Vulnerability Details CVE-2014-2331
Check_MK 1.2.2p2, 1.2.2p3, and 1.2.3i5 allows remote authenticated users to execute arbitrary Python code via a crafted rules.mk file in a snapshot. NOTE: this can be exploited by remote attackers by leveraging CVE-2014-2330.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.008
EPSS Ranking 73.2%
CVSS Severity
CVSS v2 Score 8.5
Products affected by CVE-2014-2331
-
cpe:2.3:a:check_mk_project:check_mk:1.1.0
-
cpe:2.3:a:check_mk_project:check_mk:1.1.10
-
cpe:2.3:a:check_mk_project:check_mk:1.1.11
-
cpe:2.3:a:check_mk_project:check_mk:1.1.12
-
cpe:2.3:a:check_mk_project:check_mk:1.1.13
-
cpe:2.3:a:check_mk_project:check_mk:1.1.2
-
cpe:2.3:a:check_mk_project:check_mk:1.1.3
-
cpe:2.3:a:check_mk_project:check_mk:1.1.4
-
cpe:2.3:a:check_mk_project:check_mk:1.1.5
-
cpe:2.3:a:check_mk_project:check_mk:1.1.6
-
cpe:2.3:a:check_mk_project:check_mk:1.1.7
-
cpe:2.3:a:check_mk_project:check_mk:1.1.8
-
cpe:2.3:a:check_mk_project:check_mk:1.1.9
-
cpe:2.3:a:check_mk_project:check_mk:1.2.2
-
cpe:2.3:a:check_mk_project:check_mk:1.2.3