User enumeration in Checkmk <=2.2.0p4 allows an authenticated attacker to enumerate usernames.
| Software | From | Fixed in |
|---|---|---|
| checkmk / checkmk | 2.2.0-i1 | 2.2.0-i1.x |
| checkmk / checkmk | 2.2.0-b2 | 2.2.0-b2.x |
| checkmk / checkmk | 2.2.0-b1 | 2.2.0-b1.x |
| checkmk / checkmk | 2.2.0-b3 | 2.2.0-b3.x |
| checkmk / checkmk | 2.2.0 | 2.2.0.x |
| checkmk / checkmk | 2.2.0-b4 | 2.2.0-b4.x |
| checkmk / checkmk | 2.2.0-b5 | 2.2.0-b5.x |
| checkmk / checkmk | 2.2.0-b6 | 2.2.0-b6.x |
| checkmk / checkmk | 2.2.0-b7 | 2.2.0-b7.x |
| checkmk / checkmk | 2.2.0-b8 | 2.2.0-b8.x |
| checkmk / checkmk | 2.2.0-p1 | 2.2.0-p1.x |
| checkmk / checkmk | 2.2.0-p2 | 2.2.0-p2.x |
| checkmk / checkmk | 2.2.0-p3 | 2.2.0-p3.x |
| checkmk / checkmk | 2.2.0-p4 | 2.2.0-p4.x |