Search criteria
30 vulnerabilities found for check_mk by check_mk_project
FKIE_CVE-2014-0243
Vulnerability from fkie_nvd - Published: 2018-07-19 17:29 - Updated: 2024-11-21 02:01
Severity ?
Summary
Check_MK through 1.2.5i2p1 allows local users to read arbitrary files via a symlink attack to a file in /var/lib/check_mk_agent/job.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| check_mk_project | check_mk | * | |
| check_mk_project | check_mk | 1.2.5 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:check_mk_project:check_mk:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C5C1D820-1BCC-46E1-91D1-ADA270E53979",
"versionEndIncluding": "1.2.5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:check_mk_project:check_mk:1.2.5:i2p1:*:*:*:*:*:*",
"matchCriteriaId": "FF9AAC1D-1847-4C4B-BE1A-98BC5CEDE928",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Check_MK through 1.2.5i2p1 allows local users to read arbitrary files via a symlink attack to a file in /var/lib/check_mk_agent/job."
},
{
"lang": "es",
"value": "Check_MK hasta la versi\u00f3n 1.2.5i2p1 permite que usuarios locales lean archivos arbitrarios mediante un ataque de enlace simb\u00f3lico contra un archivo en /var/lib/check_mk_agent/job."
}
],
"id": "CVE-2014-0243",
"lastModified": "2024-11-21T02:01:44.443",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2018-07-19T17:29:00.233",
"references": [
{
"source": "secalert@redhat.com",
"url": "http://git.mathias-kettner.de/git/?p=check_mk.git%3Ba=commit%3Bh=0426323df1641596c4f01ef5a716a3b65276f01c"
},
{
"source": "secalert@redhat.com",
"url": "http://git.mathias-kettner.de/git/?p=check_mk.git%3Ba=commit%3Bh=a2ef8d00c53ec9cbd05c4ae2f09b50761130e7ce"
},
{
"source": "secalert@redhat.com",
"tags": [
"Exploit",
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134160.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Exploit",
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134166.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/126857/Check_MK-Arbitrary-File-Disclosure.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://seclists.org/fulldisclosure/2014/May/145"
},
{
"source": "secalert@redhat.com",
"tags": [
"Exploit",
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2014/05/28/1"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/67674"
},
{
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1101669"
},
{
"source": "secalert@redhat.com",
"tags": [
"Permissions Required",
"Third Party Advisory"
],
"url": "https://secuniaresearch.flexerasoftware.com/advisories/58536"
},
{
"source": "secalert@redhat.com",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://www.securityfocus.com/archive/1/532224/100/0/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://git.mathias-kettner.de/git/?p=check_mk.git%3Ba=commit%3Bh=0426323df1641596c4f01ef5a716a3b65276f01c"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://git.mathias-kettner.de/git/?p=check_mk.git%3Ba=commit%3Bh=a2ef8d00c53ec9cbd05c4ae2f09b50761130e7ce"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134160.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134166.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/126857/Check_MK-Arbitrary-File-Disclosure.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://seclists.org/fulldisclosure/2014/May/145"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2014/05/28/1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/67674"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1101669"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required",
"Third Party Advisory"
],
"url": "https://secuniaresearch.flexerasoftware.com/advisories/58536"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://www.securityfocus.com/archive/1/532224/100/0/threaded"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-59"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2017-11507
Vulnerability from fkie_nvd - Published: 2017-12-11 16:29 - Updated: 2025-04-20 01:37
Severity ?
Summary
A cross site scripting (XSS) vulnerability exists in Check_MK versions 1.2.8x prior to 1.2.8p25 and 1.4.0x prior to 1.4.0p9, allowing an unauthenticated attacker to inject arbitrary HTML or JavaScript via the output_format parameter, and the username parameter of failed HTTP basic authentication attempts, which is returned unencoded in an internal server error page.
