CVE-2021-40906
Summary
| CVE | CVE-2021-40906 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2022-03-25 23:15:00 UTC |
| Updated | 2022-04-04 15:56:00 UTC |
| Description | CheckMK Raw Edition software (versions 1.5.0 to 1.6.0) does not sanitise the input of a web service parameter that is in an unauthenticated zone. This Reflected XSS allows an attacker to open a backdoor on the device with HTML content and interpreted by the browser (such as JavaScript or other client-side scripts) or to steal the session cookies of a user who has previously authenticated via a man in the middle. Successful exploitation requires access to the web service resource without authentication. |
Risk And Classification
Problem Types: CWE-79
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Tribe29 | Checkmk | All | All | All | All |
| Application | Tribe29 | Checkmk | 1.6.0 | - | All | All |
| Application | Tribe29 | Checkmk | 1.6.0 | b1 | All | All |
| Application | Tribe29 | Checkmk | 1.6.0 | b10 | All | All |
| Application | Tribe29 | Checkmk | 1.6.0 | b12 | All | All |
| Application | Tribe29 | Checkmk | 1.6.0 | b3 | All | All |
| Application | Tribe29 | Checkmk | 1.6.0 | b4 | All | All |
| Application | Tribe29 | Checkmk | 1.6.0 | b5 | All | All |
| Application | Tribe29 | Checkmk | 1.6.0 | b9 | All | All |
| Application | Tribe29 | Checkmk | 1.6.0 | p1 | All | All |
| Application | Tribe29 | Checkmk | 1.6.0 | p10 | All | All |
| Application | Tribe29 | Checkmk | 1.6.0 | p11 | All | All |
| Application | Tribe29 | Checkmk | 1.6.0 | p12 | All | All |
| Application | Tribe29 | Checkmk | 1.6.0 | p13 | All | All |
| Application | Tribe29 | Checkmk | 1.6.0 | p14 | All | All |
| Application | Tribe29 | Checkmk | 1.6.0 | p15 | All | All |
| Application | Tribe29 | Checkmk | 1.6.0 | p16 | All | All |
| Application | Tribe29 | Checkmk | 1.6.0 | p19 | All | All |
| Application | Tribe29 | Checkmk | 1.6.0 | p2 | All | All |
| Application | Tribe29 | Checkmk | 1.6.0 | p20 | All | All |
| Application | Tribe29 | Checkmk | 1.6.0 | p21 | All | All |
| Application | Tribe29 | Checkmk | 1.6.0 | p22 | All | All |
| Application | Tribe29 | Checkmk | 1.6.0 | p23 | All | All |
| Application | Tribe29 | Checkmk | 1.6.0 | p24 | All | All |
| Application | Tribe29 | Checkmk | 1.6.0 | p25 | All | All |
| Application | Tribe29 | Checkmk | 1.6.0 | p3 | All | All |
| Application | Tribe29 | Checkmk | 1.6.0 | p4 | All | All |
| Application | Tribe29 | Checkmk | 1.6.0 | p5 | All | All |
| Application | Tribe29 | Checkmk | 1.6.0 | p6 | All | All |
| Application | Tribe29 | Checkmk | 1.6.0 | p7 | All | All |
| Application | Tribe29 | Checkmk | 1.6.0 | p8 | All | All |
| Application | Tribe29 | Checkmk | 1.6.0 | p9 | All | All |
| Application | Tribe29 | Checkmk | 1.6.0b10 | All | All | All |
| Application | Tribe29 | Checkmk | 1.6.0b11 | All | All | All |
| Application | Tribe29 | Checkmk | 1.6.0p10 | All | All | All |
| Application | Tribe29 | Checkmk | 1.6.0p17 | All | All | All |
| Application | Tribe29 | Checkmk | 1.6.0p18 | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| GitHub - Edgarloyola/CVE-2021-40906 | MISC | github.com | |
| Infrastructure & Application Monitoring with Checkmk | MISC | checkmk.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 198866 Ubuntu Security Notification for Checkmk Vulnerabilities (USN-5527-1)