Vulnerabilites related to check_mk_project - check_mk
CVE-2014-0243 (GCVE-0-2014-0243)
Vulnerability from cvelistv5
Published
2018-07-19 17:00
Modified
2024-08-06 09:05
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Check_MK through 1.2.5i2p1 allows local users to read arbitrary files via a symlink attack to a file in /var/lib/check_mk_agent/job.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T09:05:39.316Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "58536", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "https://secuniaresearch.flexerasoftware.com/advisories/58536" }, { "name": "[oss-security] 20140528 LSE Leading Security Experts GmbH - LSE-2014-05-21 - Check_MK - Arbitrary File Disclosure Vulnerability", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2014/05/28/1" }, { "name": "67674", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/67674" }, { "name": "FEDORA-2014-6810", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134166.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://git.mathias-kettner.de/git/?p=check_mk.git%3Ba=commit%3Bh=0426323df1641596c4f01ef5a716a3b65276f01c" }, { "name": "FEDORA-2014-6818", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134160.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1101669" }, { "name": "20140528 LSE Leading Security Experts GmbH - LSE-2014-05-21 - Check_MK - Arbitrary File Disclosure Vulnerability", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2014/May/145" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/126857/Check_MK-Arbitrary-File-Disclosure.html" }, { "name": "20140528 LSE Leading Security Experts GmbH - LSE-2014-05-21 - Check_MK - Arbitrary File Disclosure Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "https://www.securityfocus.com/archive/1/532224/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://git.mathias-kettner.de/git/?p=check_mk.git%3Ba=commit%3Bh=a2ef8d00c53ec9cbd05c4ae2f09b50761130e7ce" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-05-27T00:00:00", "descriptions": [ { "lang": "en", "value": "Check_MK through 1.2.5i2p1 allows local users to read arbitrary files via a symlink attack to a file in /var/lib/check_mk_agent/job." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-07-19T16:57:02", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "58536", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "https://secuniaresearch.flexerasoftware.com/advisories/58536" }, { "name": "[oss-security] 20140528 LSE Leading Security Experts GmbH - LSE-2014-05-21 - Check_MK - Arbitrary File Disclosure Vulnerability", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2014/05/28/1" }, { "name": "67674", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/67674" }, { "name": "FEDORA-2014-6810", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134166.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://git.mathias-kettner.de/git/?p=check_mk.git%3Ba=commit%3Bh=0426323df1641596c4f01ef5a716a3b65276f01c" }, { "name": "FEDORA-2014-6818", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134160.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1101669" }, { "name": "20140528 LSE Leading Security Experts GmbH - LSE-2014-05-21 - Check_MK - Arbitrary File Disclosure Vulnerability", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2014/May/145" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/126857/Check_MK-Arbitrary-File-Disclosure.html" }, { "name": "20140528 LSE Leading Security Experts GmbH - LSE-2014-05-21 - Check_MK - Arbitrary File Disclosure Vulnerability", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "https://www.securityfocus.com/archive/1/532224/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://git.mathias-kettner.de/git/?p=check_mk.git%3Ba=commit%3Bh=a2ef8d00c53ec9cbd05c4ae2f09b50761130e7ce" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2014-0243", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Check_MK through 1.2.5i2p1 allows local users to read arbitrary files via a symlink attack to a file in /var/lib/check_mk_agent/job." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "58536", "refsource": "SECUNIA", "url": "https://secuniaresearch.flexerasoftware.com/advisories/58536" }, { "name": "[oss-security] 20140528 LSE Leading Security Experts GmbH - LSE-2014-05-21 - Check_MK - Arbitrary File Disclosure Vulnerability", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2014/05/28/1" }, { "name": "67674", "refsource": "BID", "url": "http://www.securityfocus.com/bid/67674" }, { "name": "FEDORA-2014-6810", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134166.html" }, { "name": "http://git.mathias-kettner.de/git/?p=check_mk.git;a=commit;h=0426323df1641596c4f01ef5a716a3b65276f01c", "refsource": "CONFIRM", "url": "http://git.mathias-kettner.de/git/?p=check_mk.git;a=commit;h=0426323df1641596c4f01ef5a716a3b65276f01c" }, { "name": "FEDORA-2014-6818", "refsource": "FEDORA", "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134160.html" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1101669", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1101669" }, { "name": "20140528 LSE Leading Security Experts GmbH - LSE-2014-05-21 - Check_MK - Arbitrary File Disclosure Vulnerability", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2014/May/145" }, { "name": "http://packetstormsecurity.com/files/126857/Check_MK-Arbitrary-File-Disclosure.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/126857/Check_MK-Arbitrary-File-Disclosure.html" }, { "name": "20140528 LSE Leading Security Experts GmbH - LSE-2014-05-21 - Check_MK - Arbitrary File Disclosure Vulnerability", "refsource": "BUGTRAQ", "url": "https://www.securityfocus.com/archive/1/532224/100/0/threaded" }, { "name": "http://git.mathias-kettner.de/git/?p=check_mk.git;a=commit;h=a2ef8d00c53ec9cbd05c4ae2f09b50761130e7ce", "refsource": "CONFIRM", "url": "http://git.mathias-kettner.de/git/?p=check_mk.git;a=commit;h=a2ef8d00c53ec9cbd05c4ae2f09b50761130e7ce" } ] } } } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2014-0243", "datePublished": "2018-07-19T17:00:00", "dateReserved": "2013-12-03T00:00:00", "dateUpdated": "2024-08-06T09:05:39.316Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-11507 (GCVE-0-2017-11507)
Vulnerability from cvelistv5
Published
2017-12-11 16:00
Modified
2024-09-16 22:20
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Stored and Reflected Cross Site Scripting (XSS)
Summary
A cross site scripting (XSS) vulnerability exists in Check_MK versions 1.2.8x prior to 1.2.8p25 and 1.4.0x prior to 1.4.0p9, allowing an unauthenticated attacker to inject arbitrary HTML or JavaScript via the output_format parameter, and the username parameter of failed HTTP basic authentication attempts, which is returned unencoded in an internal server error page.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T18:12:40.193Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.tenable.com/security/research/tra-2017-20" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://mathias-kettner.com/check_mk_werks.php?werk_id=7661" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Check_MK", "vendor": "Tenable", "versions": [ { "status": "affected", "version": "1.2.8x prior to 1. 2.8p25" }, { "status": "affected", "version": "1.4.0x prior to 1.4.0p9" } ] } ], "datePublic": "2017-07-06T00:00:00", "descriptions": [ { "lang": "en", "value": "A cross site scripting (XSS) vulnerability exists in Check_MK versions 1.2.8x prior to 1.2.8p25 and 1.4.0x prior to 1.4.0p9, allowing an unauthenticated attacker to inject arbitrary HTML or JavaScript via the output_format parameter, and the username parameter of failed HTTP basic authentication attempts, which is returned unencoded in an internal server error page." } ], "problemTypes": [ { "descriptions": [ { "description": "Stored and Reflected Cross Site Scripting (XSS)", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-12-11T15:57:01", "orgId": "5ac1ecc2-367a-4d16-a0b2-35d495ddd0be", "shortName": "tenable" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.tenable.com/security/research/tra-2017-20" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://mathias-kettner.com/check_mk_werks.php?werk_id=7661" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vulnreport@tenable.com", "DATE_PUBLIC": "2017-07-06T00:00:00", "ID": "CVE-2017-11507", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Check_MK", "version": { "version_data": [ { "version_value": "1.2.8x prior to 1. 2.8p25" }, { "version_value": "1.4.0x prior to 1.4.0p9" } ] } } ] }, "vendor_name": "Tenable" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A cross site scripting (XSS) vulnerability exists in Check_MK versions 1.2.8x prior to 1.2.8p25 and 1.4.0x prior to 1.4.0p9, allowing an unauthenticated attacker to inject arbitrary HTML or JavaScript via the output_format parameter, and the username parameter of failed HTTP basic authentication attempts, which is returned unencoded in an internal server error page." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Stored and Reflected Cross Site Scripting (XSS)" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.tenable.com/security/research/tra-2017-20", "refsource": "MISC", "url": "https://www.tenable.com/security/research/tra-2017-20" }, { "name": "http://mathias-kettner.com/check_mk_werks.php?werk_id=7661", "refsource": "CONFIRM", "url": "http://mathias-kettner.com/check_mk_werks.php?werk_id=7661" } ] } } } }, "cveMetadata": { "assignerOrgId": "5ac1ecc2-367a-4d16-a0b2-35d495ddd0be", "assignerShortName": "tenable", "cveId": "CVE-2017-11507", "datePublished": "2017-12-11T16:00:00Z", "dateReserved": "2017-07-21T00:00:00", "dateUpdated": "2024-09-16T22:20:50.230Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2014-2332 (GCVE-0-2014-2332)
Vulnerability from cvelistv5
Published
2015-08-31 18:00
Modified
2024-08-06 10:14
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Check_MK before 1.2.2p3 and 1.2.3x before 1.2.3i5 allows remote authenticated users to delete arbitrary files via a request to an unspecified link, related to "Insecure Direct Object References." NOTE: this can be exploited by remote attackers by leveraging CVE-2014-2330.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T10:14:25.042Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20140328 Deutsche Telekom CERT Advisory [DTC-A-20140324-002] update140328", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/531656" }, { "name": "20140324 Deutsche Telekom CERT Advisory [DTC-A-20140324-002] vulnerabilities in check_mk", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/531594" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-03-24T00:00:00", "descriptions": [ { "lang": "en", "value": "Check_MK before 1.2.2p3 and 1.2.3x before 1.2.3i5 allows remote authenticated users to delete arbitrary files via a request to an unspecified link, related to \"Insecure Direct Object References.\" NOTE: this can be exploited by remote attackers by leveraging CVE-2014-2330." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2015-08-31T17:57:03", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20140328 Deutsche Telekom CERT Advisory [DTC-A-20140324-002] update140328", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/531656" }, { "name": "20140324 Deutsche Telekom CERT Advisory [DTC-A-20140324-002] vulnerabilities in check_mk", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/531594" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-2332", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Check_MK before 1.2.2p3 and 1.2.3x before 1.2.3i5 allows remote authenticated users to delete arbitrary files via a request to an unspecified link, related to \"Insecure Direct Object References.\" NOTE: this can be exploited by remote attackers by leveraging CVE-2014-2330." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20140328 Deutsche Telekom CERT Advisory [DTC-A-20140324-002] update140328", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/531656" }, { "name": "20140324 Deutsche Telekom CERT Advisory [DTC-A-20140324-002] vulnerabilities in check_mk", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/531594" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-2332", "datePublished": "2015-08-31T18:00:00", "dateReserved": "2014-03-12T00:00:00", "dateUpdated": "2024-08-06T10:14:25.042Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2014-2330 (GCVE-0-2014-2330)
