Description
Files to be deployed with agents are accessible without authentication in Checkmk 2.1.0, Checkmk 2.2.0, Checkmk 2.3.0 and <Checkmk 2.4.0b6 allows attacker to access files that could contain secrets.
Problem types
CWE-497: Exposure of Sensitive System Information to an Unauthorized Control Sphere
Product status
2.4.0 (semver) before 2.4.0b6
2.3.0 (semver)
2.2.0 (semver)
2.1.0 (semver)
Credits
Norman Kühnberger (IT Südwestfalen GmbH)