From checkmk-werks-lvl1@lists.checkmk.com Sat Apr 20 12:51:24 2024 From: Checkmk werks level 1 To: checkmk-werks-lvl1@lists.checkmk.com Subject: [2.2.0] Checkmk Werk 16615 adapted: Remove websphere_mq plugin Date: Sat, 20 Apr 2024 12:50:59 +0000 Message-ID: <1713617459.306361.733.nullmailer@localhost> MIME-Version: 1.0 Content-Type: multipart/mixed; boundary="===============6771277938504742849==" --===============6771277938504742849== Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable Werk 16615 was adapted. The following is the new Werk, a diff is shown at the= end of the message. Title: Remove websphere_mq plugin Class: security Compatible: compat Component: checks Date: 1710155388 Edition: cre Level: 1 Version: 2.2.0p26 With this Werk the websphere_mq plugin is removed for security r= easons. In this plugin the output of ps is used to determine an argument= for runmqsc. This meant that anybody who can launch processes with a= n arbitrary command line could manipulate one argument to runmqsc. The plugin was already superseded by the agent plugin ibm_mq and= deprecated with Werk 10752 an= d version 2.0.0. Since this plugin is already deprecated and it was not configurable via the agent bakery we assumed that this plugin is not frequently used. The= refore we decided to not fix the issue but to push the removal. We found this vulnerability internally. Affected versions: LI: 2.3.0 LI: 2.2.0 LI: 2.1.0 LI: 2.0.0 Mitigations: Migrate to the ibm_mq plugin. Vulnerability Management: We have rated the issue with a CVSS Score of 6.5 (Medium) with the following = CVSS vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N. We assigned CVE-2024-3367 to this vulnerability. Changes: The plugin was removed. -----------------------------------------------------------------------= -------- Title: Remove websphere_mq plugin Class: security Compatible: compat Component: checks Date: 1710155388 Edition: cre Level: 1 - Version: 2.2.0p25 ? ^ + Version: 2.2.0p26 ? ^ =20 With this Werk the websphere_mq plugin is removed for security= reasons. =20 In this plugin the output of ps is used to determine an argume= nt for runmqsc. This meant that anybody who can launch processes with= an arbitrary command line could manipulate one argument to runmqsc. =20 The plugin was already superseded by the agent plugin ibm_mq a= nd deprecated with Werk 10752 = and version 2.0.0. =20 Since this plugin is already deprecated and it was not configurable via the agent bakery we assumed that this plugin is not frequently used. T= herefore we decided to not fix the issue but to push the removal. =20 We found this vulnerability internally. =20 Affected versions: =20 LI: 2.3.0 LI: 2.2.0 LI: 2.1.0 LI: 2.0.0 =20 Mitigations: =20 Migrate to the ibm_mq plugin. =20 Vulnerability Management: =20 We have rated the issue with a CVSS Score of 6.5 (Medium) with the followin= g CVSS vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N. We assigned CVE-2024-3367 to this vulnerability. =20 Changes: =20 The plugin was removed. =20 --===============6771277938504742849==--