Skip to content

dbyio/cve-2022-37298

main
Switch branches/tags

Name already in use

A tag already exists with the provided branch name. Many Git commands accept both tag and branch names, so creating this branch may cause unexpected behavior. Are you sure you want to create this branch?
Code

Latest commit

 

Git stats

Files

Permalink
Failed to load latest commit information.
Type
Name
Latest commit message
Commit time
 
 

CVE-2022-37298: RCE in Shinken Monitoring

Versions affected: 2.4.3
Disclosure link: https://github.com/naparuba/shinken/commit/2dae40fd1e713aec9e1966a0ab7a580b9180cff2
CVE link: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37298

Description

The SafeUnpickler class found in shinken/safepickle.py implements a weak authentication scheme (actually no authentication at all) when unserializing objects passed from legitimate monitoring nodes to the Shinken server. A remote attacker can craft and send a pickle object instantiating an internal, implicitly trusted Shinken object; some of which can be leveraged to execute arbitrary code on the monitoring server itself.

Usage

python CVE-2022-37298.py

poc

About

CVE-2022-37298 Shinken Monitoring

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages