UBUNTU-CVE-2024-38865

Source
https://ubuntu.com/security/CVE-2024-38865
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2024/UBUNTU-CVE-2024-38865.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2024-38865
Related
  • CVE-2024-38865
Published
2025-04-11T00:00:00Z
Modified
2025-04-11T16:43:17Z
Summary
[none]
Details

Improper neutralization of livestatus command delimiters in a specific endpoint within RestAPI of Checkmk prior to 2.2.0p39, 2.3.0p25, and 2.1.0p51 (EOL) allows arbitrary livestatus command execution. Exploitation requires the attacker to have a contact group assigned to their user account and for an event to originate from a host with the same contact group or from an event generated with an unknown host.

References

Affected packages

Ubuntu:Pro:16.04:LTS / check-mk

Package

Name
check-mk
Purl
pkg:deb/ubuntu/check-mk@1.2.6p12-1ubuntu0.16.04.1+esm1?arch=source&distro=esm-apps/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.2.6p5-1
1.2.6p12-1
1.2.6p12-1ubuntu0.16.04.1
1.2.6p12-1ubuntu0.16.04.1+esm1

Ecosystem specific

{
    "ubuntu_priority": "medium"
}

Ubuntu:Pro:18.04:LTS / check-mk

Package

Name
check-mk
Purl
pkg:deb/ubuntu/check-mk@1.2.8p16-1ubuntu0.2?arch=source&distro=esm-apps/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

1.*

1.2.8p16-1ubuntu0.1
1.2.8p16-1ubuntu0.2

Ecosystem specific

{
    "ubuntu_priority": "medium"
}