First published: Fri Mar 25 2022(Updated: )
CheckMK Raw Edition software (versions 1.5.0 to 1.6.0) does not sanitise the input of a web service parameter that is in an unauthenticated zone. This Reflected XSS allows an attacker to open a backdoor on the device with HTML content and interpreted by the browser (such as JavaScript or other client-side scripts) or to steal the session cookies of a user who has previously authenticated via a man in the middle. Successful exploitation requires access to the web service resource without authentication.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tribe29 Checkmk | >=1.5.0<1.6.0 | |
Tribe29 Checkmk | =1.6.0 | |
Tribe29 Checkmk | =1.6.0-b1 | |
Tribe29 Checkmk | =1.6.0-b10 | |
Tribe29 Checkmk | =1.6.0-b12 | |
Tribe29 Checkmk | =1.6.0-b3 | |
Tribe29 Checkmk | =1.6.0-b4 | |
Tribe29 Checkmk | =1.6.0-b5 | |
Tribe29 Checkmk | =1.6.0-b9 | |
Tribe29 Checkmk | =1.6.0-p1 | |
Tribe29 Checkmk | =1.6.0-p10 | |
Tribe29 Checkmk | =1.6.0-p11 | |
Tribe29 Checkmk | =1.6.0-p12 | |
Tribe29 Checkmk | =1.6.0-p13 | |
Tribe29 Checkmk | =1.6.0-p14 | |
Tribe29 Checkmk | =1.6.0-p15 | |
Tribe29 Checkmk | =1.6.0-p16 | |
Tribe29 Checkmk | =1.6.0-p19 | |
Tribe29 Checkmk | =1.6.0-p2 | |
Tribe29 Checkmk | =1.6.0-p20 | |
Tribe29 Checkmk | =1.6.0-p21 | |
Tribe29 Checkmk | =1.6.0-p22 | |
Tribe29 Checkmk | =1.6.0-p23 | |
Tribe29 Checkmk | =1.6.0-p24 | |
Tribe29 Checkmk | =1.6.0-p25 | |
Tribe29 Checkmk | =1.6.0-p3 | |
Tribe29 Checkmk | =1.6.0-p4 | |
Tribe29 Checkmk | =1.6.0-p5 | |
Tribe29 Checkmk | =1.6.0-p6 | |
Tribe29 Checkmk | =1.6.0-p7 | |
Tribe29 Checkmk | =1.6.0-p8 | |
Tribe29 Checkmk | =1.6.0-p9 | |
Tribe29 Checkmk | =1.6.0b10 | |
Tribe29 Checkmk | =1.6.0b11 | |
Tribe29 Checkmk | =1.6.0p10 | |
Tribe29 Checkmk | =1.6.0p17 | |
Tribe29 Checkmk | =1.6.0p18 | |
Checkmk Checkmk | >=1.5.0<1.6.0 | |
Checkmk Checkmk | =1.6.0 | |
Checkmk Checkmk | =1.6.0-b1 | |
Checkmk Checkmk | =1.6.0-b10 | |
Checkmk Checkmk | =1.6.0-b12 | |
Checkmk Checkmk | =1.6.0-b3 | |
Checkmk Checkmk | =1.6.0-b4 | |
Checkmk Checkmk | =1.6.0-b5 | |
Checkmk Checkmk | =1.6.0-b9 | |
Checkmk Checkmk | =1.6.0-p1 | |
Checkmk Checkmk | =1.6.0-p10 | |
Checkmk Checkmk | =1.6.0-p11 | |
Checkmk Checkmk | =1.6.0-p12 | |
Checkmk Checkmk | =1.6.0-p13 | |
Checkmk Checkmk | =1.6.0-p14 | |
Checkmk Checkmk | =1.6.0-p15 | |
Checkmk Checkmk | =1.6.0-p16 | |
Checkmk Checkmk | =1.6.0-p19 | |
Checkmk Checkmk | =1.6.0-p2 | |
Checkmk Checkmk | =1.6.0-p20 | |
Checkmk Checkmk | =1.6.0-p21 | |
Checkmk Checkmk | =1.6.0-p22 | |
Checkmk Checkmk | =1.6.0-p23 | |
Checkmk Checkmk | =1.6.0-p24 | |
Checkmk Checkmk | =1.6.0-p25 | |
Checkmk Checkmk | =1.6.0-p3 | |
Checkmk Checkmk | =1.6.0-p4 | |
Checkmk Checkmk | =1.6.0-p5 | |
Checkmk Checkmk | =1.6.0-p6 | |
Checkmk Checkmk | =1.6.0-p7 | |
Checkmk Checkmk | =1.6.0-p8 | |
Checkmk Checkmk | =1.6.0-p9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-40906 refers to a vulnerability in CheckMK Raw Edition software versions 1.5.0 to 1.6.0 that allows for a reflected cross-site scripting (XSS) attack.
The severity of CVE-2021-40906 is medium with a CVSS score of 6.1.
CVE-2021-40906 affects Tribe29 Checkmk Raw Edition software versions 1.5.0 to 1.6.0.
An attacker can exploit CVE-2021-40906 by injecting malicious HTML content into a web service parameter in an unauthenticated zone, which can be executed by a user's browser and potentially open a backdoor on the device.
You can find more information about CVE-2021-40906 on the CheckMK website (http://checkmk.com) and the GitHub repository (https://github.com/Edgarloyola/CVE-2021-40906).