Werk #6787: Notification spooler: Fixed file path traversal vulnerability

Component Notifications
Title Notification spooler: Fixed file path traversal vulnerability
Date Oct 18, 2018
Level Prominent Change
Class Security Fix
Compatibility Compatible - no manual interaction needed
Checkmk versions & editions
1.6.0b1 Checkmk Enterprise (CEE), Checkmk MSP (CME)
1.5.0p7 Checkmk Enterprise (CEE), Checkmk MSP (CME)
1.4.0p37 Checkmk Enterprise (CEE), Checkmk MSP (CME)

The notification daemon of one site connects to the notification daemon of another site to exchange notifications between both sites.

The notification daemon was not validating the incoming data correctly which made it possible for an attacker that has access to the notification sending site to compromise the receiving site.

Using this vulnerability it was possible to write write files in directories that are writable by the receiving site user. This could be used to gain access to the site.

To the list of all Werks