Vulnerability from cvelistv5
Published
2015-08-31 18:00
Modified
2024-08-06 10:14
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Multiple cross-site request forgery (CSRF) vulnerabilities in the Multisite GUI in Check_MK before 1.2.5i2 allow remote attackers to hijack the authentication of users for requests that (1) upload arbitrary snapshots, (2) delete arbitrary files, or possibly have other unspecified impact via unknown vectors.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T10:14:25.326Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://mathias-kettner.de/check_mk_werks.php?werk_id=0766" }, { "name": "20140324 Deutsche Telekom CERT Advisory [DTC-A-20140324-002] vulnerabilities in check_mk", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/531594" }, { "name": "66389", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/66389" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-03-24T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple cross-site request forgery (CSRF) vulnerabilities in the Multisite GUI in Check_MK before 1.2.5i2 allow remote attackers to hijack the authentication of users for requests that (1) upload arbitrary snapshots, (2) delete arbitrary files, or possibly have other unspecified impact via unknown vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2015-08-31T17:57:03", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://mathias-kettner.de/check_mk_werks.php?werk_id=0766" }, { "name": "20140324 Deutsche Telekom CERT Advisory [DTC-A-20140324-002] vulnerabilities in check_mk", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/531594" }, { "name": "66389", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/66389" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-2330", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple cross-site request forgery (CSRF) vulnerabilities in the Multisite GUI in Check_MK before 1.2.5i2 allow remote attackers to hijack the authentication of users for requests that (1) upload arbitrary snapshots, (2) delete arbitrary files, or possibly have other unspecified impact via unknown vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://mathias-kettner.de/check_mk_werks.php?werk_id=0766", "refsource": "CONFIRM", "url": "http://mathias-kettner.de/check_mk_werks.php?werk_id=0766" }, { "name": "20140324 Deutsche Telekom CERT Advisory [DTC-A-20140324-002] vulnerabilities in check_mk", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/531594" }, { "name": "66389", "refsource": "BID", "url": "http://www.securityfocus.com/bid/66389" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-2330", "datePublished": "2015-08-31T18:00:00", "dateReserved": "2014-03-12T00:00:00", "dateUpdated": "2024-08-06T10:14:25.326Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2014-5339 (GCVE-0-2014-5339)
Vulnerability from cvelistv5
Published
2014-09-02 14:00
Modified
2024-08-06 11:41
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Check_MK before 1.2.4p4 and 1.2.5 before 1.2.5i4 allows remote authenticated users to write check_mk config files (.mk files) to arbitrary locations via vectors related to row selections.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T11:41:48.576Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20140820 Deutsche Telekom CERT Advisory [DTC-A-20140820-001] check_mk vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/533180/100/0/threaded" }, { "name": "RHSA-2015:1495", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1495.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/127941/Deutsche-Telekom-CERT-Advisory-DTC-A-20140820-001.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://mathias-kettner.de/check_mk_werks.php?werk_id=983" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-08-20T00:00:00", "descriptions": [ { "lang": "en", "value": "Check_MK before 1.2.4p4 and 1.2.5 before 1.2.5i4 allows remote authenticated users to write check_mk config files (.mk files) to arbitrary locations via vectors related to row selections." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-09T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20140820 Deutsche Telekom CERT Advisory [DTC-A-20140820-001] check_mk vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/533180/100/0/threaded" }, { "name": "RHSA-2015:1495", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1495.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/127941/Deutsche-Telekom-CERT-Advisory-DTC-A-20140820-001.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://mathias-kettner.de/check_mk_werks.php?werk_id=983" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-5339", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Check_MK before 1.2.4p4 and 1.2.5 before 1.2.5i4 allows remote authenticated users to write check_mk config files (.mk files) to arbitrary locations via vectors related to row selections." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20140820 Deutsche Telekom CERT Advisory [DTC-A-20140820-001] check_mk vulnerabilities", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/533180/100/0/threaded" }, { "name": "RHSA-2015:1495", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2015-1495.html" }, { "name": "http://packetstormsecurity.com/files/127941/Deutsche-Telekom-CERT-Advisory-DTC-A-20140820-001.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/127941/Deutsche-Telekom-CERT-Advisory-DTC-A-20140820-001.html" }, { "name": "http://mathias-kettner.de/check_mk_werks.php?werk_id=983", "refsource": "CONFIRM", "url": "http://mathias-kettner.de/check_mk_werks.php?werk_id=983" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-5339", "datePublished": "2014-09-02T14:00:00", "dateReserved": "2014-08-18T00:00:00", "dateUpdated": "2024-08-06T11:41:48.576Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2014-5340 (GCVE-0-2014-5340)
Vulnerability from cvelistv5
Published
2014-09-02 14:00
Modified
2024-08-06 11:41
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The wato component in Check_MK before 1.2.4p4 and 1.2.5 before 1.2.5i4 uses the pickle Python module unsafely, which allows remote attackers to execute arbitrary code via a crafted serialized object, related to an automation URL.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T11:41:48.661Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20140820 Deutsche Telekom CERT Advisory [DTC-A-20140820-001] check_mk vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/533180/100/0/threaded" }, { "name": "RHSA-2015:1495", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1495.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/127941/Deutsche-Telekom-CERT-Advisory-DTC-A-20140820-001.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://mathias-kettner.de/check_mk_werks.php?werk_id=984" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-08-20T00:00:00", "descriptions": [ { "lang": "en", "value": "The wato component in Check_MK before 1.2.4p4 and 1.2.5 before 1.2.5i4 uses the pickle Python module unsafely, which allows remote attackers to execute arbitrary code via a crafted serialized object, related to an automation URL." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-09T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20140820 Deutsche Telekom CERT Advisory [DTC-A-20140820-001] check_mk vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/533180/100/0/threaded" }, { "name": "RHSA-2015:1495", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1495.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/127941/Deutsche-Telekom-CERT-Advisory-DTC-A-20140820-001.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://mathias-kettner.de/check_mk_werks.php?werk_id=984" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-5340", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The wato component in Check_MK before 1.2.4p4 and 1.2.5 before 1.2.5i4 uses the pickle Python module unsafely, which allows remote attackers to execute arbitrary code via a crafted serialized object, related to an automation URL." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20140820 Deutsche Telekom CERT Advisory [DTC-A-20140820-001] check_mk vulnerabilities", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/533180/100/0/threaded" }, { "name": "RHSA-2015:1495", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2015-1495.html" }, { "name": "http://packetstormsecurity.com/files/127941/Deutsche-Telekom-CERT-Advisory-DTC-A-20140820-001.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/127941/Deutsche-Telekom-CERT-Advisory-DTC-A-20140820-001.html" }, { "name": "http://mathias-kettner.de/check_mk_werks.php?werk_id=984", "refsource": "CONFIRM", "url": "http://mathias-kettner.de/check_mk_werks.php?werk_id=984" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-5340", "datePublished": "2014-09-02T14:00:00", "dateReserved": "2014-08-18T00:00:00", "dateUpdated": "2024-08-06T11:41:48.661Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2014-2331 (GCVE-0-2014-2331)
Vulnerability from cvelistv5
Published
2015-08-31 18:00
Modified
2024-08-06 10:14
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Check_MK 1.2.2p2, 1.2.2p3, and 1.2.3i5 allows remote authenticated users to execute arbitrary Python code via a crafted rules.mk file in a snapshot. NOTE: this can be exploited by remote attackers by leveraging CVE-2014-2330.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T10:14:25.075Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20140328 Deutsche Telekom CERT Advisory [DTC-A-20140324-002] update140328", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/531656" }, { "name": "20140324 Deutsche Telekom CERT Advisory [DTC-A-20140324-002] vulnerabilities in check_mk", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/531594" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-03-24T00:00:00", "descriptions": [ { "lang": "en", "value": "Check_MK 1.2.2p2, 1.2.2p3, and 1.2.3i5 allows remote authenticated users to execute arbitrary Python code via a crafted rules.mk file in a snapshot. NOTE: this can be exploited by remote attackers by leveraging CVE-2014-2330." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2015-08-31T17:57:03", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20140328 Deutsche Telekom CERT Advisory [DTC-A-20140324-002] update140328", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/531656" }, { "name": "20140324 Deutsche Telekom CERT Advisory [DTC-A-20140324-002] vulnerabilities in check_mk", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/531594" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-2331", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Check_MK 1.2.2p2, 1.2.2p3, and 1.2.3i5 allows remote authenticated users to execute arbitrary Python code via a crafted rules.mk file in a snapshot. NOTE: this can be exploited by remote attackers by leveraging CVE-2014-2330." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20140328 Deutsche Telekom CERT Advisory [DTC-A-20140324-002] update140328", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/531656" }, { "name": "20140324 Deutsche Telekom CERT Advisory [DTC-A-20140324-002] vulnerabilities in check_mk", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/531594" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-2331", "datePublished": "2015-08-31T18:00:00", "dateReserved": "2014-03-12T00:00:00", "dateUpdated": "2024-08-06T10:14:25.075Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2014-5338 (GCVE-0-2014-5338)
Vulnerability from cvelistv5
Published
2014-08-22 14:00
Modified
2024-08-06 11:41
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Multiple cross-site scripting (XSS) vulnerabilities in the multisite component in Check_MK before 1.2.4p4 and 1.2.5 before 1.2.5i4 allow remote authenticated users to inject arbitrary web script or HTML via unspecified vectors to the (1) render_status_icons function in htmllib.py or (2) ajax_action function in actions.py.
