PHP code injection in watolib auth.php and hosttags.php in Tribe29's Checkmk <= 2.1.0p10, Checkmk <= 2.0.0p27, and Checkmk <= 1.6.0p29 allows an attacker to inject and execute PHP code which will be executed upon request of the vulnerable component.
{ "binaries": [ { "binary_version": "1.2.6p12-1ubuntu0.16.04.1+esm1", "binary_name": "check-mk-agent" }, { "binary_version": "1.2.6p12-1ubuntu0.16.04.1+esm1", "binary_name": "check-mk-agent-logwatch" }, { "binary_version": "1.2.6p12-1ubuntu0.16.04.1+esm1", "binary_name": "check-mk-config-icinga" }, { "binary_version": "1.2.6p12-1ubuntu0.16.04.1+esm1", "binary_name": "check-mk-config-nagios3" }, { "binary_version": "1.2.6p12-1ubuntu0.16.04.1+esm1", "binary_name": "check-mk-livestatus" }, { "binary_version": "1.2.6p12-1ubuntu0.16.04.1+esm1", "binary_name": "check-mk-multisite" }, { "binary_version": "1.2.6p12-1ubuntu0.16.04.1+esm1", "binary_name": "check-mk-server" } ] }
{ "binaries": [ { "binary_version": "1.2.8p16-1ubuntu0.2", "binary_name": "check-mk-agent" }, { "binary_version": "1.2.8p16-1ubuntu0.2", "binary_name": "check-mk-agent-logwatch" }, { "binary_version": "1.2.8p16-1ubuntu0.2", "binary_name": "check-mk-config-icinga" }, { "binary_version": "1.2.8p16-1ubuntu0.2", "binary_name": "check-mk-livestatus" }, { "binary_version": "1.2.8p16-1ubuntu0.2", "binary_name": "check-mk-multisite" }, { "binary_version": "1.2.8p16-1ubuntu0.2", "binary_name": "check-mk-server" } ] }