CVE-2022-37298:
Shinken Solutions Shinken Monitoring vulnerable to Incorrect Access Control
9.8
CVSS ScoreBasic Information
CVE ID
GHSA ID
EPSS Score
-
CWE
Published
10/20/2022
Updated
8/17/2023
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
Shinken | pip | <= 2.4.3 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from the SafeUnpickler's insecure deserialization implementation. The key issues are:
- Pre-patch code allowed any class from 'shinken.*' modules through the 'startswith('shinken.')' check
- The PICKLE_SAFE whitelist was incomplete, permitting dangerous classes like those in shinken.webui.bottle
- The test case demonstrates RCE via sys.path manipulation using Shinken's own modules
- The fix switched to an explicit allowlist of approved classes rather than trusting all Shinken submodules
- CWE-287 (Improper Authentication) maps directly to the insufficient validation during deserialization