References
| URL | Tags | ||
|---|---|---|---|
| vulnreport@tenable.com | http://mathias-kettner.com/check_mk_werks.php?werk_id=7661 | Vendor Advisory | |
| vulnreport@tenable.com | https://www.tenable.com/security/research/tra-2017-20 | Exploit, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://mathias-kettner.com/check_mk_werks.php?werk_id=7661 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.tenable.com/security/research/tra-2017-20 | Exploit, Third Party Advisory |
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:check_mk_project:check_mk:1.2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "8092DB19-E0BA-4B15-A0F7-1A3C5231509E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:check_mk_project:check_mk:1.2.8:b1:*:*:*:*:*:*",
"matchCriteriaId": "EFDD2029-57C2-44A7-8A74-996E9B75C9E2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:check_mk_project:check_mk:1.2.8:b10:*:*:*:*:*:*",
"matchCriteriaId": "E371EF4B-C98B-4C51-9834-CF438FFCEE29",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:check_mk_project:check_mk:1.2.8:b11:*:*:*:*:*:*",
"matchCriteriaId": "DEF6FFAA-2102-44B7-B960-F26A7FD5727A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:check_mk_project:check_mk:1.2.8:b2:*:*:*:*:*:*",
"matchCriteriaId": "19FFC978-8EC9-44ED-A878-7B7E783F46EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:check_mk_project:check_mk:1.2.8:b3:*:*:*:*:*:*",
"matchCriteriaId": "2B3CCAEE-A1F6-4BD2-B2B6-13A47856AB5F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:check_mk_project:check_mk:1.2.8:b4:*:*:*:*:*:*",
"matchCriteriaId": "8D5E7D5B-E8E6-4999-98FB-C2C5F2070A42",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:check_mk_project:check_mk:1.2.8:b5:*:*:*:*:*:*",
"matchCriteriaId": "19CD3577-F4F6-4BB4-ACA0-944E29D4CF91",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:check_mk_project:check_mk:1.2.8:b6:*:*:*:*:*:*",
"matchCriteriaId": "3A74A6D5-FF40-406F-B333-B579E0025452",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:check_mk_project:check_mk:1.2.8:b7:*:*:*:*:*:*",
"matchCriteriaId": "326517F9-5F02-4904-9780-BE8A8E8C0F6A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:check_mk_project:check_mk:1.2.8:b8:*:*:*:*:*:*",
"matchCriteriaId": "D59191F1-BC21-4561-B096-675541F4C0EE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:check_mk_project:check_mk:1.2.8:b9:*:*:*:*:*:*",
"matchCriteriaId": "FD0155A1-18A1-4207-B6C6-D05C452469F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:check_mk_project:check_mk:1.2.8:p1:*:*:*:*:*:*",
"matchCriteriaId": "21117E27-5C65-4F56-9C09-A4F970BB53B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:check_mk_project:check_mk:1.2.8:p10:*:*:*:*:*:*",
"matchCriteriaId": "5E2470DF-9ACF-4617-9DDE-21F389A72BFB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:check_mk_project:check_mk:1.2.8:p11:*:*:*:*:*:*",
"matchCriteriaId": "9AB49A12-5CA7-4ED8-A8C3-DB7F36D9ABD3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:check_mk_project:check_mk:1.2.8:p12:*:*:*:*:*:*",
"matchCriteriaId": "1745717B-C28E-4F46-ABCB-E0FF405C838D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:check_mk_project:check_mk:1.2.8:p13:*:*:*:*:*:*",
"matchCriteriaId": "A8DFD63E-F095-460A-AEAB-96469916CBA3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:check_mk_project:check_mk:1.2.8:p14:*:*:*:*:*:*",
"matchCriteriaId": "08EDA08F-1E24-476F-84AC-7C882F3B269A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:check_mk_project:check_mk:1.2.8:p15:*:*:*:*:*:*",
"matchCriteriaId": "8EEA59F3-F5A1-4568-AA66-120089E8949D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:check_mk_project:check_mk:1.2.8:p16:*:*:*:*:*:*",
"matchCriteriaId": "2B22DEB7-EC72-4F0C-9122-0A79A970E887",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:check_mk_project:check_mk:1.2.8:p17:*:*:*:*:*:*",
"matchCriteriaId": "4AB16980-3EEB-43A1-B338-D36E15CC709C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:check_mk_project:check_mk:1.2.8:p18:*:*:*:*:*:*",
"matchCriteriaId": "3E1C3599-E105-4908-B3BA-62271631265E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:check_mk_project:check_mk:1.2.8:p19:*:*:*:*:*:*",
"matchCriteriaId": "98308132-2372-4CB0-A480-802C2ECC68F4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:check_mk_project:check_mk:1.2.8:p2:*:*:*:*:*:*",
"matchCriteriaId": "8AEE1C41-6C2C-4AF4-B037-120F5A3671D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:check_mk_project:check_mk:1.2.8:p20:*:*:*:*:*:*",
"matchCriteriaId": "4A8116B1-2BC6-49B6-AC40-1DECBAB96EF2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:check_mk_project:check_mk:1.2.8:p21:*:*:*:*:*:*",
"matchCriteriaId": "E840BCD2-FFA3-4DE8-8AEF-267BC0E51F4D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:check_mk_project:check_mk:1.2.8:p22:*:*:*:*:*:*",
"matchCriteriaId": "D58D7ACE-21F5-48DF-8504-27724C6037D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:check_mk_project:check_mk:1.2.8:p23:*:*:*:*:*:*",
"matchCriteriaId": "67BBD37F-7591-4230-A583-A133D6449F8C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:check_mk_project:check_mk:1.2.8:p24:*:*:*:*:*:*",
"matchCriteriaId": "AD3D1E69-A1C6-4F3D-9883-ABE3666A4622",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:check_mk_project:check_mk:1.2.8:p25:*:*:*:*:*:*",
