Checkmk: Unauthenticated RCE Exploit

Secragon was recently tasked with conducting an internal infrastructure pentest for a company with a complex hybrid infrastructure comprising multiple networks, including Active Directory and numerous Linux application servers. We were eager to start but were initially placed in a DMZ, which restricted our access to the internal network.

However, after conducting a thorough analysis, we discovered a Checkmk 2.1.0p10 running on one of the boxes that could be used as a pivot to gain access to the network with domain controllers running. The version of Checkmk in use had several vulnerabilities that could be chained together to achieve remote code execution (RCE). While we found a detailed article from SonarSource outlining the potential vulnerabilities, we couldn’t find any public exploit for them.

Despite this challenge, one of our experienced security professionals decided to take up the task of writing an exploit to enable us to continue our pentest. After carefully analyzing the vulnerabilities and reverse-engineering the code to identify the weaknesses in the system, our expert was able to write an exploit for the Checkmk running on the server.

Once we had the exploit, we exploited the Checkmk and gained the pivot needed to proceed with the security assessment. From there, a few more steps led to Domain Admin, allowing us to complete the assignment successfully. We are proud of the work we did and the exploit developed, which demonstrated the importance of being vigilant about vulnerabilities, even in secure environments. It also highlights the expertise and dedication of our team in ensuring the security of our client’s networks.

Related Resources

WordPress Ultimate Member Plugin: Unauthorized Database Access / SQL Injection

A critical vulnerability that poses a serious threat to the security of

Penetration Testing ROI

Insights into how mature security organizations measure and demonstrate ROI in offensive

Elementor Pro: Unauthorized Admin Access

A critical vulnerability that poses a serious threat to the security of

WooCommerce Payments: Unauthorized Admin Access

A critical vulnerability in the WooCommerce Payments plugin has been discovered, which

Checkmk: Unauthenticated RCE Exploit

Secragon was recently tasked with conducting an internal infrastructure pentest for a

Looking For A

Trusted Cybersecurity
Provider?

related Articles

WordPress Ultimate Member Plugin: Unauthorized Database Access / SQL Injection

A critical vulnerability that poses a serious threat to the security of

Penetration Testing ROI

Insights into how mature security organizations measure and demonstrate ROI in offensive

Elementor Pro: Unauthorized Admin Access

A critical vulnerability that poses a serious threat to the security of

WooCommerce Payments: Unauthorized Admin Access

A critical vulnerability in the WooCommerce Payments plugin has been discovered, which

Checkmk: Unauthenticated RCE Exploit

Secragon was recently tasked with conducting an internal infrastructure pentest for a

© 2024 Secragon LLC All Rights Reserved

Scroll to Top