Vulnerability Details : CVE-2014-5340
The wato component in Check_MK before 1.2.4p4 and 1.2.5 before 1.2.5i4 uses the pickle Python module unsafely, which allows remote attackers to execute arbitrary code via a crafted serialized object, related to an automation URL.
Vulnerability category: Execute code
Products affected by CVE-2014-5340
- cpe:2.3:a:check_mk_project:check_mk:*:p3:*:*:*:*:*:*
- cpe:2.3:a:check_mk_project:check_mk:1.2.4:p2:*:*:*:*:*:*
- cpe:2.3:a:check_mk_project:check_mk:1.2.4:p1:*:*:*:*:*:*
- cpe:2.3:a:check_mk_project:check_mk:1.2.5:i1:*:*:*:*:*:*
- cpe:2.3:a:check_mk_project:check_mk:1.2.5:i3:*:*:*:*:*:*
- cpe:2.3:a:check_mk_project:check_mk:1.2.5:i2:*:*:*:*:*:*
- cpe:2.3:a:check_mk_project:check_mk:1.2.4:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2014-5340
5.48%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 92 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2014-5340
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.3
|
HIGH | AV:N/AC:M/Au:N/C:C/I:C/A:C |
8.6
|
10.0
|
NIST |
CWE ids for CVE-2014-5340
-
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.Assigned by: nvd@nist.gov (Primary)
References for CVE-2014-5340
-
http://www.securityfocus.com/archive/1/533180/100/0/threaded
SecurityFocus
-
http://mathias-kettner.de/check_mk_werks.php?werk_id=984
Fix code injection for logged in users via automation url (Werk #0984) | checkmkPatch;Vendor Advisory
-
http://packetstormsecurity.com/files/127941/Deutsche-Telekom-CERT-Advisory-DTC-A-20140820-001.html
Deutsche Telekom CERT Advisory DTC-A-20140820-001 ≈ Packet Storm
-
http://rhn.redhat.com/errata/RHSA-2015-1495.html
RHSA-2015:1495 - Security Advisory - Red Hat Customer Portal
Jump to