CWE
79
Advisory Published
Updated

CVE-2021-40906: XSS

First published: Fri Mar 25 2022(Updated: )

CheckMK Raw Edition software (versions 1.5.0 to 1.6.0) does not sanitise the input of a web service parameter that is in an unauthenticated zone. This Reflected XSS allows an attacker to open a backdoor on the device with HTML content and interpreted by the browser (such as JavaScript or other client-side scripts) or to steal the session cookies of a user who has previously authenticated via a man in the middle. Successful exploitation requires access to the web service resource without authentication.

Credit: cve@mitre.org cve@mitre.org

Affected SoftwareAffected VersionHow to fix
Tribe29 Checkmk>=1.5.0<1.6.0
Tribe29 Checkmk=1.6.0
Tribe29 Checkmk=1.6.0-b1
Tribe29 Checkmk=1.6.0-b10
Tribe29 Checkmk=1.6.0-b12
Tribe29 Checkmk=1.6.0-b3
Tribe29 Checkmk=1.6.0-b4
Tribe29 Checkmk=1.6.0-b5
Tribe29 Checkmk=1.6.0-b9
Tribe29 Checkmk=1.6.0-p1
Tribe29 Checkmk=1.6.0-p10
Tribe29 Checkmk=1.6.0-p11
Tribe29 Checkmk=1.6.0-p12
Tribe29 Checkmk=1.6.0-p13
Tribe29 Checkmk=1.6.0-p14
Tribe29 Checkmk=1.6.0-p15
Tribe29 Checkmk=1.6.0-p16
Tribe29 Checkmk=1.6.0-p19
Tribe29 Checkmk=1.6.0-p2
Tribe29 Checkmk=1.6.0-p20
Tribe29 Checkmk=1.6.0-p21
Tribe29 Checkmk=1.6.0-p22
Tribe29 Checkmk=1.6.0-p23
Tribe29 Checkmk=1.6.0-p24
Tribe29 Checkmk=1.6.0-p25
Tribe29 Checkmk=1.6.0-p3
Tribe29 Checkmk=1.6.0-p4
Tribe29 Checkmk=1.6.0-p5
Tribe29 Checkmk=1.6.0-p6
Tribe29 Checkmk=1.6.0-p7
Tribe29 Checkmk=1.6.0-p8
Tribe29 Checkmk=1.6.0-p9
Tribe29 Checkmk=1.6.0b10
Tribe29 Checkmk=1.6.0b11
Tribe29 Checkmk=1.6.0p10
Tribe29 Checkmk=1.6.0p17
Tribe29 Checkmk=1.6.0p18
Checkmk Checkmk>=1.5.0<1.6.0
Checkmk Checkmk=1.6.0
Checkmk Checkmk=1.6.0-b1
Checkmk Checkmk=1.6.0-b10
Checkmk Checkmk=1.6.0-b12
Checkmk Checkmk=1.6.0-b3
Checkmk Checkmk=1.6.0-b4
Checkmk Checkmk=1.6.0-b5
Checkmk Checkmk=1.6.0-b9
Checkmk Checkmk=1.6.0-p1
Checkmk Checkmk=1.6.0-p10
Checkmk Checkmk=1.6.0-p11
Checkmk Checkmk=1.6.0-p12
Checkmk Checkmk=1.6.0-p13
Checkmk Checkmk=1.6.0-p14
Checkmk Checkmk=1.6.0-p15
Checkmk Checkmk=1.6.0-p16
Checkmk Checkmk=1.6.0-p19
Checkmk Checkmk=1.6.0-p2
Checkmk Checkmk=1.6.0-p20
Checkmk Checkmk=1.6.0-p21
Checkmk Checkmk=1.6.0-p22
Checkmk Checkmk=1.6.0-p23
Checkmk Checkmk=1.6.0-p24
Checkmk Checkmk=1.6.0-p25
Checkmk Checkmk=1.6.0-p3
Checkmk Checkmk=1.6.0-p4
Checkmk Checkmk=1.6.0-p5
Checkmk Checkmk=1.6.0-p6
Checkmk Checkmk=1.6.0-p7
Checkmk Checkmk=1.6.0-p8
Checkmk Checkmk=1.6.0-p9

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is CVE-2021-40906?

    CVE-2021-40906 refers to a vulnerability in CheckMK Raw Edition software versions 1.5.0 to 1.6.0 that allows for a reflected cross-site scripting (XSS) attack.

  • What is the severity of CVE-2021-40906?

    The severity of CVE-2021-40906 is medium with a CVSS score of 6.1.

  • How does CVE-2021-40906 affect Tribe29 Checkmk?

    CVE-2021-40906 affects Tribe29 Checkmk Raw Edition software versions 1.5.0 to 1.6.0.

  • How can an attacker exploit CVE-2021-40906?

    An attacker can exploit CVE-2021-40906 by injecting malicious HTML content into a web service parameter in an unauthenticated zone, which can be executed by a user's browser and potentially open a backdoor on the device.

  • Where can I find more information about CVE-2021-40906?

    You can find more information about CVE-2021-40906 on the CheckMK website (http://checkmk.com) and the GitHub repository (https://github.com/Edgarloyola/CVE-2021-40906).

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203