"matchCriteriaId": "8C61B022-5C8C-467A-B495-4DFB6AED6C3D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:check_mk_project:check_mk:1.2.8:p3:*:*:*:*:*:*",
"matchCriteriaId": "4FA69A23-76BA-4CC6-B74C-4D0E6B8727C8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:check_mk_project:check_mk:1.2.8:p4:*:*:*:*:*:*",
"matchCriteriaId": "C91EEE8B-626F-4BAB-B2BC-FBABECA7D269",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:check_mk_project:check_mk:1.2.8:p5:*:*:*:*:*:*",
"matchCriteriaId": "708FA58F-CFB6-4F56-929D-2AFA7D46D937",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:check_mk_project:check_mk:1.2.8:p6:*:*:*:*:*:*",
"matchCriteriaId": "AD3D69AC-37D8-44EB-A28D-71512F635308",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:check_mk_project:check_mk:1.2.8:p7:*:*:*:*:*:*",
"matchCriteriaId": "DE11B082-31C3-469E-81E6-546E85B23FDD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:check_mk_project:check_mk:1.2.8:p8:*:*:*:*:*:*",
"matchCriteriaId": "10C0D1A0-5619-42AE-98F5-0B50AAABC689",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:check_mk_project:check_mk:1.2.8:p9:*:*:*:*:*:*",
"matchCriteriaId": "754CA39C-8818-4AB1-9A34-1D5F615268FA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:check_mk_project:check_mk:1.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C3877AA7-4BAF-4C0E-B157-ED2473ACC72A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:check_mk_project:check_mk:1.4.0:b1:*:*:*:*:*:*",
"matchCriteriaId": "72598B63-90F9-4E9E-9526-33E7E4349F00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:check_mk_project:check_mk:1.4.0:b2:*:*:*:*:*:*",
"matchCriteriaId": "46374508-99AB-45F1-99A6-705CE25CAF01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:check_mk_project:check_mk:1.4.0:b3:*:*:*:*:*:*",
"matchCriteriaId": "B282B7A3-ECDA-4110-A434-6C7F33564DB1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:check_mk_project:check_mk:1.4.0:b4:*:*:*:*:*:*",
"matchCriteriaId": "DFA2F31D-CE39-4B20-BAC8-9B3D4D5BFAF2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:check_mk_project:check_mk:1.4.0:b5:*:*:*:*:*:*",
"matchCriteriaId": "B4B11BD1-1E1A-49C3-AA76-47E255889FEE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:check_mk_project:check_mk:1.4.0:b6:*:*:*:*:*:*",
"matchCriteriaId": "0DBD03C9-57CD-47B6-A054-BABF063F8819",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:check_mk_project:check_mk:1.4.0:b7:*:*:*:*:*:*",
"matchCriteriaId": "B49E4EE5-980B-4774-B449-F299D28449D6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:check_mk_project:check_mk:1.4.0:b8:*:*:*:*:*:*",
"matchCriteriaId": "CCD224CB-B9DF-42BB-B488-B7484EABCE18",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:check_mk_project:check_mk:1.4.0:b9:*:*:*:*:*:*",
"matchCriteriaId": "99935D23-5F86-40D0-AEB7-48966245940E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:check_mk_project:check_mk:1.4.0:p1:*:*:*:*:*:*",
"matchCriteriaId": "BF31D012-B7D8-4218-8DF0-9497287FC3BE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:check_mk_project:check_mk:1.4.0:p2:*:*:*:*:*:*",
"matchCriteriaId": "0022EF65-24D5-403E-8824-75BC928FC88F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:check_mk_project:check_mk:1.4.0:p3:*:*:*:*:*:*",
"matchCriteriaId": "8F375250-FC89-4FEE-BE18-5724136EF89E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:check_mk_project:check_mk:1.4.0:p4:*:*:*:*:*:*",
"matchCriteriaId": "91C50D90-64F3-45EF-B5D8-DA689D4FC0C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:check_mk_project:check_mk:1.4.0:p5:*:*:*:*:*:*",
"matchCriteriaId": "39911FDF-8755-425E-937C-9AA6E4A3BA7E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:check_mk_project:check_mk:1.4.0:p6:*:*:*:*:*:*",
"matchCriteriaId": "F490BFD8-0616-4685-9D8A-923265511FFD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:check_mk_project:check_mk:1.4.0:p7:*:*:*:*:*:*",
"matchCriteriaId": "D007BC56-DEF4-4BB2-89D9-6BF24F167BCA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:check_mk_project:check_mk:1.4.0:p8:*:*:*:*:*:*",
"matchCriteriaId": "F567D291-1B96-4475-A5B6-191C59162E64",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:check_mk_project:check_mk:1.4.0:p9:*:*:*:*:*:*",
"matchCriteriaId": "B9820F0D-682C-45DC-AC9C-78F5C75EFE8D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A cross site scripting (XSS) vulnerability exists in Check_MK versions 1.2.8x prior to 1.2.8p25 and 1.4.0x prior to 1.4.0p9, allowing an unauthenticated attacker to inject arbitrary HTML or JavaScript via the output_format parameter, and the username parameter of failed HTTP basic authentication attempts, which is returned unencoded in an internal server error page."
},
{
"lang": "es",
"value": "Existe una vulnerabilidad de Cross-Site Scripting (XSS) en Check_MK en versiones 1.2.8x anteriores a la 1.2.8p25 y versiones 1.4.0x anteriores a la 1.4.0p9. Esto permite que un atacante no autenticado inyecte c\u00f3digo HTML o JavaScript arbitrario mediante el par\u00e1metro output_format y el par\u00e1metro username de intentos de autenticaci\u00f3n HTTP basica fallidos, que se devuelve no codificado en una p\u00e1gina de error interno del servidor."
