Insufficient authentication flow in Checkmk before 2.2.0p18, 2.1.0p38 and 2.0.0p39 allows attacker to use locked credentials
The requirements for the product dictate the use of an established authentication algorithm, but the implementation of the algorithm is incorrect.
The code contains a control flow path that does not reflect the algorithm that the path is intended to implement, leading to incorrect behavior any time this path is navigated.
Link | Tags |
---|---|
https://checkmk.com/werk/16227 | patch vendor advisory |