CVE-2022-37298 Shinken Monitoring# CVE-2022-37298: RCE in Shinken Monitoring
**Versions affected:** 2.4.3
**Disclosure link:** https://github.com/naparuba/shinken/commit/2dae40fd1e713aec9e1966a0ab7a580b9180cff2
**CVE link:** https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37298
## Description
The SafeUnpickler class found in shinken/safepickle.py implements a weak authentication scheme (actually no authentication at all) when unserializing objects passed from legitimate monitoring nodes to the Shinken server. A remote attacker can craft and send a pickle object instantiating an internal, implicitly trusted Shinken object; some of which can be leveraged to execute arbitrary code on the monitoring server itself.
### Usage
`python CVE-2022-37298.py`

[4.0K] /data/pocs/633b173b27ef5daffdf683c62e55f6143b81140b
├── [1009] CVE-2022-37298.py
└── [ 857] README.md
0 directories, 2 files