Vulnerability Description
Check_MK before 1.2.8p26 mishandles certain errors within the failed-login save feature because of a race condition, which allows remote attackers to obtain sensitive user information by reading a GUI crash report.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Checkmk | Checkmk | 1.2.3 |
Related Weaknesses (CWE)
References
- http://mathias-kettner.com/check_mk_werks.php?edition_id=raw&branch=1.2.8Release NotesThird Party Advisory
- https://mathias-kettner.de/check_mk_werks.php?werk_id=5208&HTML=yesThird Party Advisory
- https://www.exploit-db.com/exploits/43021/Third Party AdvisoryVDB Entry
- http://mathias-kettner.com/check_mk_werks.php?edition_id=raw&branch=1.2.8Release NotesThird Party Advisory
- https://mathias-kettner.de/check_mk_werks.php?werk_id=5208&HTML=yesThird Party Advisory
- https://www.exploit-db.com/exploits/43021/Third Party AdvisoryVDB Entry
FAQ
What is CVE-2017-14955?
CVE-2017-14955 is a vulnerability with a CVSS score of 5.9 (MEDIUM). Check_MK before 1.2.8p26 mishandles certain errors within the failed-login save feature because of a race condition, which allows remote attackers to obtain sensitive user information by reading a GUI...
How severe is CVE-2017-14955?
CVE-2017-14955 has been rated MEDIUM with a CVSS base score of 5.9/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2017-14955?
Check the references section above for vendor advisories and patch information. Affected products include: Checkmk Checkmk.