CVE-2021-40906

CheckMK Raw Edition software (versions 1.5.0 to 1.6.0) does not sanitise the input of a web service parameter that is in an unauthenticated zone. This Reflected XSS allows an attacker to open a backdoor on the device with HTML content and interpreted by the browser (such as JavaScript or other client-side scripts) or to steal the session cookies of a user who has previously authenticated via a man in the middle. Successful exploitation requires access to the web service resource without authentication.
References
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:checkmk:checkmk:*:*:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:-:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:b1:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:b10:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:b12:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:b3:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:b4:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:b5:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:b9:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:p1:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:p10:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:p11:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:p12:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:p13:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:p14:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:p15:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:p16:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:p19:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:p2:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:p20:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:p21:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:p22:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:p23:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:p24:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:p25:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:p3:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:p4:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:p5:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:p6:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:p7:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:p8:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:p9:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0b10:*:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0b11:*:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0p10:*:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0p17:*:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0p18:*:*:*:*:*:*:*

History

21 Nov 2024, 06:25

Type Values Removed Values Added
References () http://checkmk.com - Product () http://checkmk.com - Product
References () https://github.com/Edgarloyola/CVE-2021-40906 - Third Party Advisory () https://github.com/Edgarloyola/CVE-2021-40906 - Third Party Advisory

23 Jul 2024, 19:37

Type Values Removed Values Added
CPE cpe:2.3:a:tribe29:checkmk:1.6.0:p19:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:p2:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:p22:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:p3:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:-:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:p24:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:b5:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:b1:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:p23:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:*:*:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:b10:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:b9:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:p1:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:p25:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:p8:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:p6:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:b3:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:p12:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:p15:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:p20:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:p10:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:p13:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:p4:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:b12:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:p7:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:p16:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:p5:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:b4:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:p9:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:p11:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:p21:*:*:*:*:*:*
cpe:2.3:a:tribe29:checkmk:1.6.0:p14:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:p2:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:p11:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:p19:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:p12:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:p10:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:p5:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:p8:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:b12:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:p22:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:p9:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:b10:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:*:*:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:b3:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:b1:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:p13:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:-:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:p14:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:p15:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:p4:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:p25:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:b4:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:p16:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:b9:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:p24:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:p6:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:b5:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:p3:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:p7:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:p20:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:p23:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:p1:*:*:*:*:*:*
cpe:2.3:a:checkmk:checkmk:1.6.0:p21:*:*:*:*:*:*
First Time Checkmk checkmk
Checkmk

Information

Published : 2022-03-25 23:15

Updated : 2024-11-21 06:25


NVD link : CVE-2021-40906

Mitre link : CVE-2021-40906

CVE.ORG link : CVE-2021-40906


JSON object : View

Products Affected

tribe29

  • checkmk

checkmk

  • checkmk
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')