PHP code injection in watolib auth.php and hosttags.php in Tribe29's Checkmk <= 2.1.0p10, Checkmk <= 2.0.0p27, and Checkmk <= 1.6.0p29 allows an attacker to inject and execute PHP code which will be executed upon request of the vulnerable component.
{
"binaries": [
{
"binary_name": "check-mk-agent",
"binary_version": "1.2.6p12-1ubuntu0.16.04.1+esm1"
},
{
"binary_name": "check-mk-agent-logwatch",
"binary_version": "1.2.6p12-1ubuntu0.16.04.1+esm1"
},
{
"binary_name": "check-mk-config-icinga",
"binary_version": "1.2.6p12-1ubuntu0.16.04.1+esm1"
},
{
"binary_name": "check-mk-config-nagios3",
"binary_version": "1.2.6p12-1ubuntu0.16.04.1+esm1"
},
{
"binary_name": "check-mk-livestatus",
"binary_version": "1.2.6p12-1ubuntu0.16.04.1+esm1"
},
{
"binary_name": "check-mk-multisite",
"binary_version": "1.2.6p12-1ubuntu0.16.04.1+esm1"
},
{
"binary_name": "check-mk-server",
"binary_version": "1.2.6p12-1ubuntu0.16.04.1+esm1"
}
]
}
{
"binaries": [
{
"binary_name": "check-mk-agent",
"binary_version": "1.2.8p16-1ubuntu0.2"
},
{
"binary_name": "check-mk-agent-logwatch",
"binary_version": "1.2.8p16-1ubuntu0.2"
},
{
"binary_name": "check-mk-config-icinga",
"binary_version": "1.2.8p16-1ubuntu0.2"
},
{
"binary_name": "check-mk-livestatus",
"binary_version": "1.2.8p16-1ubuntu0.2"
},
{
"binary_name": "check-mk-multisite",
"binary_version": "1.2.8p16-1ubuntu0.2"
},
{
"binary_name": "check-mk-server",
"binary_version": "1.2.8p16-1ubuntu0.2"
}
]
}