Improper neutralization of livestatus command delimiters in a specific endpoint within RestAPI of Checkmk prior to 2.2.0p39, 2.3.0p25, and 2.1.0p51 (EOL) allows arbitrary livestatus command execution. Exploitation requires the attacker to have a contact group assigned to their user account and for an event to originate from a host with the same contact group or from an event generated with an unknown host.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://checkmk.com/werk/17028 |
![]() ![]() |
History
Thu, 10 Apr 2025 13:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 10 Apr 2025 07:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Improper neutralization of livestatus command delimiters in a specific endpoint within RestAPI of Checkmk prior to 2.2.0p39, 2.3.0p25, and 2.1.0p51 (EOL) allows arbitrary livestatus command execution. Exploitation requires the attacker to have a contact group assigned to their user account and for an event to originate from a host with the same contact group or from an event generated with an unknown host. | |
Title | Livestatus command injection in RestAPI | |
Weaknesses | CWE-140 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: Checkmk
Published:
Updated: 2025-04-10T13:09:56.033Z
Reserved: 2024-06-20T10:03:09.179Z
Link: CVE-2024-38865

Updated: 2025-04-10T13:09:52.031Z

Status : Awaiting Analysis
Published: 2025-04-10T08:15:14.663
Modified: 2025-04-11T15:39:52.920
Link: CVE-2024-38865

No data.