References
► | URL | Tags | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T11:41:48.644Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20140820 Deutsche Telekom CERT Advisory [DTC-A-20140820-001] check_mk vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/533180/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://mathias-kettner.de/check_mk_werks.php?werk_id=0982\u0026HTML=yes" }, { "name": "69312", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/69312" }, { "name": "RHSA-2015:1495", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1495.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/127941/Deutsche-Telekom-CERT-Advisory-DTC-A-20140820-001.html" }, { "name": "checkmk-cve20145338-xss(95383)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95383" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-08-20T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in the multisite component in Check_MK before 1.2.4p4 and 1.2.5 before 1.2.5i4 allow remote authenticated users to inject arbitrary web script or HTML via unspecified vectors to the (1) render_status_icons function in htmllib.py or (2) ajax_action function in actions.py." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-09T18:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20140820 Deutsche Telekom CERT Advisory [DTC-A-20140820-001] check_mk vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/533180/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://mathias-kettner.de/check_mk_werks.php?werk_id=0982\u0026HTML=yes" }, { "name": "69312", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/69312" }, { "name": "RHSA-2015:1495", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-1495.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/127941/Deutsche-Telekom-CERT-Advisory-DTC-A-20140820-001.html" }, { "name": "checkmk-cve20145338-xss(95383)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95383" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-5338", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple cross-site scripting (XSS) vulnerabilities in the multisite component in Check_MK before 1.2.4p4 and 1.2.5 before 1.2.5i4 allow remote authenticated users to inject arbitrary web script or HTML via unspecified vectors to the (1) render_status_icons function in htmllib.py or (2) ajax_action function in actions.py." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20140820 Deutsche Telekom CERT Advisory [DTC-A-20140820-001] check_mk vulnerabilities", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/533180/100/0/threaded" }, { "name": "http://mathias-kettner.de/check_mk_werks.php?werk_id=0982\u0026HTML=yes", "refsource": "CONFIRM", "url": "http://mathias-kettner.de/check_mk_werks.php?werk_id=0982\u0026HTML=yes" }, { "name": "69312", "refsource": "BID", "url": "http://www.securityfocus.com/bid/69312" }, { "name": "RHSA-2015:1495", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2015-1495.html" }, { "name": "http://packetstormsecurity.com/files/127941/Deutsche-Telekom-CERT-Advisory-DTC-A-20140820-001.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/127941/Deutsche-Telekom-CERT-Advisory-DTC-A-20140820-001.html" }, { "name": "checkmk-cve20145338-xss(95383)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95383" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-5338", "datePublished": "2014-08-22T14:00:00", "dateReserved": "2014-08-18T00:00:00", "dateUpdated": "2024-08-06T11:41:48.644Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2014-2329 (GCVE-0-2014-2329)
Vulnerability from cvelistv5
Published
2015-08-31 18:00
Modified
2024-08-06 10:14
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Multiple cross-site scripting (XSS) vulnerabilities in Check_MK before 1.2.2p3 and 1.2.3x before 1.2.3i5 allow remote authenticated users to inject arbitrary web script or HTML via the (1) agent string for a check_mk agent, a (2) crafted request to a monitored host, which is not properly handled by the logwatch module, or other unspecified vectors.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T10:14:25.040Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20140328 Deutsche Telekom CERT Advisory [DTC-A-20140324-002] update140328", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/531656" }, { "name": "20140324 Deutsche Telekom CERT Advisory [DTC-A-20140324-002] vulnerabilities in check_mk", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/531594" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2014-03-24T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in Check_MK before 1.2.2p3 and 1.2.3x before 1.2.3i5 allow remote authenticated users to inject arbitrary web script or HTML via the (1) agent string for a check_mk agent, a (2) crafted request to a monitored host, which is not properly handled by the logwatch module, or other unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2015-08-31T17:57:03", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20140328 Deutsche Telekom CERT Advisory [DTC-A-20140324-002] update140328", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/531656" }, { "name": "20140324 Deutsche Telekom CERT Advisory [DTC-A-20140324-002] vulnerabilities in check_mk", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/531594" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2014-2329", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple cross-site scripting (XSS) vulnerabilities in Check_MK before 1.2.2p3 and 1.2.3x before 1.2.3i5 allow remote authenticated users to inject arbitrary web script or HTML via the (1) agent string for a check_mk agent, a (2) crafted request to a monitored host, which is not properly handled by the logwatch module, or other unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20140328 Deutsche Telekom CERT Advisory [DTC-A-20140324-002] update140328", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/531656" }, { "name": "20140324 Deutsche Telekom CERT Advisory [DTC-A-20140324-002] vulnerabilities in check_mk", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/531594" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2014-2329", "datePublished": "2015-08-31T18:00:00", "dateReserved": "2014-03-12T00:00:00", "dateUpdated": "2024-08-06T10:14:25.040Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-9781 (GCVE-0-2017-9781)
Vulnerability from cvelistv5
Published
2017-06-21 18:00
Modified
2024-08-05 17:18
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
A cross site scripting (XSS) vulnerability exists in Check_MK versions 1.4.0x prior to 1.4.0p6, allowing an unauthenticated remote attacker to inject arbitrary HTML or JavaScript via the _username parameter when attempting authentication to webapi.py, which is returned unencoded with content type text/html.
References
► | URL | Tags |
---|---|---|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T17:18:01.918Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://git.mathias-kettner.de/git/?p=check_mk.git%3Ba=blob%3Bf=.werks/4757%3Bhb=c248f0b6ff7b15ced9f07a3df8a80fad656ea5b1" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.tenable.com/security/research/tra-2017-21" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2017-06-21T00:00:00", "descriptions": [ { "lang": "en", "value": "A cross site scripting (XSS) vulnerability exists in Check_MK versions 1.4.0x prior to 1.4.0p6, allowing an unauthenticated remote attacker to inject arbitrary HTML or JavaScript via the _username parameter when attempting authentication to webapi.py, which is returned unencoded with content type text/html." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-11-03T09:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://git.mathias-kettner.de/git/?p=check_mk.git%3Ba=blob%3Bf=.werks/4757%3Bhb=c248f0b6ff7b15ced9f07a3df8a80fad656ea5b1" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.tenable.com/security/research/tra-2017-21" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-9781", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A cross site scripting (XSS) vulnerability exists in Check_MK versions 1.4.0x prior to 1.4.0p6, allowing an unauthenticated remote attacker to inject arbitrary HTML or JavaScript via the _username parameter when attempting authentication to webapi.py, which is returned unencoded with content type text/html." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://git.mathias-kettner.de/git/?p=check_mk.git;a=blob;f=.werks/4757;hb=c248f0b6ff7b15ced9f07a3df8a80fad656ea5b1", "refsource": "CONFIRM", "url": "http://git.mathias-kettner.de/git/?p=check_mk.git;a=blob;f=.werks/4757;hb=c248f0b6ff7b15ced9f07a3df8a80fad656ea5b1" }, { "name": "https://www.tenable.com/security/research/tra-2017-21", "refsource": "MISC", "url": "https://www.tenable.com/security/research/tra-2017-21" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-9781", "datePublished": "2017-06-21T18:00:00", "dateReserved": "2017-06-21T00:00:00", "dateUpdated": "2024-08-05T17:18:01.918Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2015-08-31 18:59
Modified
2025-04-12 10:46
Severity ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in Check_MK before 1.2.2p3 and 1.2.3x before 1.2.3i5 allow remote authenticated users to inject arbitrary web script or HTML via the (1) agent string for a check_mk agent, a (2) crafted request to a monitored host, which is not properly handled by the logwatch module, or other unspecified vectors.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
check_mk_project | check_mk | * | |
check_mk_project | check_mk | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:check_mk_project:check_mk:*:*:*:*:*:*:*:*", "matchCriteriaId": "95E0BBA3-30F1-4F41-98D2-778353C19D80", "versionEndIncluding": "1.2.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:check_mk_project:check_mk:*:*:*:*:*:*:*:*", "matchCriteriaId": "195404F2-1863-46EC-AA4E-987AFFD710AA", "versionEndIncluding": "1.2.3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in Check_MK before 1.2.2p3 and 1.2.3x before 1.2.3i5 allow remote authenticated users to inject arbitrary web script or HTML via the (1) agent string for a check_mk agent, a (2) crafted request to a monitored host, which is not properly handled by the logwatch module, or other unspecified vectors." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades de XSS en Check_MK en versiones anteriores a 1.2.2p3 y 1.2.3x en versiones anteriores a 1.2.3i5, permite a usuarios remotos autenticados inyectar secuencias de comandos web o HTML arbitrarios a trav\u00e9s de (1) la cadena agente para un agente check_mk, (2) una solicitud manipulada para un host monitorizado, lo cual no es correctamente manejado por el m\u00f3dulo logwatch, u otros vectores no especificados." } ], "id": "CVE-2014-2329", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2015-08-31T18:59:00.137", "references": [ { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/531594" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/531656" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/531594" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/531656" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-08-31 18:59
Modified
2025-04-12 10:46
Severity ?
