Expired sessions were not securely terminated in the RestAPI for Tribe29's Checkmk <= 2.1.0p10 and Checkmk <= 2.0.0p28 allowing an attacker to use expired session tokens when communicating with the RestAPI.
References
Link | Resource |
---|---|
https://checkmk.com/werk/14485 | Vendor Advisory |
https://checkmk.com/werk/14485 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
No history.
Information
Published : 2023-02-20 17:15
Updated : 2024-11-21 07:33
NVD link : CVE-2022-48317
Mitre link : CVE-2022-48317
CVE.ORG link : CVE-2022-48317
JSON object : View
Products Affected
checkmk
- checkmk
CWE
CWE-613
Insufficient Session Expiration