Expired sessions were not securely terminated in the RestAPI for Tribe29's Checkmk <= 2.1.0p10 and Checkmk <= 2.0.0p28 allowing an attacker to use expired session tokens when communicating with the RestAPI.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://checkmk.com/werk/14485 |
![]() ![]() |
History
No history.

Status: PUBLISHED
Assigner: Tribe29
Published:
Updated: 2024-08-03T15:10:59.718Z
Reserved: 2023-02-08T08:46:54.799Z
Link: CVE-2022-48317

No data.

Status : Modified
Published: 2023-02-20T17:15:12.307
Modified: 2024-11-21T07:33:08.940
Link: CVE-2022-48317

No data.