CheckMK Raw Edition software (versions 1.5.0 to 1.6.0) does not sanitise the input of a web service parameter that is in an unauthenticated zone. This Reflected XSS allows an attacker to open a backdoor on the device with HTML content and interpreted by the browser (such as JavaScript or other client-side scripts) or to steal the session cookies of a user who has previously authenticated via a man in the middle. Successful exploitation requires access to the web service resource without authentication.

Project Subscriptions

Vendors Products
Checkmk Subscribe
Checkmk Subscribe
Tribe29 Subscribe
Checkmk Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2021-28061 CheckMK Raw Edition software (versions 1.5.0 to 1.6.0) does not sanitise the input of a web service parameter that is in an unauthenticated zone. This Reflected XSS allows an attacker to open a backdoor on the device with HTML content and interpreted by the browser (such as JavaScript or other client-side scripts) or to steal the session cookies of a user who has previously authenticated via a man in the middle. Successful exploitation requires access to the web service resource without authentication.
Ubuntu USN Ubuntu USN USN-5527-1 Checkmk vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-04T02:51:07.765Z

Reserved: 2021-09-13T00:00:00

Link: CVE-2021-40906

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-03-25T23:15:08.287

Modified: 2024-11-21T06:25:04.797

Link: CVE-2021-40906

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses