Checkmk Vulnerabilities Can Be Chained for Remote Code Execution By Orbit Brain November 3, 2022 0 316 viewsCyber Security News Dwelling › VulnerabilitiesCheckmk Vulnerabilities Can Be Chained for Distant Code ExecutionBy Ionut Arghire on November 03, 2022TweetResearchers at code safety agency Sonar Supply have shared particulars on a number of Checkmk vulnerabilities that could possibly be chained collectively to execute code remotely, with out authentication.Written in Python and C++, Checkmk is an IT Infrastructure monitoring answer that permits organizations to watch servers, containers, cloud infrastructure, networks, databases, and different property utilizing a single net interface.“Based on the seller’s web site, greater than 2,000 clients depend on Checkmk. As a result of its function, Checkmk is a central part often deployed at a privileged place in an organization’s community. This makes it a high-profile goal for menace actors,” Sonar Supply notes.The corporate has recognized 4 vulnerabilities in Checkmk and its NagVis integration, together with two with a ‘important’ severity score (CVSS rating of 9.1).These safety defects, Sonar Supply warns, “could be chained collectively by an unauthenticated, distant attacker to totally take over the server operating a susceptible model of Checkmk.”The primary of the problems is described as a code injection vulnerability within the watolib part, which existed as a result of consumer information entered in Wato was improperly sanitized when writing to the PHP file.“Previous to this Werk it was doable for authenticated customers to inject PHP code in recordsdata generated by Wato for NagVis integration. The code can be executed as soon as a request to the respective NagVis part is made,” Checkmk explains.The second critical-severity flaw is described as an arbitrary file learn impacting NagVis, the part chargeable for creating community maps.“An authenticated attacker can learn arbitrary recordsdata with the permissions of the online server consumer,” Checkmk notes in its advisory.The 2 different vulnerabilities, each rated ‘medium severity’, are a line feed injection and a restricted server-side request forgery (SSRF) challenge.“A few of the recognized vulnerabilities have restricted sensible influence on their very own. Nonetheless, a malicious attacker can chain them collectively to attain distant code execution,” Sonar Supply underlines.The code evaluation agency explains that the exploitation chain would begin with the unauthenticated attacker exploiting the SSRF to entry an endpoint reachable from the localhost solely and which is susceptible to the road feed injection.By forging arbitrary LQL queries – which Checkmk makes use of to fetch information from the monitoring core – the attacker can then delete arbitrary recordsdata, which might permit them to bypass current authentication mechanisms and entry NagVis.With entry to NagVis, the attacker might exploit the arbitrary file learn to entry a particular Checkmk configuration file and achieve entry to the Checkmk GUI, after which exploit the code injection in watolib to attain distant code execution (RCE).Sonar Supply reported the vulnerabilities to Checkmk on August 22, which patched them inside every week.Associated: Crucial Packagist Vulnerability Opened Door for PHP Provide Chain AssaultAssociated: VMware Patches Crucial Vulnerability in Finish-of-Life ProductAssociated: Anxiously Awaited OpenSSL Vulnerability’s Severity Downgraded From Crucial to ExcessiveGet the Day by day Briefing Most CurrentMost LearnPurple Cross Seeks ‘Digital Emblem’ to Defend In opposition to HackingOffense Will get the Glory, however Protection Wins the RecreationMicrosoft Extends Support for Ukraine’s Wartime Tech InnovationCisco Patches Excessive-Severity Bugs in E mail, Identification, Net Safety MerchandiseWebinar At this time: ESG – CISO’s Information to an Rising Threat CornerstoneSplunk Patches 9 Excessive-Severity Vulnerabilities in Enterprise ProductFrench-Talking Cybercrime Group Stole Tens of millions From BanksCheckmk Vulnerabilities Can Be Chained for Distant Code ExecutionOver 250 US Information Web sites Ship Malware by way of Provide Chain AssaultFortinet Patches 6 Excessive-Severity VulnerabilitiesIn search of Malware in All of the Mistaken Locations?First Step For The Web’s subsequent 25 years: Including Safety to the DNSTattle Story: What Your Laptop Says About YouBe in a Place to Act Via Cyber Situational ConsciousnessReport Reveals Closely Regulated Industries Letting Social Networking Apps Run Rampant2010, A Nice 12 months To Be a Scammer.Do not Let DNS be Your Single Level of FailureLearn how to Determine Malware in a BlinkDefining and Debating Cyber WarfareThe 5 A’s that Make Cybercrime so EngagingLearn how to Defend In opposition to DDoS AssaultsSafety Budgets Not in Line with ThreatsAnycast – Three Causes Why Your DNS Community Ought to Use ItThe Evolution of the Prolonged Enterprise: Safety Methods for Ahead Considering OrganizationsUtilizing DNS Throughout the Prolonged Enterprise: It’s Dangerous Enterprise Checkmk code injection critical exploit chain patch rce unauthenticated vulnerability Orbit Brainhttp://orbitbrain.com/ Orbit Brain is the senior science writer and technology expert. Our aim provides the best information about technology and web development designing SEO graphics designing video animation tutorials and how to use software easy waysand much more. Like Best Service Latest Technology, Information Technology, Personal Tech Blogs, Technology Blog Topics, Technology Blogs For Students, Futurism Blog.
HackerOne Surpasses $230 Million in Paid Bug BountiesIntroducing the Cyber Security News HackerOne Surpasses $230 Million in Paid Bug Bounties.... December 14, 2022 Cyber Security News
Microsoft: North Korean Hackers Target SMBs With H0lyGh0st RansomwareIntroducing the Cyber Security News Microsoft: North Korean Hackers Target SMBs With H0lyGh0st Ransomware.... July 15, 2022 Cyber Security News
Cybersecurity M&A Roundup: 39 Deals Announced in July 2022Introducing the Cyber Security News Cybersecurity M&A Roundup: 39 Deals Announced in July 2022.... August 3, 2022 Cyber Security News
Two Remote Code Execution Vulnerabilities Patched in WhatsAppIntroducing the Cyber Security News Two Remote Code Execution Vulnerabilities Patched in WhatsApp.... September 27, 2022 Cyber Security News
Pwn2Own Offers $100,000 for Home Office Hacking ScenarioIntroducing the Cyber Security News Pwn2Own Offers $100,000 for Home Office Hacking Scenario.... August 30, 2022 Cyber Security News
VMware Patches VM Escape Flaw Exploited at Geekpwn EventIntroducing the Cyber Security News VMware Patches VM Escape Flaw Exploited at Geekpwn Event.... December 14, 2022 Cyber Security News