}
],
"id": "CVE-2017-11507",
"lastModified": "2025-04-20T01:37:25.860",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2017-12-11T16:29:00.203",
"references": [
{
"source": "vulnreport@tenable.com",
"tags": [
"Vendor Advisory"
],
"url": "http://mathias-kettner.com/check_mk_werks.php?werk_id=7661"
},
{
"source": "vulnreport@tenable.com",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://www.tenable.com/security/research/tra-2017-20"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://mathias-kettner.com/check_mk_werks.php?werk_id=7661"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://www.tenable.com/security/research/tra-2017-20"
}
],
"sourceIdentifier": "vulnreport@tenable.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-79"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2017-9781
Vulnerability from fkie_nvd - Published: 2017-06-21 18:29 - Updated: 2025-04-20 01:37
Severity ?
Summary
A cross site scripting (XSS) vulnerability exists in Check_MK versions 1.4.0x prior to 1.4.0p6, allowing an unauthenticated remote attacker to inject arbitrary HTML or JavaScript via the _username parameter when attempting authentication to webapi.py, which is returned unencoded with content type text/html.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| check_mk_project | check_mk | 1.4.0 | |
| check_mk_project | check_mk | 1.4.0 | |
| check_mk_project | check_mk | 1.4.0 | |
| check_mk_project | check_mk | 1.4.0 | |
| check_mk_project | check_mk | 1.4.0 | |
| check_mk_project | check_mk | 1.4.0 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:check_mk_project:check_mk:1.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C3877AA7-4BAF-4C0E-B157-ED2473ACC72A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:check_mk_project:check_mk:1.4.0:p1:*:*:*:*:*:*",
"matchCriteriaId": "BF31D012-B7D8-4218-8DF0-9497287FC3BE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:check_mk_project:check_mk:1.4.0:p2:*:*:*:*:*:*",
"matchCriteriaId": "0022EF65-24D5-403E-8824-75BC928FC88F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:check_mk_project:check_mk:1.4.0:p3:*:*:*:*:*:*",
"matchCriteriaId": "8F375250-FC89-4FEE-BE18-5724136EF89E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:check_mk_project:check_mk:1.4.0:p4:*:*:*:*:*:*",
"matchCriteriaId": "91C50D90-64F3-45EF-B5D8-DA689D4FC0C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:check_mk_project:check_mk:1.4.0:p5:*:*:*:*:*:*",
"matchCriteriaId": "39911FDF-8755-425E-937C-9AA6E4A3BA7E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A cross site scripting (XSS) vulnerability exists in Check_MK versions 1.4.0x prior to 1.4.0p6, allowing an unauthenticated remote attacker to inject arbitrary HTML or JavaScript via the _username parameter when attempting authentication to webapi.py, which is returned unencoded with content type text/html."
},
{
"lang": "es",
"value": "Existe una vulnerabilidad de Cross-Site Scripting (XSS) en Check_MK, en versiones 1.4.0x anteriores a la 1.4.0p6, que permite que un atacante remoto no autenticado inyecte HTML o JavaScript arbitrarios mediante el par\u00e1metro _username al intentar autenticarse en webapi.py, que se devuelve sin cifrar con el tipo de contenido texto/html."
}
],
"id": "CVE-2017-9781",
"lastModified": "2025-04-20T01:37:25.860",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2017-06-21T18:29:00.387",
"references": [
{
"source": "cve@mitre.org",
"url": "http://git.mathias-kettner.de/git/?p=check_mk.git%3Ba=blob%3Bf=.werks/4757%3Bhb=c248f0b6ff7b15ced9f07a3df8a80fad656ea5b1"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://www.tenable.com/security/research/tra-2017-21"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://git.mathias-kettner.de/git/?p=check_mk.git%3Ba=blob%3Bf=.werks/4757%3Bhb=c248f0b6ff7b15ced9f07a3df8a80fad656ea5b1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://www.tenable.com/security/research/tra-2017-21"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-79"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2014-2332
Vulnerability from fkie_nvd - Published: 2015-08-31 18:59 - Updated: 2025-04-12 10:46
Severity ?
Summary
Check_MK before 1.2.2p3 and 1.2.3x before 1.2.3i5 allows remote authenticated users to delete arbitrary files via a request to an unspecified link, related to "Insecure Direct Object References." NOTE: this can be exploited by remote attackers by leveraging CVE-2014-2330.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| check_mk_project | check_mk | * | |
| check_mk_project | check_mk | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:check_mk_project:check_mk:*:*:*:*:*:*:*:*",
"matchCriteriaId": "95E0BBA3-30F1-4F41-98D2-778353C19D80",
"versionEndIncluding": "1.2.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:check_mk_project:check_mk:*:*:*:*:*:*:*:*",
"matchCriteriaId": "195404F2-1863-46EC-AA4E-987AFFD710AA",
"versionEndIncluding": "1.2.3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Check_MK before 1.2.2p3 and 1.2.3x before 1.2.3i5 allows remote authenticated users to delete arbitrary files via a request to an unspecified link, related to \"Insecure Direct Object References.\" NOTE: this can be exploited by remote attackers by leveraging CVE-2014-2330."
},
{
"lang": "es",
"value": "Vulnerabilidad en Check_MK en versiones anteriores a 1.2.2p3 y 1.2.3x en versiones anteriores a 1.2.3i5, permite a usuarios remotos autenticados borrar archivos arbitrarios a trav\u00e9s de peticiones a un link no especificado, relacionado con \u0027Insecure Direct Object References.\u0027 NOTA: esto puede ser explotado por atacantes remotos mediante el aprovechamiento CVE-2014-2330."
}
],
"id": "CVE-2014-2332",
"lastModified": "2025-04-12T10:46:40.837",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.5,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.0,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2015-08-31T18:59:04.557",
"references": [
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/archive/1/531594"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/archive/1/531656"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/531594"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/531656"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-20"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2014-2331
Vulnerability from fkie_nvd - Published: 2015-08-31 18:59 - Updated: 2025-04-12 10:46
Severity ?
Summary
Check_MK 1.2.2p2, 1.2.2p3, and 1.2.3i5 allows remote authenticated users to execute arbitrary Python code via a crafted rules.mk file in a snapshot. NOTE: this can be exploited by remote attackers by leveraging CVE-2014-2330.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| check_mk_project | check_mk | * | |
| check_mk_project | check_mk | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:check_mk_project:check_mk:*:*:*:*:*:*:*:*",
"matchCriteriaId": "95E0BBA3-30F1-4F41-98D2-778353C19D80",
"versionEndIncluding": "1.2.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:check_mk_project:check_mk:*:*:*:*:*:*:*:*",
"matchCriteriaId": "195404F2-1863-46EC-AA4E-987AFFD710AA",
"versionEndIncluding": "1.2.3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Check_MK 1.2.2p2, 1.2.2p3, and 1.2.3i5 allows remote authenticated users to execute arbitrary Python code via a crafted rules.mk file in a snapshot. NOTE: this can be exploited by remote attackers by leveraging CVE-2014-2330."
},
{
"lang": "es",
"value": "Vulnerabilidad en Check_MK 1.2.2p2, 1.2.2p3 y 1.2.3i5, permite a usuarios remotos autenticados ejecutar c\u00f3digo Python arbitrariamente a trav\u00e9s de un archivo rules.mk manipulado en una instant\u00e1nea. NOTA: esto puede ser explotado por atacantes remotos mediante el aprovechamiento CVE-2014-2330."
}
],
"id": "CVE-2014-2331",
"lastModified": "2025-04-12T10:46:40.837",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "COMPLETE",
"baseScore": 8.5,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:M/Au:S/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 6.8,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2015-08-31T18:59:03.183",
"references": [
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/archive/1/531594"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/archive/1/531656"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/531594"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/531656"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-94"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2014-2330
Vulnerability from fkie_nvd - Published: 2015-08-31 18:59 - Updated: 2025-04-12 10:46
Severity ?
Summary
Multiple cross-site request forgery (CSRF) vulnerabilities in the Multisite GUI in Check_MK before 1.2.5i2 allow remote attackers to hijack the authentication of users for requests that (1) upload arbitrary snapshots, (2) delete arbitrary files, or possibly have other unspecified impact via unknown vectors.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| check_mk_project | check_mk | * | |
| check_mk_project | check_mk | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:check_mk_project:check_mk:*:*:*:*:*:*:*:*",
"matchCriteriaId": "95E0BBA3-30F1-4F41-98D2-778353C19D80",
"versionEndIncluding": "1.2.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:check_mk_project:check_mk:*:*:*:*:*:*:*:*",
"matchCriteriaId": "195404F2-1863-46EC-AA4E-987AFFD710AA",
"versionEndIncluding": "1.2.3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple cross-site request forgery (CSRF) vulnerabilities in the Multisite GUI in Check_MK before 1.2.5i2 allow remote attackers to hijack the authentication of users for requests that (1) upload arbitrary snapshots, (2) delete arbitrary files, or possibly have other unspecified impact via unknown vectors."
},
{
"lang": "es",
"value": "M\u00faltiples vulnerabilidades de CSRF en el Multisite GUI en Check_MK en versiones anteriores a 1.2.5i2, permite a atacantes remotos secuestrar la autenticaci\u00f3n de usuarios para peticiones que (1) cargan instant\u00e1neas arbitrariamente, (2) borran archivos arbitrariamente, o posiblemente tener otros impacto no especificado a trav\u00e9s de vectores desconocidos."
