CVE-2022-37298: Shinken Solutions Shinken Monitoring vulnerable to Incorrect Access Control
9.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.9734%
CWE
Published
10/20/2022
Updated
8/17/2023
KEV Status
No
Technology
Python
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| Shinken | pip | <= 2.4.3 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from the SafeUnpickler's insecure deserialization implementation. The key issues are:
- Pre-patch code allowed any class from 'shinken.*' modules through the 'startswith('shinken.')' check
- The PICKLE_SAFE whitelist was incomplete, permitting dangerous classes like those in shinken.webui.bottle
- The test case demonstrates RCE via sys.path manipulation using Shinken's own modules
- The fix switched to an explicit allowlist of approved classes rather than trusting all Shinken submodules
- CWE-287 (Improper Authentication) maps directly to the insufficient validation during deserialization