Summary
Multiple cross-site request forgery (CSRF) vulnerabilities in the Multisite GUI in Check_MK before 1.2.5i2 allow remote attackers to hijack the authentication of users for requests that (1) upload arbitrary snapshots, (2) delete arbitrary files, or possibly have other unspecified impact via unknown vectors.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://mathias-kettner.de/check_mk_werks.php?werk_id=0766 | Vendor Advisory | |
cve@mitre.org | http://www.securityfocus.com/archive/1/531594 | ||
cve@mitre.org | http://www.securityfocus.com/bid/66389 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://mathias-kettner.de/check_mk_werks.php?werk_id=0766 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/531594 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/66389 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
check_mk_project | check_mk | * | |
check_mk_project | check_mk | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:check_mk_project:check_mk:*:*:*:*:*:*:*:*", "matchCriteriaId": "95E0BBA3-30F1-4F41-98D2-778353C19D80", "versionEndIncluding": "1.2.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:check_mk_project:check_mk:*:*:*:*:*:*:*:*", "matchCriteriaId": "195404F2-1863-46EC-AA4E-987AFFD710AA", "versionEndIncluding": "1.2.3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple cross-site request forgery (CSRF) vulnerabilities in the Multisite GUI in Check_MK before 1.2.5i2 allow remote attackers to hijack the authentication of users for requests that (1) upload arbitrary snapshots, (2) delete arbitrary files, or possibly have other unspecified impact via unknown vectors." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades de CSRF en el Multisite GUI en Check_MK en versiones anteriores a 1.2.5i2, permite a atacantes remotos secuestrar la autenticaci\u00f3n de usuarios para peticiones que (1) cargan instant\u00e1neas arbitrariamente, (2) borran archivos arbitrariamente, o posiblemente tener otros impacto no especificado a trav\u00e9s de vectores desconocidos." } ], "id": "CVE-2014-2330", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2015-08-31T18:59:01.713", "references": [ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://mathias-kettner.de/check_mk_werks.php?werk_id=0766" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/531594" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/66389" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://mathias-kettner.de/check_mk_werks.php?werk_id=0766" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/531594" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/66389" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-352" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-09-02 14:55
Modified
2025-04-12 10:46
Severity ?
Summary
The wato component in Check_MK before 1.2.4p4 and 1.2.5 before 1.2.5i4 uses the pickle Python module unsafely, which allows remote attackers to execute arbitrary code via a crafted serialized object, related to an automation URL.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://mathias-kettner.de/check_mk_werks.php?werk_id=984 | Patch, Vendor Advisory | |
cve@mitre.org | http://packetstormsecurity.com/files/127941/Deutsche-Telekom-CERT-Advisory-DTC-A-20140820-001.html | ||
cve@mitre.org | http://rhn.redhat.com/errata/RHSA-2015-1495.html | ||
cve@mitre.org | http://www.securityfocus.com/archive/1/533180/100/0/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://mathias-kettner.de/check_mk_werks.php?werk_id=984 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/127941/Deutsche-Telekom-CERT-Advisory-DTC-A-20140820-001.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2015-1495.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/533180/100/0/threaded |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
check_mk_project | check_mk | * | |
check_mk_project | check_mk | 1.2.4 | |
check_mk_project | check_mk | 1.2.4 | |
check_mk_project | check_mk | 1.2.4 | |
check_mk_project | check_mk | 1.2.5 | |
check_mk_project | check_mk | 1.2.5 | |
check_mk_project | check_mk | 1.2.5 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:check_mk_project:check_mk:*:p3:*:*:*:*:*:*", "matchCriteriaId": "831B5297-24A3-48DD-8024-A36FA8D68E26", "versionEndIncluding": "1.2.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:check_mk_project:check_mk:1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "95436742-D5D2-4C8C-BCBE-9207659D97ED", "vulnerable": true }, { "criteria": "cpe:2.3:a:check_mk_project:check_mk:1.2.4:p1:*:*:*:*:*:*", "matchCriteriaId": "1B7019F5-4E38-4895-803F-842F6EEBD5A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:check_mk_project:check_mk:1.2.4:p2:*:*:*:*:*:*", "matchCriteriaId": "44880FB1-1E99-426D-8D28-9B2E09395C91", "vulnerable": true }, { "criteria": "cpe:2.3:a:check_mk_project:check_mk:1.2.5:i1:*:*:*:*:*:*", "matchCriteriaId": "A465E402-D401-45F5-AC00-5214E71D7BB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:check_mk_project:check_mk:1.2.5:i2:*:*:*:*:*:*", "matchCriteriaId": "2F6664A0-4615-4EA3-A5DF-B9846BEFF4D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:check_mk_project:check_mk:1.2.5:i3:*:*:*:*:*:*", "matchCriteriaId": "CD84DD11-025A-4404-A6F9-94D4431F315C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The wato component in Check_MK before 1.2.4p4 and 1.2.5 before 1.2.5i4 uses the pickle Python module unsafely, which allows remote attackers to execute arbitrary code via a crafted serialized object, related to an automation URL." }, { "lang": "es", "value": "El componente wato en Check_MK anterior a 1.2.4p4 y 1.2.5 anterior a 1.2.5i4 utiliza el m\u00f3dulo pickle Python de forma insegura, lo que permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de un objeto serializado manipulado, relacionado con una URL de automatizaci\u00f3n." } ], "id": "CVE-2014-5340", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-09-02T14:55:03.683", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://mathias-kettner.de/check_mk_werks.php?werk_id=984" }, { "source": "cve@mitre.org", "url": "http://packetstormsecurity.com/files/127941/Deutsche-Telekom-CERT-Advisory-DTC-A-20140820-001.html" }, { "source": "cve@mitre.org", "url": "http://rhn.redhat.com/errata/RHSA-2015-1495.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/533180/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://mathias-kettner.de/check_mk_werks.php?werk_id=984" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://packetstormsecurity.com/files/127941/Deutsche-Telekom-CERT-Advisory-DTC-A-20140820-001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2015-1495.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/533180/100/0/threaded" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-94" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-09-02 14:55
Modified
2025-04-12 10:46
Severity ?