}
],
"id": "CVE-2014-2330",
"lastModified": "2025-04-12T10:46:40.837",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
]
},
"published": "2015-08-31T18:59:01.713",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://mathias-kettner.de/check_mk_werks.php?werk_id=0766"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/archive/1/531594"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/66389"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://mathias-kettner.de/check_mk_werks.php?werk_id=0766"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/531594"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/66389"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-352"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2014-2329
Vulnerability from fkie_nvd - Published: 2015-08-31 18:59 - Updated: 2025-04-12 10:46
Severity ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in Check_MK before 1.2.2p3 and 1.2.3x before 1.2.3i5 allow remote authenticated users to inject arbitrary web script or HTML via the (1) agent string for a check_mk agent, a (2) crafted request to a monitored host, which is not properly handled by the logwatch module, or other unspecified vectors.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| check_mk_project | check_mk | * | |
| check_mk_project | check_mk | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:check_mk_project:check_mk:*:*:*:*:*:*:*:*",
"matchCriteriaId": "95E0BBA3-30F1-4F41-98D2-778353C19D80",
"versionEndIncluding": "1.2.2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:check_mk_project:check_mk:*:*:*:*:*:*:*:*",
"matchCriteriaId": "195404F2-1863-46EC-AA4E-987AFFD710AA",
"versionEndIncluding": "1.2.3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple cross-site scripting (XSS) vulnerabilities in Check_MK before 1.2.2p3 and 1.2.3x before 1.2.3i5 allow remote authenticated users to inject arbitrary web script or HTML via the (1) agent string for a check_mk agent, a (2) crafted request to a monitored host, which is not properly handled by the logwatch module, or other unspecified vectors."
},
{
"lang": "es",
"value": "M\u00faltiples vulnerabilidades de XSS en Check_MK en versiones anteriores a 1.2.2p3 y 1.2.3x en versiones anteriores a 1.2.3i5, permite a usuarios remotos autenticados inyectar secuencias de comandos web o HTML arbitrarios a trav\u00e9s de (1) la cadena agente para un agente check_mk, (2) una solicitud manipulada para un host monitorizado, lo cual no es correctamente manejado por el m\u00f3dulo logwatch, u otros vectores no especificados."
}
],
"id": "CVE-2014-2329",
"lastModified": "2025-04-12T10:46:40.837",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 6.8,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
]
},
"published": "2015-08-31T18:59:00.137",
"references": [
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/archive/1/531594"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/archive/1/531656"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/531594"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/531656"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-79"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2014-5340
Vulnerability from fkie_nvd - Published: 2014-09-02 14:55 - Updated: 2025-04-12 10:46
Severity ?
Summary
The wato component in Check_MK before 1.2.4p4 and 1.2.5 before 1.2.5i4 uses the pickle Python module unsafely, which allows remote attackers to execute arbitrary code via a crafted serialized object, related to an automation URL.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| check_mk_project | check_mk | * | |
| check_mk_project | check_mk | 1.2.4 | |
| check_mk_project | check_mk | 1.2.4 | |
| check_mk_project | check_mk | 1.2.4 | |
| check_mk_project | check_mk | 1.2.5 | |
| check_mk_project | check_mk | 1.2.5 | |
| check_mk_project | check_mk | 1.2.5 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:check_mk_project:check_mk:*:p3:*:*:*:*:*:*",
"matchCriteriaId": "831B5297-24A3-48DD-8024-A36FA8D68E26",
"versionEndIncluding": "1.2.4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:check_mk_project:check_mk:1.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "95436742-D5D2-4C8C-BCBE-9207659D97ED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:check_mk_project:check_mk:1.2.4:p1:*:*:*:*:*:*",
"matchCriteriaId": "1B7019F5-4E38-4895-803F-842F6EEBD5A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:check_mk_project:check_mk:1.2.4:p2:*:*:*:*:*:*",
"matchCriteriaId": "44880FB1-1E99-426D-8D28-9B2E09395C91",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:check_mk_project:check_mk:1.2.5:i1:*:*:*:*:*:*",
"matchCriteriaId": "A465E402-D401-45F5-AC00-5214E71D7BB4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:check_mk_project:check_mk:1.2.5:i2:*:*:*:*:*:*",
"matchCriteriaId": "2F6664A0-4615-4EA3-A5DF-B9846BEFF4D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:check_mk_project:check_mk:1.2.5:i3:*:*:*:*:*:*",
"matchCriteriaId": "CD84DD11-025A-4404-A6F9-94D4431F315C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The wato component in Check_MK before 1.2.4p4 and 1.2.5 before 1.2.5i4 uses the pickle Python module unsafely, which allows remote attackers to execute arbitrary code via a crafted serialized object, related to an automation URL."
},
{
"lang": "es",
"value": "El componente wato en Check_MK anterior a 1.2.4p4 y 1.2.5 anterior a 1.2.5i4 utiliza el m\u00f3dulo pickle Python de forma insegura, lo que permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de un objeto serializado manipulado, relacionado con una URL de automatizaci\u00f3n."
}
],
"id": "CVE-2014-5340",
"lastModified": "2025-04-12T10:46:40.837",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2014-09-02T14:55:03.683",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://mathias-kettner.de/check_mk_werks.php?werk_id=984"
},
{
"source": "cve@mitre.org",
"url": "http://packetstormsecurity.com/files/127941/Deutsche-Telekom-CERT-Advisory-DTC-A-20140820-001.html"
},
{
"source": "cve@mitre.org",
"url": "http://rhn.redhat.com/errata/RHSA-2015-1495.html"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/archive/1/533180/100/0/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://mathias-kettner.de/check_mk_werks.php?werk_id=984"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://packetstormsecurity.com/files/127941/Deutsche-Telekom-CERT-Advisory-DTC-A-20140820-001.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://rhn.redhat.com/errata/RHSA-2015-1495.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/533180/100/0/threaded"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-94"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2014-5339
Vulnerability from fkie_nvd - Published: 2014-09-02 14:55 - Updated: 2025-04-12 10:46
Severity ?
