A cross site scripting (XSS) vulnerability exists in Check_MK versions 1.2.8x prior to 1.2.8p25 and 1.4.0x prior to 1.4.0p9, allowing an unauthenticated attacker to inject arbitrary HTML or JavaScript via the output_format parameter, and the username parameter of failed HTTP basic authentication attempts, which is returned unencoded in an internal server error page.
References
Link | Resource |
---|---|
http://mathias-kettner.com/check_mk_werks.php?werk_id=7661 | Vendor Advisory |
https://www.tenable.com/security/research/tra-2017-20 | Exploit Third Party Advisory |
http://mathias-kettner.com/check_mk_werks.php?werk_id=7661 | Vendor Advisory |
https://www.tenable.com/security/research/tra-2017-20 | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 03:07
Type | Values Removed | Values Added |
---|---|---|
References | () http://mathias-kettner.com/check_mk_werks.php?werk_id=7661 - Vendor Advisory | |
References | () https://www.tenable.com/security/research/tra-2017-20 - Exploit, Third Party Advisory |
Information
Published : 2017-12-11 16:29
Updated : 2024-11-21 03:07
NVD link : CVE-2017-11507
Mitre link : CVE-2017-11507
CVE.ORG link : CVE-2017-11507
JSON object : View
Products Affected
check_mk_project
- check_mk
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')