Summary
Check_MK before 1.2.4p4 and 1.2.5 before 1.2.5i4 allows remote authenticated users to write check_mk config files (.mk files) to arbitrary locations via vectors related to row selections.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://mathias-kettner.de/check_mk_werks.php?werk_id=983 | Patch, Vendor Advisory | |
cve@mitre.org | http://packetstormsecurity.com/files/127941/Deutsche-Telekom-CERT-Advisory-DTC-A-20140820-001.html | ||
cve@mitre.org | http://rhn.redhat.com/errata/RHSA-2015-1495.html | ||
cve@mitre.org | http://www.securityfocus.com/archive/1/533180/100/0/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://mathias-kettner.de/check_mk_werks.php?werk_id=983 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/127941/Deutsche-Telekom-CERT-Advisory-DTC-A-20140820-001.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2015-1495.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/533180/100/0/threaded |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
check_mk_project | check_mk | * | |
check_mk_project | check_mk | 1.2.4 | |
check_mk_project | check_mk | 1.2.4 | |
check_mk_project | check_mk | 1.2.4 | |
check_mk_project | check_mk | 1.2.5 | |
check_mk_project | check_mk | 1.2.5 | |
check_mk_project | check_mk | 1.2.5 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:check_mk_project:check_mk:*:p3:*:*:*:*:*:*", "matchCriteriaId": "831B5297-24A3-48DD-8024-A36FA8D68E26", "versionEndIncluding": "1.2.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:check_mk_project:check_mk:1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "95436742-D5D2-4C8C-BCBE-9207659D97ED", "vulnerable": true }, { "criteria": "cpe:2.3:a:check_mk_project:check_mk:1.2.4:p1:*:*:*:*:*:*", "matchCriteriaId": "1B7019F5-4E38-4895-803F-842F6EEBD5A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:check_mk_project:check_mk:1.2.4:p2:*:*:*:*:*:*", "matchCriteriaId": "44880FB1-1E99-426D-8D28-9B2E09395C91", "vulnerable": true }, { "criteria": "cpe:2.3:a:check_mk_project:check_mk:1.2.5:i1:*:*:*:*:*:*", "matchCriteriaId": "A465E402-D401-45F5-AC00-5214E71D7BB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:check_mk_project:check_mk:1.2.5:i2:*:*:*:*:*:*", "matchCriteriaId": "2F6664A0-4615-4EA3-A5DF-B9846BEFF4D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:check_mk_project:check_mk:1.2.5:i3:*:*:*:*:*:*", "matchCriteriaId": "CD84DD11-025A-4404-A6F9-94D4431F315C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Check_MK before 1.2.4p4 and 1.2.5 before 1.2.5i4 allows remote authenticated users to write check_mk config files (.mk files) to arbitrary locations via vectors related to row selections." }, { "lang": "es", "value": "Check_MK anterior a 1.2.4p4 y 1.2.5 anterior a 1.2.5i4 permite a usuarios remotos autenticados escribir ficheros de configuraci\u00f3n check_mk (ficheros .mk) en localizaciones arbitrarias a trav\u00e9s de vectores relacionados con las selecciones de filas." } ], "id": "CVE-2014-5339", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.9, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-09-02T14:55:03.637", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://mathias-kettner.de/check_mk_werks.php?werk_id=983" }, { "source": "cve@mitre.org", "url": "http://packetstormsecurity.com/files/127941/Deutsche-Telekom-CERT-Advisory-DTC-A-20140820-001.html" }, { "source": "cve@mitre.org", "url": "http://rhn.redhat.com/errata/RHSA-2015-1495.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/533180/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://mathias-kettner.de/check_mk_werks.php?werk_id=983" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://packetstormsecurity.com/files/127941/Deutsche-Telekom-CERT-Advisory-DTC-A-20140820-001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2015-1495.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/533180/100/0/threaded" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-07-19 17:29
Modified
2024-11-21 02:01
Severity ?
Summary
Check_MK through 1.2.5i2p1 allows local users to read arbitrary files via a symlink attack to a file in /var/lib/check_mk_agent/job.
References
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://git.mathias-kettner.de/git/?p=check_mk.git%3Ba=commit%3Bh=0426323df1641596c4f01ef5a716a3b65276f01c | ||
secalert@redhat.com | http://git.mathias-kettner.de/git/?p=check_mk.git%3Ba=commit%3Bh=a2ef8d00c53ec9cbd05c4ae2f09b50761130e7ce | ||
secalert@redhat.com | http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134160.html | Exploit, Mailing List, Third Party Advisory | |
secalert@redhat.com | http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134166.html | Exploit, Mailing List, Third Party Advisory | |
secalert@redhat.com | http://packetstormsecurity.com/files/126857/Check_MK-Arbitrary-File-Disclosure.html | Exploit, Third Party Advisory, VDB Entry | |
secalert@redhat.com | http://seclists.org/fulldisclosure/2014/May/145 | Mailing List, Third Party Advisory | |
secalert@redhat.com | http://www.openwall.com/lists/oss-security/2014/05/28/1 | Exploit, Mailing List, Third Party Advisory | |
secalert@redhat.com | http://www.securityfocus.com/bid/67674 | Third Party Advisory, VDB Entry | |
secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=1101669 | Issue Tracking, Patch, Third Party Advisory | |
secalert@redhat.com | https://secuniaresearch.flexerasoftware.com/advisories/58536 | Permissions Required, Third Party Advisory | |
secalert@redhat.com | https://www.securityfocus.com/archive/1/532224/100/0/threaded | Exploit, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://git.mathias-kettner.de/git/?p=check_mk.git%3Ba=commit%3Bh=0426323df1641596c4f01ef5a716a3b65276f01c | ||
af854a3a-2127-422b-91ae-364da2661108 | http://git.mathias-kettner.de/git/?p=check_mk.git%3Ba=commit%3Bh=a2ef8d00c53ec9cbd05c4ae2f09b50761130e7ce | ||
af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134160.html | Exploit, Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134166.html | Exploit, Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/126857/Check_MK-Arbitrary-File-Disclosure.html | Exploit, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2014/May/145 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2014/05/28/1 | Exploit, Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/67674 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=1101669 | Issue Tracking, Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://secuniaresearch.flexerasoftware.com/advisories/58536 | Permissions Required, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.securityfocus.com/archive/1/532224/100/0/threaded | Exploit, Third Party Advisory, VDB Entry |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
check_mk_project | check_mk | * | |
check_mk_project | check_mk | 1.2.5 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:check_mk_project:check_mk:*:*:*:*:*:*:*:*", "matchCriteriaId": "C5C1D820-1BCC-46E1-91D1-ADA270E53979", "versionEndIncluding": "1.2.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:check_mk_project:check_mk:1.2.5:i2p1:*:*:*:*:*:*", "matchCriteriaId": "FF9AAC1D-1847-4C4B-BE1A-98BC5CEDE928", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Check_MK through 1.2.5i2p1 allows local users to read arbitrary files via a symlink attack to a file in /var/lib/check_mk_agent/job." }, { "lang": "es", "value": "Check_MK hasta la versi\u00f3n 1.2.5i2p1 permite que usuarios locales lean archivos arbitrarios mediante un ataque de enlace simb\u00f3lico contra un archivo en /var/lib/check_mk_agent/job." } ], "id": "CVE-2014-0243", "lastModified": "2024-11-21T02:01:44.443", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-07-19T17:29:00.233", "references": [ { "source": "secalert@redhat.com", "url": "http://git.mathias-kettner.de/git/?p=check_mk.git%3Ba=commit%3Bh=0426323df1641596c4f01ef5a716a3b65276f01c" }, { "source": "secalert@redhat.com", "url": "http://git.mathias-kettner.de/git/?p=check_mk.git%3Ba=commit%3Bh=a2ef8d00c53ec9cbd05c4ae2f09b50761130e7ce" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Mailing List", "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134160.html" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Mailing List", "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134166.html" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/126857/Check_MK-Arbitrary-File-Disclosure.html" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2014/May/145" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2014/05/28/1" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/67674" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1101669" }, { "source": "secalert@redhat.com", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://secuniaresearch.flexerasoftware.com/advisories/58536" }, { "source": "secalert@redhat.com", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://www.securityfocus.com/archive/1/532224/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://git.mathias-kettner.de/git/?p=check_mk.git%3Ba=commit%3Bh=0426323df1641596c4f01ef5a716a3b65276f01c" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://git.mathias-kettner.de/git/?p=check_mk.git%3Ba=commit%3Bh=a2ef8d00c53ec9cbd05c4ae2f09b50761130e7ce" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Mailing List", "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134160.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Mailing List", "Third Party Advisory" ], "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134166.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/126857/Check_MK-Arbitrary-File-Disclosure.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://seclists.org/fulldisclosure/2014/May/145" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2014/05/28/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/67674" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1101669" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Permissions Required", "Third Party Advisory" ], "url": "https://secuniaresearch.flexerasoftware.com/advisories/58536" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://www.securityfocus.com/archive/1/532224/100/0/threaded" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-59" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-08-31 18:59
Modified
2025-04-12 10:46
Severity ?
Summary
Check_MK before 1.2.2p3 and 1.2.3x before 1.2.3i5 allows remote authenticated users to delete arbitrary files via a request to an unspecified link, related to "Insecure Direct Object References." NOTE: this can be exploited by remote attackers by leveraging CVE-2014-2330.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
check_mk_project | check_mk | * | |
check_mk_project | check_mk | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:check_mk_project:check_mk:*:*:*:*:*:*:*:*", "matchCriteriaId": "95E0BBA3-30F1-4F41-98D2-778353C19D80", "versionEndIncluding": "1.2.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:check_mk_project:check_mk:*:*:*:*:*:*:*:*", "matchCriteriaId": "195404F2-1863-46EC-AA4E-987AFFD710AA", "versionEndIncluding": "1.2.3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Check_MK before 1.2.2p3 and 1.2.3x before 1.2.3i5 allows remote authenticated users to delete arbitrary files via a request to an unspecified link, related to \"Insecure Direct Object References.\" NOTE: this can be exploited by remote attackers by leveraging CVE-2014-2330." }, { "lang": "es", "value": "Vulnerabilidad en Check_MK en versiones anteriores a 1.2.2p3 y 1.2.3x en versiones anteriores a 1.2.3i5, permite a usuarios remotos autenticados borrar archivos arbitrarios a trav\u00e9s de peticiones a un link no especificado, relacionado con \u0027Insecure Direct Object References.\u0027 NOTA: esto puede ser explotado por atacantes remotos mediante el aprovechamiento CVE-2014-2330." } ], "id": "CVE-2014-2332", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 5.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-08-31T18:59:04.557", "references": [ { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/531594" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/531656" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/531594" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/531656" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-06-21 18:29
Modified
2025-04-20 01:37
Severity ?
