Files to be deployed with agents are accessible without authentication in Checkmk 2.1.0, Checkmk 2.2.0, Checkmk 2.3.0 and <Checkmk 2.4.0b6 allows attacker to access files that could contain secrets.CreditsNorman Kühnberger (IT Südwestfalen GmbH)Referenceshttps://checkmk.com/werk/17348