CVE-2024-13723

The "NagVis" component within Checkmk is vulnerable to remote code execution. An authenticated attacker with administrative level privileges is able to upload a malicious PHP file and modify specific settings to execute the contents of the file as PHP.
Configurations

No configuration.

History

06 Feb 2025, 15:15

Type Values Removed Values Added
Summary
  • (es) El componente "NagVis" de Checkmk es vulnerable a la ejecución remota de código. Un atacante autenticado con privilegios de nivel administrativo puede cargar un archivo PHP malicioso y modificar configuraciones específicas para ejecutar el contenido del archivo como PHP.
References () https://korelogic.com/Resources/Advisories/KL-001-2025-002.txt - () https://korelogic.com/Resources/Advisories/KL-001-2025-002.txt -
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.2

05 Feb 2025, 01:15

Type Values Removed Values Added
References
  • () http://seclists.org/fulldisclosure/2025/Feb/4 -
  • () http://www.openwall.com/lists/oss-security/2025/02/04/4 -

04 Feb 2025, 22:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-04 22:15

Updated : 2025-02-06 15:15


NVD link : CVE-2024-13723

Mitre link : CVE-2024-13723

CVE.ORG link : CVE-2024-13723


JSON object : View

Products Affected

No product.

CWE
CWE-434

Unrestricted Upload of File with Dangerous Type