Summary
A cross site scripting (XSS) vulnerability exists in Check_MK versions 1.4.0x prior to 1.4.0p6, allowing an unauthenticated remote attacker to inject arbitrary HTML or JavaScript via the _username parameter when attempting authentication to webapi.py, which is returned unencoded with content type text/html.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://git.mathias-kettner.de/git/?p=check_mk.git%3Ba=blob%3Bf=.werks/4757%3Bhb=c248f0b6ff7b15ced9f07a3df8a80fad656ea5b1 | ||
cve@mitre.org | https://www.tenable.com/security/research/tra-2017-21 | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://git.mathias-kettner.de/git/?p=check_mk.git%3Ba=blob%3Bf=.werks/4757%3Bhb=c248f0b6ff7b15ced9f07a3df8a80fad656ea5b1 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://www.tenable.com/security/research/tra-2017-21 | Exploit, Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
check_mk_project | check_mk | 1.4.0 | |
check_mk_project | check_mk | 1.4.0 | |
check_mk_project | check_mk | 1.4.0 | |
check_mk_project | check_mk | 1.4.0 | |
check_mk_project | check_mk | 1.4.0 | |
check_mk_project | check_mk | 1.4.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:check_mk_project:check_mk:1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "C3877AA7-4BAF-4C0E-B157-ED2473ACC72A", "vulnerable": true }, { "criteria": "cpe:2.3:a:check_mk_project:check_mk:1.4.0:p1:*:*:*:*:*:*", "matchCriteriaId": "BF31D012-B7D8-4218-8DF0-9497287FC3BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:check_mk_project:check_mk:1.4.0:p2:*:*:*:*:*:*", "matchCriteriaId": "0022EF65-24D5-403E-8824-75BC928FC88F", "vulnerable": true }, { "criteria": "cpe:2.3:a:check_mk_project:check_mk:1.4.0:p3:*:*:*:*:*:*", "matchCriteriaId": "8F375250-FC89-4FEE-BE18-5724136EF89E", "vulnerable": true }, { "criteria": "cpe:2.3:a:check_mk_project:check_mk:1.4.0:p4:*:*:*:*:*:*", "matchCriteriaId": "91C50D90-64F3-45EF-B5D8-DA689D4FC0C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:check_mk_project:check_mk:1.4.0:p5:*:*:*:*:*:*", "matchCriteriaId": "39911FDF-8755-425E-937C-9AA6E4A3BA7E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A cross site scripting (XSS) vulnerability exists in Check_MK versions 1.4.0x prior to 1.4.0p6, allowing an unauthenticated remote attacker to inject arbitrary HTML or JavaScript via the _username parameter when attempting authentication to webapi.py, which is returned unencoded with content type text/html." }, { "lang": "es", "value": "Existe una vulnerabilidad de Cross-Site Scripting (XSS) en Check_MK, en versiones 1.4.0x anteriores a la 1.4.0p6, que permite que un atacante remoto no autenticado inyecte HTML o JavaScript arbitrarios mediante el par\u00e1metro _username al intentar autenticarse en webapi.py, que se devuelve sin cifrar con el tipo de contenido texto/html." } ], "id": "CVE-2017-9781", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-06-21T18:29:00.387", "references": [ { "source": "cve@mitre.org", "url": "http://git.mathias-kettner.de/git/?p=check_mk.git%3Ba=blob%3Bf=.werks/4757%3Bhb=c248f0b6ff7b15ced9f07a3df8a80fad656ea5b1" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.tenable.com/security/research/tra-2017-21" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://git.mathias-kettner.de/git/?p=check_mk.git%3Ba=blob%3Bf=.werks/4757%3Bhb=c248f0b6ff7b15ced9f07a3df8a80fad656ea5b1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.tenable.com/security/research/tra-2017-21" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2015-08-31 18:59
Modified
2025-04-12 10:46
Severity ?
Summary
Check_MK 1.2.2p2, 1.2.2p3, and 1.2.3i5 allows remote authenticated users to execute arbitrary Python code via a crafted rules.mk file in a snapshot. NOTE: this can be exploited by remote attackers by leveraging CVE-2014-2330.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
check_mk_project | check_mk | * | |
check_mk_project | check_mk | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:check_mk_project:check_mk:*:*:*:*:*:*:*:*", "matchCriteriaId": "95E0BBA3-30F1-4F41-98D2-778353C19D80", "versionEndIncluding": "1.2.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:check_mk_project:check_mk:*:*:*:*:*:*:*:*", "matchCriteriaId": "195404F2-1863-46EC-AA4E-987AFFD710AA", "versionEndIncluding": "1.2.3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Check_MK 1.2.2p2, 1.2.2p3, and 1.2.3i5 allows remote authenticated users to execute arbitrary Python code via a crafted rules.mk file in a snapshot. NOTE: this can be exploited by remote attackers by leveraging CVE-2014-2330." }, { "lang": "es", "value": "Vulnerabilidad en Check_MK 1.2.2p2, 1.2.2p3 y 1.2.3i5, permite a usuarios remotos autenticados ejecutar c\u00f3digo Python arbitrariamente a trav\u00e9s de un archivo rules.mk manipulado en una instant\u00e1nea. NOTA: esto puede ser explotado por atacantes remotos mediante el aprovechamiento CVE-2014-2330." } ], "id": "CVE-2014-2331", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 8.5, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2015-08-31T18:59:03.183", "references": [ { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/531594" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/531656" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/531594" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/531656" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-94" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2014-08-22 14:55
Modified
2025-04-12 10:46
Severity ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in the multisite component in Check_MK before 1.2.4p4 and 1.2.5 before 1.2.5i4 allow remote authenticated users to inject arbitrary web script or HTML via unspecified vectors to the (1) render_status_icons function in htmllib.py or (2) ajax_action function in actions.py.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://mathias-kettner.de/check_mk_werks.php?werk_id=0982&HTML=yes | Patch, Vendor Advisory | |
cve@mitre.org | http://packetstormsecurity.com/files/127941/Deutsche-Telekom-CERT-Advisory-DTC-A-20140820-001.html | ||
cve@mitre.org | http://rhn.redhat.com/errata/RHSA-2015-1495.html | ||
cve@mitre.org | http://www.securityfocus.com/archive/1/533180/100/0/threaded | ||
cve@mitre.org | http://www.securityfocus.com/bid/69312 | ||
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/95383 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://mathias-kettner.de/check_mk_werks.php?werk_id=0982&HTML=yes | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/127941/Deutsche-Telekom-CERT-Advisory-DTC-A-20140820-001.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2015-1495.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/533180/100/0/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/69312 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/95383 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
check_mk_project | check_mk | 1.2.4 | |
check_mk_project | check_mk | 1.2.4 | |
check_mk_project | check_mk | 1.2.4 | |
check_mk_project | check_mk | 1.2.4 | |
check_mk_project | check_mk | 1.2.5 | |
check_mk_project | check_mk | 1.2.5 | |
check_mk_project | check_mk | 1.2.5 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:check_mk_project:check_mk:1.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "95436742-D5D2-4C8C-BCBE-9207659D97ED", "vulnerable": true }, { "criteria": "cpe:2.3:a:check_mk_project:check_mk:1.2.4:p1:*:*:*:*:*:*", "matchCriteriaId": "1B7019F5-4E38-4895-803F-842F6EEBD5A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:check_mk_project:check_mk:1.2.4:p2:*:*:*:*:*:*", "matchCriteriaId": "44880FB1-1E99-426D-8D28-9B2E09395C91", "vulnerable": true }, { "criteria": "cpe:2.3:a:check_mk_project:check_mk:1.2.4:p3:*:*:*:*:*:*", "matchCriteriaId": "02A2758A-B539-44BF-9D21-792D66467AB1", "vulnerable": true }, { "criteria": "cpe:2.3:a:check_mk_project:check_mk:1.2.5:i1:*:*:*:*:*:*", "matchCriteriaId": "A465E402-D401-45F5-AC00-5214E71D7BB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:check_mk_project:check_mk:1.2.5:i2:*:*:*:*:*:*", "matchCriteriaId": "2F6664A0-4615-4EA3-A5DF-B9846BEFF4D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:check_mk_project:check_mk:1.2.5:i3:*:*:*:*:*:*", "matchCriteriaId": "CD84DD11-025A-4404-A6F9-94D4431F315C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple cross-site scripting (XSS) vulnerabilities in the multisite component in Check_MK before 1.2.4p4 and 1.2.5 before 1.2.5i4 allow remote authenticated users to inject arbitrary web script or HTML via unspecified vectors to the (1) render_status_icons function in htmllib.py or (2) ajax_action function in actions.py." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades de XSS en el componente multisite en Check_MK en versiones anteriores a 1.2.4p4 y 1.2.5 en versiones anteriores a 1.2.5i4 permiten a usuarios remotos autenticados inyectar secuencias de comandos web o HMTL arbitrarios a trav\u00e9s de vectores no especificados para la funci\u00f3n (1) render_status_icons en htmllib.py o (2) ajax_action en actions.py." } ], "id": "CVE-2014-5338", "lastModified": "2025-04-12T10:46:40.837", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2014-08-22T14:55:09.297", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://mathias-kettner.de/check_mk_werks.php?werk_id=0982\u0026HTML=yes" }, { "source": "cve@mitre.org", "url": "http://packetstormsecurity.com/files/127941/Deutsche-Telekom-CERT-Advisory-DTC-A-20140820-001.html" }, { "source": "cve@mitre.org", "url": "http://rhn.redhat.com/errata/RHSA-2015-1495.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/533180/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/69312" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95383" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://mathias-kettner.de/check_mk_werks.php?werk_id=0982\u0026HTML=yes" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://packetstormsecurity.com/files/127941/Deutsche-Telekom-CERT-Advisory-DTC-A-20140820-001.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2015-1495.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/533180/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/69312" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95383" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-12-11 16:29
Modified
2025-04-20 01:37
Severity ?
