PHP code injection in watolib auth.php and hosttags.php in Tribe29's Checkmk <= 2.1.0p10, Checkmk <= 2.0.0p27, and Checkmk <= 1.6.0p29 allows an attacker to inject and execute PHP code which will be executed upon request of the vulnerable component.
{
"binaries": [
{
"binary_version": "1.2.6p12-1ubuntu0.16.04.1+esm1",
"binary_name": "check-mk-agent"
},
{
"binary_version": "1.2.6p12-1ubuntu0.16.04.1+esm1",
"binary_name": "check-mk-agent-logwatch"
},
{
"binary_version": "1.2.6p12-1ubuntu0.16.04.1+esm1",
"binary_name": "check-mk-config-icinga"
},
{
"binary_version": "1.2.6p12-1ubuntu0.16.04.1+esm1",
"binary_name": "check-mk-config-nagios3"
},
{
"binary_version": "1.2.6p12-1ubuntu0.16.04.1+esm1",
"binary_name": "check-mk-livestatus"
},
{
"binary_version": "1.2.6p12-1ubuntu0.16.04.1+esm1",
"binary_name": "check-mk-multisite"
},
{
"binary_version": "1.2.6p12-1ubuntu0.16.04.1+esm1",
"binary_name": "check-mk-server"
}
]
}
{
"binaries": [
{
"binary_version": "1.2.8p16-1ubuntu0.2",
"binary_name": "check-mk-agent"
},
{
"binary_version": "1.2.8p16-1ubuntu0.2",
"binary_name": "check-mk-agent-logwatch"
},
{
"binary_version": "1.2.8p16-1ubuntu0.2",
"binary_name": "check-mk-config-icinga"
},
{
"binary_version": "1.2.8p16-1ubuntu0.2",
"binary_name": "check-mk-livestatus"
},
{
"binary_version": "1.2.8p16-1ubuntu0.2",
"binary_name": "check-mk-multisite"
},
{
"binary_version": "1.2.8p16-1ubuntu0.2",
"binary_name": "check-mk-server"
}
]
}