Exposure of CSRF tokens in query parameters on specific requests in Checkmk GmbH's Checkmk versions <2.3.0p18, <2.2.0p35 and <2.1.0p48 could lead to a leak of the token to facilitate targeted phishing attacks.
The web application uses the HTTP GET method to process a request and includes sensitive information in the query string of that request.
Link | Tags |
---|---|
https://checkmk.com/werk/17096 | vendor advisory |