Summary
A cross site scripting (XSS) vulnerability exists in Check_MK versions 1.2.8x prior to 1.2.8p25 and 1.4.0x prior to 1.4.0p9, allowing an unauthenticated attacker to inject arbitrary HTML or JavaScript via the output_format parameter, and the username parameter of failed HTTP basic authentication attempts, which is returned unencoded in an internal server error page.
References
▶ | URL | Tags | |
---|---|---|---|
vulnreport@tenable.com | http://mathias-kettner.com/check_mk_werks.php?werk_id=7661 | Vendor Advisory | |
vulnreport@tenable.com | https://www.tenable.com/security/research/tra-2017-20 | Exploit, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://mathias-kettner.com/check_mk_werks.php?werk_id=7661 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.tenable.com/security/research/tra-2017-20 | Exploit, Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
check_mk_project | check_mk | 1.2.8 | |
check_mk_project | check_mk | 1.2.8 | |
check_mk_project | check_mk | 1.2.8 | |
check_mk_project | check_mk | 1.2.8 | |
check_mk_project | check_mk | 1.2.8 | |
check_mk_project | check_mk | 1.2.8 | |
check_mk_project | check_mk | 1.2.8 | |
check_mk_project | check_mk | 1.2.8 | |
check_mk_project | check_mk | 1.2.8 | |
check_mk_project | check_mk | 1.2.8 | |
check_mk_project | check_mk | 1.2.8 | |
check_mk_project | check_mk | 1.2.8 | |
check_mk_project | check_mk | 1.2.8 | |
check_mk_project | check_mk | 1.2.8 | |
check_mk_project | check_mk | 1.2.8 | |
check_mk_project | check_mk | 1.2.8 | |
check_mk_project | check_mk | 1.2.8 | |
check_mk_project | check_mk | 1.2.8 | |
check_mk_project | check_mk | 1.2.8 | |
check_mk_project | check_mk | 1.2.8 | |
check_mk_project | check_mk | 1.2.8 | |
check_mk_project | check_mk | 1.2.8 | |
check_mk_project | check_mk | 1.2.8 | |
check_mk_project | check_mk | 1.2.8 | |
check_mk_project | check_mk | 1.2.8 | |
check_mk_project | check_mk | 1.2.8 | |
check_mk_project | check_mk | 1.2.8 | |
check_mk_project | check_mk | 1.2.8 | |
check_mk_project | check_mk | 1.2.8 | |
check_mk_project | check_mk | 1.2.8 | |
check_mk_project | check_mk | 1.2.8 | |
check_mk_project | check_mk | 1.2.8 | |
check_mk_project | check_mk | 1.2.8 | |
check_mk_project | check_mk | 1.2.8 | |
check_mk_project | check_mk | 1.2.8 | |
check_mk_project | check_mk | 1.2.8 | |
check_mk_project | check_mk | 1.2.8 | |
check_mk_project | check_mk | 1.4.0 | |
check_mk_project | check_mk | 1.4.0 | |
check_mk_project | check_mk | 1.4.0 | |
check_mk_project | check_mk | 1.4.0 | |
check_mk_project | check_mk | 1.4.0 | |
check_mk_project | check_mk | 1.4.0 | |
check_mk_project | check_mk | 1.4.0 | |
check_mk_project | check_mk | 1.4.0 | |
check_mk_project | check_mk | 1.4.0 | |
check_mk_project | check_mk | 1.4.0 | |
check_mk_project | check_mk | 1.4.0 | |
check_mk_project | check_mk | 1.4.0 | |
check_mk_project | check_mk | 1.4.0 | |
check_mk_project | check_mk | 1.4.0 | |
check_mk_project | check_mk | 1.4.0 | |
check_mk_project | check_mk | 1.4.0 | |
check_mk_project | check_mk | 1.4.0 | |
check_mk_project | check_mk | 1.4.0 | |
check_mk_project | check_mk | 1.4.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:check_mk_project:check_mk:1.2.8:*:*:*:*:*:*:*", "matchCriteriaId": "8092DB19-E0BA-4B15-A0F7-1A3C5231509E", "vulnerable": true }, { "criteria": "cpe:2.3:a:check_mk_project:check_mk:1.2.8:b1:*:*:*:*:*:*", "matchCriteriaId": "EFDD2029-57C2-44A7-8A74-996E9B75C9E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:check_mk_project:check_mk:1.2.8:b10:*:*:*:*:*:*", "matchCriteriaId": "E371EF4B-C98B-4C51-9834-CF438FFCEE29", "vulnerable": true }, { "criteria": "cpe:2.3:a:check_mk_project:check_mk:1.2.8:b11:*:*:*:*:*:*", "matchCriteriaId": "DEF6FFAA-2102-44B7-B960-F26A7FD5727A", "vulnerable": true }, { "criteria": "cpe:2.3:a:check_mk_project:check_mk:1.2.8:b2:*:*:*:*:*:*", "matchCriteriaId": "19FFC978-8EC9-44ED-A878-7B7E783F46EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:check_mk_project:check_mk:1.2.8:b3:*:*:*:*:*:*", "matchCriteriaId": "2B3CCAEE-A1F6-4BD2-B2B6-13A47856AB5F", "vulnerable": true }, { "criteria": "cpe:2.3:a:check_mk_project:check_mk:1.2.8:b4:*:*:*:*:*:*", "matchCriteriaId": "8D5E7D5B-E8E6-4999-98FB-C2C5F2070A42", "vulnerable": true }, { "criteria": "cpe:2.3:a:check_mk_project:check_mk:1.2.8:b5:*:*:*:*:*:*", "matchCriteriaId": "19CD3577-F4F6-4BB4-ACA0-944E29D4CF91", "vulnerable": true }, { "criteria": "cpe:2.3:a:check_mk_project:check_mk:1.2.8:b6:*:*:*:*:*:*", "matchCriteriaId": "3A74A6D5-FF40-406F-B333-B579E0025452", "vulnerable": true }, { "criteria": "cpe:2.3:a:check_mk_project:check_mk:1.2.8:b7:*:*:*:*:*:*", "matchCriteriaId": "326517F9-5F02-4904-9780-BE8A8E8C0F6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:check_mk_project:check_mk:1.2.8:b8:*:*:*:*:*:*", "matchCriteriaId": "D59191F1-BC21-4561-B096-675541F4C0EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:check_mk_project:check_mk:1.2.8:b9:*:*:*:*:*:*", "matchCriteriaId": "FD0155A1-18A1-4207-B6C6-D05C452469F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:check_mk_project:check_mk:1.2.8:p1:*:*:*:*:*:*", "matchCriteriaId": "21117E27-5C65-4F56-9C09-A4F970BB53B8", "vulnerable": true }, { "criteria": "cpe:2.3:a:check_mk_project:check_mk:1.2.8:p10:*:*:*:*:*:*", "matchCriteriaId": "5E2470DF-9ACF-4617-9DDE-21F389A72BFB", "vulnerable": true }, { "criteria": "cpe:2.3:a:check_mk_project:check_mk:1.2.8:p11:*:*:*:*:*:*", "matchCriteriaId": "9AB49A12-5CA7-4ED8-A8C3-DB7F36D9ABD3", "vulnerable": true }, { "criteria": "cpe:2.3:a:check_mk_project:check_mk:1.2.8:p12:*:*:*:*:*:*", "matchCriteriaId": "1745717B-C28E-4F46-ABCB-E0FF405C838D", "vulnerable": true }, { "criteria": "cpe:2.3:a:check_mk_project:check_mk:1.2.8:p13:*:*:*:*:*:*", "matchCriteriaId": "A8DFD63E-F095-460A-AEAB-96469916CBA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:check_mk_project:check_mk:1.2.8:p14:*:*:*:*:*:*", "matchCriteriaId": "08EDA08F-1E24-476F-84AC-7C882F3B269A", "vulnerable": true }, { "criteria": "cpe:2.3:a:check_mk_project:check_mk:1.2.8:p15:*:*:*:*:*:*", "matchCriteriaId": "8EEA59F3-F5A1-4568-AA66-120089E8949D", "vulnerable": true }, { "criteria": "cpe:2.3:a:check_mk_project:check_mk:1.2.8:p16:*:*:*:*:*:*", "matchCriteriaId": "2B22DEB7-EC72-4F0C-9122-0A79A970E887", "vulnerable": true }, { "criteria": "cpe:2.3:a:check_mk_project:check_mk:1.2.8:p17:*:*:*:*:*:*", "matchCriteriaId": "4AB16980-3EEB-43A1-B338-D36E15CC709C", "vulnerable": true }, { "criteria": "cpe:2.3:a:check_mk_project:check_mk:1.2.8:p18:*:*:*:*:*:*", "matchCriteriaId": "3E1C3599-E105-4908-B3BA-62271631265E", "vulnerable": true }, { "criteria": "cpe:2.3:a:check_mk_project:check_mk:1.2.8:p19:*:*:*:*:*:*", "matchCriteriaId": "98308132-2372-4CB0-A480-802C2ECC68F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:check_mk_project:check_mk:1.2.8:p2:*:*:*:*:*:*", "matchCriteriaId": "8AEE1C41-6C2C-4AF4-B037-120F5A3671D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:check_mk_project:check_mk:1.2.8:p20:*:*:*:*:*:*", "matchCriteriaId": "4A8116B1-2BC6-49B6-AC40-1DECBAB96EF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:check_mk_project:check_mk:1.2.8:p21:*:*:*:*:*:*", "matchCriteriaId": "E840BCD2-FFA3-4DE8-8AEF-267BC0E51F4D", "vulnerable": true }, { "criteria": "cpe:2.3:a:check_mk_project:check_mk:1.2.8:p22:*:*:*:*:*:*", "matchCriteriaId": "D58D7ACE-21F5-48DF-8504-27724C6037D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:check_mk_project:check_mk:1.2.8:p23:*:*:*:*:*:*", "matchCriteriaId": "67BBD37F-7591-4230-A583-A133D6449F8C", "vulnerable": true }, { "criteria": "cpe:2.3:a:check_mk_project:check_mk:1.2.8:p24:*:*:*:*:*:*", "matchCriteriaId": "AD3D1E69-A1C6-4F3D-9883-ABE3666A4622", "vulnerable": true }, { "criteria": "cpe:2.3:a:check_mk_project:check_mk:1.2.8:p25:*:*:*:*:*:*", "matchCriteriaId": "8C61B022-5C8C-467A-B495-4DFB6AED6C3D", "vulnerable": true }, { "criteria": "cpe:2.3:a:check_mk_project:check_mk:1.2.8:p3:*:*:*:*:*:*", "matchCriteriaId": "4FA69A23-76BA-4CC6-B74C-4D0E6B8727C8", "vulnerable": true }, { "criteria": "cpe:2.3:a:check_mk_project:check_mk:1.2.8:p4:*:*:*:*:*:*", "matchCriteriaId": "C91EEE8B-626F-4BAB-B2BC-FBABECA7D269", "vulnerable": true }, { "criteria": "cpe:2.3:a:check_mk_project:check_mk:1.2.8:p5:*:*:*:*:*:*", "matchCriteriaId": "708FA58F-CFB6-4F56-929D-2AFA7D46D937", "vulnerable": true }, { "criteria": "cpe:2.3:a:check_mk_project:check_mk:1.2.8:p6:*:*:*:*:*:*", "matchCriteriaId": "AD3D69AC-37D8-44EB-A28D-71512F635308", "vulnerable": true }, { "criteria": "cpe:2.3:a:check_mk_project:check_mk:1.2.8:p7:*:*:*:*:*:*", "matchCriteriaId": "DE11B082-31C3-469E-81E6-546E85B23FDD", "vulnerable": true }, { "criteria": "cpe:2.3:a:check_mk_project:check_mk:1.2.8:p8:*:*:*:*:*:*", "matchCriteriaId": "10C0D1A0-5619-42AE-98F5-0B50AAABC689", "vulnerable": true }, { "criteria": "cpe:2.3:a:check_mk_project:check_mk:1.2.8:p9:*:*:*:*:*:*", "matchCriteriaId": "754CA39C-8818-4AB1-9A34-1D5F615268FA", "vulnerable": true }, { "criteria": "cpe:2.3:a:check_mk_project:check_mk:1.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "C3877AA7-4BAF-4C0E-B157-ED2473ACC72A", "vulnerable": true }, { "criteria": "cpe:2.3:a:check_mk_project:check_mk:1.4.0:b1:*:*:*:*:*:*", "matchCriteriaId": "72598B63-90F9-4E9E-9526-33E7E4349F00", "vulnerable": true }, { "criteria": "cpe:2.3:a:check_mk_project:check_mk:1.4.0:b2:*:*:*:*:*:*", "matchCriteriaId": "46374508-99AB-45F1-99A6-705CE25CAF01", "vulnerable": true }, { "criteria": "cpe:2.3:a:check_mk_project:check_mk:1.4.0:b3:*:*:*:*:*:*", "matchCriteriaId": "B282B7A3-ECDA-4110-A434-6C7F33564DB1", "vulnerable": true }, { "criteria": "cpe:2.3:a:check_mk_project:check_mk:1.4.0:b4:*:*:*:*:*:*", "matchCriteriaId": "DFA2F31D-CE39-4B20-BAC8-9B3D4D5BFAF2", "vulnerable": true }, { "criteria": "cpe:2.3:a:check_mk_project:check_mk:1.4.0:b5:*:*:*:*:*:*", "matchCriteriaId": "B4B11BD1-1E1A-49C3-AA76-47E255889FEE", "vulnerable": true }, { "criteria": "cpe:2.3:a:check_mk_project:check_mk:1.4.0:b6:*:*:*:*:*:*", "matchCriteriaId": "0DBD03C9-57CD-47B6-A054-BABF063F8819", "vulnerable": true }, { "criteria": "cpe:2.3:a:check_mk_project:check_mk:1.4.0:b7:*:*:*:*:*:*", "matchCriteriaId": "B49E4EE5-980B-4774-B449-F299D28449D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:check_mk_project:check_mk:1.4.0:b8:*:*:*:*:*:*", "matchCriteriaId": "CCD224CB-B9DF-42BB-B488-B7484EABCE18", "vulnerable": true }, { "criteria": "cpe:2.3:a:check_mk_project:check_mk:1.4.0:b9:*:*:*:*:*:*", "matchCriteriaId": "99935D23-5F86-40D0-AEB7-48966245940E", "vulnerable": true }, { "criteria": "cpe:2.3:a:check_mk_project:check_mk:1.4.0:p1:*:*:*:*:*:*", "matchCriteriaId": "BF31D012-B7D8-4218-8DF0-9497287FC3BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:check_mk_project:check_mk:1.4.0:p2:*:*:*:*:*:*", "matchCriteriaId": "0022EF65-24D5-403E-8824-75BC928FC88F", "vulnerable": true }, { "criteria": "cpe:2.3:a:check_mk_project:check_mk:1.4.0:p3:*:*:*:*:*:*", "matchCriteriaId": "8F375250-FC89-4FEE-BE18-5724136EF89E", "vulnerable": true }, { "criteria": "cpe:2.3:a:check_mk_project:check_mk:1.4.0:p4:*:*:*:*:*:*", "matchCriteriaId": "91C50D90-64F3-45EF-B5D8-DA689D4FC0C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:check_mk_project:check_mk:1.4.0:p5:*:*:*:*:*:*", "matchCriteriaId": "39911FDF-8755-425E-937C-9AA6E4A3BA7E", "vulnerable": true }, { "criteria": "cpe:2.3:a:check_mk_project:check_mk:1.4.0:p6:*:*:*:*:*:*", "matchCriteriaId": "F490BFD8-0616-4685-9D8A-923265511FFD", "vulnerable": true }, { "criteria": "cpe:2.3:a:check_mk_project:check_mk:1.4.0:p7:*:*:*:*:*:*", "matchCriteriaId": "D007BC56-DEF4-4BB2-89D9-6BF24F167BCA", "vulnerable": true }, { "criteria": "cpe:2.3:a:check_mk_project:check_mk:1.4.0:p8:*:*:*:*:*:*", "matchCriteriaId": "F567D291-1B96-4475-A5B6-191C59162E64", "vulnerable": true }, { "criteria": "cpe:2.3:a:check_mk_project:check_mk:1.4.0:p9:*:*:*:*:*:*", "matchCriteriaId": "B9820F0D-682C-45DC-AC9C-78F5C75EFE8D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A cross site scripting (XSS) vulnerability exists in Check_MK versions 1.2.8x prior to 1.2.8p25 and 1.4.0x prior to 1.4.0p9, allowing an unauthenticated attacker to inject arbitrary HTML or JavaScript via the output_format parameter, and the username parameter of failed HTTP basic authentication attempts, which is returned unencoded in an internal server error page." }, { "lang": "es", "value": "Existe una vulnerabilidad de Cross-Site Scripting (XSS) en Check_MK en versiones 1.2.8x anteriores a la 1.2.8p25 y versiones 1.4.0x anteriores a la 1.4.0p9. Esto permite que un atacante no autenticado inyecte c\u00f3digo HTML o JavaScript arbitrario mediante el par\u00e1metro output_format y el par\u00e1metro username de intentos de autenticaci\u00f3n HTTP basica fallidos, que se devuelve no codificado en una p\u00e1gina de error interno del servidor." } ], "id": "CVE-2017-11507", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-12-11T16:29:00.203", "references": [ { "source": "vulnreport@tenable.com", "tags": [ "Vendor Advisory" ], "url": "http://mathias-kettner.com/check_mk_werks.php?werk_id=7661" }, { "source": "vulnreport@tenable.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.tenable.com/security/research/tra-2017-20" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://mathias-kettner.com/check_mk_werks.php?werk_id=7661" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.tenable.com/security/research/tra-2017-20" } ], "sourceIdentifier": "vulnreport@tenable.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }