{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2022-48321","assignerOrgId":"f7d6281c-4801-44ce-ace2-493291dedb0f","state":"PUBLISHED","assignerShortName":"Tribe29","dateReserved":"2023-02-08T08:46:54.800Z","datePublished":"2023-02-20T16:54:44.369Z","dateUpdated":"2024-08-03T15:10:59.655Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"Checkmk","vendor":"Tribe29","versions":[{"lessThanOrEqual":"2.1.0p11","status":"affected","version":"2.1.0","versionType":"semver"}]}],"credits":[{"lang":"en","type":"reporter","value":"Stefan Schiller (SonarSource)"}],"descriptions":[{"lang":"en","value":"Limited Server-Side Request Forgery (SSRF) in agent-receiver in Tribe29's Checkmk <= 2.1.0p11 allows an attacker to communicate with local network restricted endpoints by use of the host registration API."}],"impacts":[{"capecId":"CAPEC-664","descriptions":[{"lang":"en","value":"CAPEC-664 Server Side Request Forgery"}]}],"metrics":[{"cvssV3_1":{"baseScore":6.8,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L","version":"3.1"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-20","description":"CWE-20 Improper Input Validation","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"f7d6281c-4801-44ce-ace2-493291dedb0f","shortName":"Checkmk","dateUpdated":"2023-10-24T12:48:50.741Z"},"references":[{"url":"https://checkmk.com/werk/14385"},{"url":"https://www.sonarsource.com/blog/checkmk-rce-chain-1/"}],"title":"SSRF in agent-receiver API"},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T15:10:59.655Z"},"title":"CVE Program Container","references":[{"url":"https://checkmk.com/werk/14385","tags":["x_transferred"]},{"url":"https://www.sonarsource.com/blog/checkmk-rce-chain-1/","tags":["x_transferred"]}]}]}}