Summary
Check_MK before 1.2.4p4 and 1.2.5 before 1.2.5i4 allows remote authenticated users to write check_mk config files (.mk files) to arbitrary locations via vectors related to row selections.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| check_mk_project | check_mk | * | |
| check_mk_project | check_mk | 1.2.4 | |
| check_mk_project | check_mk | 1.2.4 | |
| check_mk_project | check_mk | 1.2.4 | |
| check_mk_project | check_mk | 1.2.5 | |
| check_mk_project | check_mk | 1.2.5 | |
| check_mk_project | check_mk | 1.2.5 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:check_mk_project:check_mk:*:p3:*:*:*:*:*:*",
"matchCriteriaId": "831B5297-24A3-48DD-8024-A36FA8D68E26",
"versionEndIncluding": "1.2.4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:check_mk_project:check_mk:1.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "95436742-D5D2-4C8C-BCBE-9207659D97ED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:check_mk_project:check_mk:1.2.4:p1:*:*:*:*:*:*",
"matchCriteriaId": "1B7019F5-4E38-4895-803F-842F6EEBD5A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:check_mk_project:check_mk:1.2.4:p2:*:*:*:*:*:*",
"matchCriteriaId": "44880FB1-1E99-426D-8D28-9B2E09395C91",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:check_mk_project:check_mk:1.2.5:i1:*:*:*:*:*:*",
"matchCriteriaId": "A465E402-D401-45F5-AC00-5214E71D7BB4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:check_mk_project:check_mk:1.2.5:i2:*:*:*:*:*:*",
"matchCriteriaId": "2F6664A0-4615-4EA3-A5DF-B9846BEFF4D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:check_mk_project:check_mk:1.2.5:i3:*:*:*:*:*:*",
"matchCriteriaId": "CD84DD11-025A-4404-A6F9-94D4431F315C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Check_MK before 1.2.4p4 and 1.2.5 before 1.2.5i4 allows remote authenticated users to write check_mk config files (.mk files) to arbitrary locations via vectors related to row selections."
},
{
"lang": "es",
"value": "Check_MK anterior a 1.2.4p4 y 1.2.5 anterior a 1.2.5i4 permite a usuarios remotos autenticados escribir ficheros de configuraci\u00f3n check_mk (ficheros .mk) en localizaciones arbitrarias a trav\u00e9s de vectores relacionados con las selecciones de filas."
}
],
"id": "CVE-2014-5339",
"lastModified": "2025-04-12T10:46:40.837",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.9,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 6.8,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2014-09-02T14:55:03.637",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://mathias-kettner.de/check_mk_werks.php?werk_id=983"
},
{
"source": "cve@mitre.org",
"url": "http://packetstormsecurity.com/files/127941/Deutsche-Telekom-CERT-Advisory-DTC-A-20140820-001.html"
},
{
"source": "cve@mitre.org",
"url": "http://rhn.redhat.com/errata/RHSA-2015-1495.html"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/archive/1/533180/100/0/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://mathias-kettner.de/check_mk_werks.php?werk_id=983"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://packetstormsecurity.com/files/127941/Deutsche-Telekom-CERT-Advisory-DTC-A-20140820-001.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://rhn.redhat.com/errata/RHSA-2015-1495.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/533180/100/0/threaded"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2014-5338
Vulnerability from fkie_nvd - Published: 2014-08-22 14:55 - Updated: 2025-04-12 10:46
Severity ?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in the multisite component in Check_MK before 1.2.4p4 and 1.2.5 before 1.2.5i4 allow remote authenticated users to inject arbitrary web script or HTML via unspecified vectors to the (1) render_status_icons function in htmllib.py or (2) ajax_action function in actions.py.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| check_mk_project | check_mk | 1.2.4 | |
| check_mk_project | check_mk | 1.2.4 | |
| check_mk_project | check_mk | 1.2.4 | |
| check_mk_project | check_mk | 1.2.4 | |
| check_mk_project | check_mk | 1.2.5 | |
| check_mk_project | check_mk | 1.2.5 | |
| check_mk_project | check_mk | 1.2.5 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:check_mk_project:check_mk:1.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "95436742-D5D2-4C8C-BCBE-9207659D97ED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:check_mk_project:check_mk:1.2.4:p1:*:*:*:*:*:*",
"matchCriteriaId": "1B7019F5-4E38-4895-803F-842F6EEBD5A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:check_mk_project:check_mk:1.2.4:p2:*:*:*:*:*:*",
"matchCriteriaId": "44880FB1-1E99-426D-8D28-9B2E09395C91",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:check_mk_project:check_mk:1.2.4:p3:*:*:*:*:*:*",
"matchCriteriaId": "02A2758A-B539-44BF-9D21-792D66467AB1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:check_mk_project:check_mk:1.2.5:i1:*:*:*:*:*:*",
"matchCriteriaId": "A465E402-D401-45F5-AC00-5214E71D7BB4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:check_mk_project:check_mk:1.2.5:i2:*:*:*:*:*:*",
"matchCriteriaId": "2F6664A0-4615-4EA3-A5DF-B9846BEFF4D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:check_mk_project:check_mk:1.2.5:i3:*:*:*:*:*:*",
"matchCriteriaId": "CD84DD11-025A-4404-A6F9-94D4431F315C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple cross-site scripting (XSS) vulnerabilities in the multisite component in Check_MK before 1.2.4p4 and 1.2.5 before 1.2.5i4 allow remote authenticated users to inject arbitrary web script or HTML via unspecified vectors to the (1) render_status_icons function in htmllib.py or (2) ajax_action function in actions.py."
