CVE-2023-6287 Vulnerability Details
/
/
/
CVE-2023-6287 Metadata Quick Info
CVE Published: 27/11/2023 |
CVE Updated: 26/08/2024 |
CVE Year: 2023
Source: Checkmk |
Vendor: Checkmk GmbH |
Product: Checkmk Appliance
Status : PUBLISHED
CVE-2023-6287 Description
Sensitive data exposure in Webconf in Tribe29 Checkmk Appliance before 1.6.8 allows local attacker to retrieve passwords via reading log files.
Metrics
CVSS Version: 3.1 |
Base Score: 3.3 LOW
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
l➤ Exploitability Metrics:
Attack Vector (AV)*
Attack Complexity (AC)*
Privileges Required (PR)*
User Interaction (UI)*
Scope (S)*
l➤ Impact Metrics:
Confidentiality Impact (C)*
Integrity Impact (I)*
Availability Impact (A)*
Weakness Enumeration (CWE)
CWE-ID: CWE-598
CWE Name: CWE-598: Use of GET Request Method With Sensitive Query Strings
Source: Checkmk GmbH
Common Attack Pattern Enumeration and Classification (CAPEC)
CAPEC-ID: CAPEC-37
CAPEC Description: CAPEC-37 Retrieve Embedded Sensitive Data
Source: NVD (National Vulnerability Database).