & agents
Title Local privilege escalation in agent plugin 'mk_tsm'
Date Dec 12, 2023
Checkmk Version 2.3.0b1 2.2.0p18 2.1.0p38
Level Trivial Change
Class Security Fix
Compatibility Incompatible - Manual interaction might be required
Affected Editions
2.3.0b1 Checkmk Raw (CRE), Checkmk Enterprise (CEE), Checkmk Cloud (CCE), Checkmk MSP (CME)
2.2.0p18 Checkmk Raw (CRE), Checkmk Enterprise (CEE), Checkmk Cloud (CCE), Checkmk MSP (CME)
2.1.0p38 Checkmk Raw (CRE), Checkmk Enterprise (CEE), Checkmk MSP (CME)

By crafting a malicious command that then shows up in the output of ps users of monitored hosts could gain root privileges. This was achieved by exploiting the insufficient quoting when using ksh's eval to create the required environment.

This issue was found during internal review.

Affected Versions

  • 2.2.0
  • 2.1.0
  • 2.0.0 (EOL) and older

Mitigations

If updating is not possible, disable the Tivoli Storage Manager plugin.

Vulnerability Management

We have rated the issue with a CVSS score of 8.8 (High) with the following CVSS vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

We have assigned CVE-2023-6735.

Changes

With this change we no longer use eval and fixe the quoting. This prevents variable exports being missinterpreted as commands to execute.

To the list of all Werks