CVE-2020-28919

A stored cross site scripting (XSS) vulnerability in Checkmk 1.6.0x prior to 1.6.0p19 allows an authenticated remote attacker to inject arbitrary JavaScript via a javascript: URL in a view title.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:checkmk:checkmk:1.6.0:-:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:b1:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:b10:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:b12:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:b3:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:b4:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:b5:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:b9:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:p1:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:p10:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:p11:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:p12:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:p13:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:p14:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:p15:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:p16:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:p17:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:p18:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:p2:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:p3:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:p4:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:p5:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:p6:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:p7:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:p8:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:p9:*:*:*:*:*:*

History

21 Nov 2024, 05:23

Type Values Removed Values Added
References () https://checkmk.com/check_mk-werks.php?werk_id=11501 - Vendor Advisory () https://checkmk.com/check_mk-werks.php?werk_id=11501 - Vendor Advisory
References () https://emacsninja.com/posts/cve-2020-28919-stored-xss-in-checkmk-160p18.html - Exploit, Third Party Advisory () https://emacsninja.com/posts/cve-2020-28919-stored-xss-in-checkmk-160p18.html - Exploit, Third Party Advisory
References () https://github.com/tribe29/checkmk/commit/c00f450f884d8a229b7d8ab3f0452ed802a1ae04 - Patch, Third Party Advisory () https://github.com/tribe29/checkmk/commit/c00f450f884d8a229b7d8ab3f0452ed802a1ae04 - Patch, Third Party Advisory
References () https://github.com/tribe29/checkmk/commit/e7fd8e4c90be490e4293ec91804d00ec01af5ca6 - Patch () https://github.com/tribe29/checkmk/commit/e7fd8e4c90be490e4293ec91804d00ec01af5ca6 - Patch

23 Jul 2024, 19:37

Type Values Removed Values Added
First Time Checkmk checkmk
Checkmk
CPE cpe:2.3:a:tribe29:checkmk:1.6.0:p2:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:p3:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:-:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:b5:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:b1:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:b10:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:b9:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:p1:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:p8:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:p6:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:b3:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:p12:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:p15:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:p10:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:p13:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:p4:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:b12:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:p7:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:p16:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:p5:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:p18:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:b4:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:p9:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:p17:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:p11:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:p14:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:p2:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:p11:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:p18:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:p12:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:p5:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:p10:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:p8:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:b12:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:p9:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:b10:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:b3:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:p17:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:b1:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:p13:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:-:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:p14:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:p15:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:p4:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:b4:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:p16:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:b9:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:p6:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:b5:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:p3:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:p7:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:p1:*:*:*:*:*:*

Information

Published : 2022-01-15 17:15

Updated : 2024-11-21 05:23


NVD link : CVE-2020-28919

Mitre link : CVE-2020-28919

CVE.ORG link : CVE-2020-28919


JSON object : View

Products Affected

checkmk

  • checkmk
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')