Description
Expired sessions were not securely terminated in the RestAPI for Tribe29's Checkmk <= 2.1.0p10 and Checkmk <= 2.0.0p28 allowing an attacker to use expired session tokens when communicating with the RestAPI.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-51017 | Expired sessions were not securely terminated in the RestAPI for Tribe29's Checkmk <= 2.1.0p10 and Checkmk <= 2.0.0p28 allowing an attacker to use expired session tokens when communicating with the RestAPI. |
References
| Link | Providers |
|---|---|
| https://checkmk.com/werk/14485 |
|
History
Wed, 12 Mar 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: Tribe29
Published:
Updated: 2025-03-12T18:12:47.322Z
Reserved: 2023-02-08T08:46:54.799Z
Link: CVE-2022-48317
Updated: 2024-08-03T15:10:59.718Z
Status : Modified
Published: 2023-02-20T17:15:12.307
Modified: 2024-11-21T07:33:08.940
Link: CVE-2022-48317
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD