The "NagVis" component within Checkmk is vulnerable to remote code execution. An authenticated attacker with administrative level privileges is able to upload a malicious PHP file and modify specific settings to execute the contents of the file as PHP.
{
"binaries": [
{
"binary_name": "check-mk-agent",
"binary_version": "1.2.8p16-1ubuntu0.2"
},
{
"binary_name": "check-mk-agent-logwatch",
"binary_version": "1.2.8p16-1ubuntu0.2"
},
{
"binary_name": "check-mk-config-icinga",
"binary_version": "1.2.8p16-1ubuntu0.2"
},
{
"binary_name": "check-mk-livestatus",
"binary_version": "1.2.8p16-1ubuntu0.2"
},
{
"binary_name": "check-mk-multisite",
"binary_version": "1.2.8p16-1ubuntu0.2"
},
{
"binary_name": "check-mk-server",
"binary_version": "1.2.8p16-1ubuntu0.2"
}
]
}{
"binaries": [
{
"binary_name": "check-mk-agent",
"binary_version": "1.2.6p12-1ubuntu0.16.04.1+esm1"
},
{
"binary_name": "check-mk-agent-logwatch",
"binary_version": "1.2.6p12-1ubuntu0.16.04.1+esm1"
},
{
"binary_name": "check-mk-config-icinga",
"binary_version": "1.2.6p12-1ubuntu0.16.04.1+esm1"
},
{
"binary_name": "check-mk-config-nagios3",
"binary_version": "1.2.6p12-1ubuntu0.16.04.1+esm1"
},
{
"binary_name": "check-mk-livestatus",
"binary_version": "1.2.6p12-1ubuntu0.16.04.1+esm1"
},
{
"binary_name": "check-mk-multisite",
"binary_version": "1.2.6p12-1ubuntu0.16.04.1+esm1"
},
{
"binary_name": "check-mk-server",
"binary_version": "1.2.6p12-1ubuntu0.16.04.1+esm1"
}
]
}