Limited Server-Side Request Forgery (SSRF) in agent-receiver in Tribe29's Checkmk <= 2.1.0p11 allows an attacker to communicate with local network restricted endpoints by use of the host registration API.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination.
Link | Tags |
---|---|
https://checkmk.com/werk/14385 | mitigation vendor advisory |
https://www.sonarsource.com/blog/checkmk-rce-chain-1/ | third party advisory exploit |