The "NagVis" component within Checkmk is vulnerable to remote code execution. An authenticated attacker with administrative level privileges is able to upload a malicious PHP file and modify specific settings to execute the contents of the file as PHP.
{
"binaries": [
{
"binary_version": "1.2.8p16-1ubuntu0.2",
"binary_name": "check-mk-agent"
},
{
"binary_version": "1.2.8p16-1ubuntu0.2",
"binary_name": "check-mk-agent-logwatch"
},
{
"binary_version": "1.2.8p16-1ubuntu0.2",
"binary_name": "check-mk-config-icinga"
},
{
"binary_version": "1.2.8p16-1ubuntu0.2",
"binary_name": "check-mk-livestatus"
},
{
"binary_version": "1.2.8p16-1ubuntu0.2",
"binary_name": "check-mk-multisite"
},
{
"binary_version": "1.2.8p16-1ubuntu0.2",
"binary_name": "check-mk-server"
}
]
}{
"binaries": [
{
"binary_version": "1.2.6p12-1ubuntu0.16.04.1+esm1",
"binary_name": "check-mk-agent"
},
{
"binary_version": "1.2.6p12-1ubuntu0.16.04.1+esm1",
"binary_name": "check-mk-agent-logwatch"
},
{
"binary_version": "1.2.6p12-1ubuntu0.16.04.1+esm1",
"binary_name": "check-mk-config-icinga"
},
{
"binary_version": "1.2.6p12-1ubuntu0.16.04.1+esm1",
"binary_name": "check-mk-config-nagios3"
},
{
"binary_version": "1.2.6p12-1ubuntu0.16.04.1+esm1",
"binary_name": "check-mk-livestatus"
},
{
"binary_version": "1.2.6p12-1ubuntu0.16.04.1+esm1",
"binary_name": "check-mk-multisite"
},
{
"binary_version": "1.2.6p12-1ubuntu0.16.04.1+esm1",
"binary_name": "check-mk-server"
}
]
}