Expired sessions were not securely terminated in the RestAPI for Tribe29's Checkmk <= 2.1.0p10 and Checkmk <= 2.0.0p28 allowing an malicious user to use expired session tokens when communicating with the RestAPI.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
tribe29 checkmk 2.1.0 |
||
tribe29 checkmk 2.0.0 |