First published: Tue Feb 22 2022(Updated: )
Checkmk <=2.0.0p19 Fixed in 2.0.0p20 and Checkmk <=1.6.0p27 Fixed in 1.6.0p28 are affected by a Cross Site Scripting (XSS) vulnerability. The Alias of a site was not properly escaped when shown as condition for notifications.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Tribe29 Checkmk | =1.6.0 | |
Tribe29 Checkmk | =1.6.0-b1 | |
Tribe29 Checkmk | =1.6.0-b10 | |
Tribe29 Checkmk | =1.6.0-b12 | |
Tribe29 Checkmk | =1.6.0-b3 | |
Tribe29 Checkmk | =1.6.0-b4 | |
Tribe29 Checkmk | =1.6.0-b5 | |
Tribe29 Checkmk | =1.6.0-b9 | |
Tribe29 Checkmk | =1.6.0-p1 | |
Tribe29 Checkmk | =1.6.0-p10 | |
Tribe29 Checkmk | =1.6.0-p11 | |
Tribe29 Checkmk | =1.6.0-p12 | |
Tribe29 Checkmk | =1.6.0-p13 | |
Tribe29 Checkmk | =1.6.0-p14 | |
Tribe29 Checkmk | =1.6.0-p15 | |
Tribe29 Checkmk | =1.6.0-p16 | |
Tribe29 Checkmk | =1.6.0-p19 | |
Tribe29 Checkmk | =1.6.0-p2 | |
Tribe29 Checkmk | =1.6.0-p20 | |
Tribe29 Checkmk | =1.6.0-p21 | |
Tribe29 Checkmk | =1.6.0-p22 | |
Tribe29 Checkmk | =1.6.0-p23 | |
Tribe29 Checkmk | =1.6.0-p24 | |
Tribe29 Checkmk | =1.6.0-p25 | |
Tribe29 Checkmk | =1.6.0-p26 | |
Tribe29 Checkmk | =1.6.0-p27 | |
Tribe29 Checkmk | =2.0.0 | |
Tribe29 Checkmk | =2.0.0-b1 | |
Tribe29 Checkmk | =2.0.0-b2 | |
Tribe29 Checkmk | =2.0.0-b3 | |
Tribe29 Checkmk | =2.0.0-b4 | |
Tribe29 Checkmk | =2.0.0-b5 | |
Tribe29 Checkmk | =2.0.0-b6 | |
Tribe29 Checkmk | =2.0.0-b7 | |
Tribe29 Checkmk | =2.0.0-b8 | |
Tribe29 Checkmk | =2.0.0-i1 | |
Tribe29 Checkmk | =2.0.0-p1 | |
Tribe29 Checkmk | =2.0.0-p10 | |
Tribe29 Checkmk | =2.0.0-p11 | |
Tribe29 Checkmk | =2.0.0-p12 | |
Tribe29 Checkmk | =2.0.0-p13 | |
Tribe29 Checkmk | =2.0.0-p14 | |
Tribe29 Checkmk | =2.0.0-p15 | |
Tribe29 Checkmk | =2.0.0-p16 | |
Tribe29 Checkmk | =2.0.0-p17 | |
Tribe29 Checkmk | =2.0.0-p18 | |
Tribe29 Checkmk | =2.0.0-p19 | |
Checkmk Checkmk | =1.6.0 | |
Checkmk Checkmk | =1.6.0-b1 | |
Checkmk Checkmk | =1.6.0-b10 | |
Checkmk Checkmk | =1.6.0-b12 | |
Checkmk Checkmk | =1.6.0-b3 | |
Checkmk Checkmk | =1.6.0-b4 | |
Checkmk Checkmk | =1.6.0-b5 | |
Checkmk Checkmk | =1.6.0-b9 | |
Checkmk Checkmk | =1.6.0-p1 | |
Checkmk Checkmk | =1.6.0-p10 | |
Checkmk Checkmk | =1.6.0-p11 | |
Checkmk Checkmk | =1.6.0-p12 | |
Checkmk Checkmk | =1.6.0-p13 | |
Checkmk Checkmk | =1.6.0-p14 | |
Checkmk Checkmk | =1.6.0-p15 | |
Checkmk Checkmk | =1.6.0-p16 | |
Checkmk Checkmk | =1.6.0-p19 | |
Checkmk Checkmk | =1.6.0-p2 | |
Checkmk Checkmk | =1.6.0-p20 | |
Checkmk Checkmk | =1.6.0-p21 | |
Checkmk Checkmk | =1.6.0-p22 | |
Checkmk Checkmk | =1.6.0-p23 | |
Checkmk Checkmk | =1.6.0-p24 | |
Checkmk Checkmk | =1.6.0-p25 | |
Checkmk Checkmk | =1.6.0-p26 | |
Checkmk Checkmk | =1.6.0-p27 | |
Checkmk Checkmk | =2.0.0 | |
Checkmk Checkmk | =2.0.0-b1 | |
Checkmk Checkmk | =2.0.0-b2 | |
Checkmk Checkmk | =2.0.0-b3 | |
Checkmk Checkmk | =2.0.0-b4 | |
Checkmk Checkmk | =2.0.0-b5 | |
Checkmk Checkmk | =2.0.0-b6 | |
Checkmk Checkmk | =2.0.0-b7 | |
Checkmk Checkmk | =2.0.0-b8 | |
Checkmk Checkmk | =2.0.0-i1 | |
Checkmk Checkmk | =2.0.0-p1 | |
Checkmk Checkmk | =2.0.0-p10 | |
Checkmk Checkmk | =2.0.0-p11 | |
Checkmk Checkmk | =2.0.0-p12 | |
Checkmk Checkmk | =2.0.0-p13 | |
Checkmk Checkmk | =2.0.0-p14 | |
Checkmk Checkmk | =2.0.0-p15 | |
Checkmk Checkmk | =2.0.0-p16 | |
Checkmk Checkmk | =2.0.0-p17 | |
Checkmk Checkmk | =2.0.0-p18 | |
Checkmk Checkmk | =2.0.0-p19 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-24565 is medium with a severity value of 5.4.
Checkmk versions 1.6.0p19 and below, as well as 2.0.0p19 and below are affected by CVE-2022-24565.
CVE-2022-24565 is a Cross Site Scripting (XSS) vulnerability that affects Checkmk by improperly escaping the Alias of a site when shown as a condition for notifications.
To fix CVE-2022-24565, update Checkmk to version 2.0.0p20 or higher, or version 1.6.0p28 or higher.
You can find more information about CVE-2022-24565 at the following reference: [link](https://checkmk.com/werk/13716)