Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-40904 PoC — CheckMK Raw Edition 安全漏洞

Source
Associated Vulnerability
Title:CheckMK Raw Edition 安全漏洞 (CVE-2021-40904)
Description:tribe29 CheckMK Raw Edition是德国tribe29公司的一个全面灵活的 IT 监控系统。 CheckMK Raw Edition存在安全漏洞,该漏洞源于成功的利用需要使用有效凭据或具有管理员角色的用户劫持会话来访问 Web 管理界面。
Readme
# CVE-2021-40904 - RCE via CheckMk's Dokuwiki embedded application

**Application:** CheckMK Management Web Console

**Software Revision:** From 1.5.0 to 1.5.0p25

**Attack type:** RCE

**Solution:** Upgrade to version 1.6 or higher.

**Summary:** The web management console of CheckMk Raw Edition (versions 1.5.0 to 1.5.0p25) allows a misconfiguration of the web-app Dokuwiki (installed by default) which allows embedded php code. As a result, remote code execution is achieved. Successful exploitation requires access to the web management interface, either with valid credentials or with a hijacked session by a user with the role of administrator.

**Technical Description:** See CVE-2021-40904

**Timeline:**
   * 2021-09-01 Issues discovered.
   * 2021-09-06 First contact with vendor via e-mail.
   * 2021-09-08 Vendor response. RCE vulnerabilities were already detected, and higher versions already exist with the patch.
   * 2022-03-25 Public disclosure.
  

**Reference:**
   * https://checkmk.com/download/archive#checkmk-1.6.0
   * https://checkmk.com/download/archive#checkmk-2.0.0
   * http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40904
   * https://nvd.nist.gov/vuln/detail/CVE-2021-40904

# DEMO
  **PoC checkmk version 1.5.0p25 Raw Edition**
  
  ![RCE Dokuwiki](https://raw.githubusercontent.com/Edgarloyola/RCE_checkMK_Dokuwiki/main/RCE_Dokuwiki.png?token=AKM5DAKN4PSOWFSDA35RNMDBMVMWO)
File Snapshot

[4.0K] /data/pocs/12c760886f13dfad836697c0f321805d0d0cc92d ├── [ 22K] exploit.txt ├── [585K] RCE-DokuWiki.pdf ├── [785K] RCE_Dokuwiki.png └── [1.4K] README.md 0 directories, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.