},
{
"lang": "es",
"value": "M\u00faltiples vulnerabilidades de XSS en el componente multisite en Check_MK en versiones anteriores a 1.2.4p4 y 1.2.5 en versiones anteriores a 1.2.5i4 permiten a usuarios remotos autenticados inyectar secuencias de comandos web o HMTL arbitrarios a trav\u00e9s de vectores no especificados para la funci\u00f3n (1) render_status_icons en htmllib.py o (2) ajax_action en actions.py."
}
],
"id": "CVE-2014-5338",
"lastModified": "2025-04-12T10:46:40.837",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "NONE",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 6.8,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
]
},
"published": "2014-08-22T14:55:09.297",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://mathias-kettner.de/check_mk_werks.php?werk_id=0982\u0026HTML=yes"
},
{
"source": "cve@mitre.org",
"url": "http://packetstormsecurity.com/files/127941/Deutsche-Telekom-CERT-Advisory-DTC-A-20140820-001.html"
},
{
"source": "cve@mitre.org",
"url": "http://rhn.redhat.com/errata/RHSA-2015-1495.html"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/archive/1/533180/100/0/threaded"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/69312"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95383"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://mathias-kettner.de/check_mk_werks.php?werk_id=0982\u0026HTML=yes"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://packetstormsecurity.com/files/127941/Deutsche-Telekom-CERT-Advisory-DTC-A-20140820-001.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://rhn.redhat.com/errata/RHSA-2015-1495.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/533180/100/0/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/69312"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95383"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-79"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CVE-2014-0243 (GCVE-0-2014-0243)
Vulnerability from cvelistv5 – Published: 2018-07-19 17:00 – Updated: 2024-08-06 09:05
VLAI?
Summary
Check_MK through 1.2.5i2p1 allows local users to read arbitrary files via a symlink attack to a file in /var/lib/check_mk_agent/job.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T09:05:39.316Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "58536",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "https://secuniaresearch.flexerasoftware.com/advisories/58536"
},
{
"name": "[oss-security] 20140528 LSE Leading Security Experts GmbH - LSE-2014-05-21 - Check_MK - Arbitrary File Disclosure Vulnerability",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2014/05/28/1"
},
{
"name": "67674",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/67674"
},
{
"name": "FEDORA-2014-6810",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134166.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://git.mathias-kettner.de/git/?p=check_mk.git%3Ba=commit%3Bh=0426323df1641596c4f01ef5a716a3b65276f01c"
},
{
"name": "FEDORA-2014-6818",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134160.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1101669"
},
{
"name": "20140528 LSE Leading Security Experts GmbH - LSE-2014-05-21 - Check_MK - Arbitrary File Disclosure Vulnerability",
"tags": [
"mailing-list",
"x_refsource_FULLDISC",
"x_transferred"
],
"url": "http://seclists.org/fulldisclosure/2014/May/145"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://packetstormsecurity.com/files/126857/Check_MK-Arbitrary-File-Disclosure.html"
},
{
"name": "20140528 LSE Leading Security Experts GmbH - LSE-2014-05-21 - Check_MK - Arbitrary File Disclosure Vulnerability",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "https://www.securityfocus.com/archive/1/532224/100/0/threaded"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://git.mathias-kettner.de/git/?p=check_mk.git%3Ba=commit%3Bh=a2ef8d00c53ec9cbd05c4ae2f09b50761130e7ce"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2014-05-27T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Check_MK through 1.2.5i2p1 allows local users to read arbitrary files via a symlink attack to a file in /var/lib/check_mk_agent/job."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-07-19T16:57:02",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"name": "58536",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "https://secuniaresearch.flexerasoftware.com/advisories/58536"
},
{
"name": "[oss-security] 20140528 LSE Leading Security Experts GmbH - LSE-2014-05-21 - Check_MK - Arbitrary File Disclosure Vulnerability",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2014/05/28/1"
},
{
"name": "67674",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/67674"
},
{
"name": "FEDORA-2014-6810",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134166.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://git.mathias-kettner.de/git/?p=check_mk.git%3Ba=commit%3Bh=0426323df1641596c4f01ef5a716a3b65276f01c"
},
{
"name": "FEDORA-2014-6818",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134160.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1101669"
},
{
"name": "20140528 LSE Leading Security Experts GmbH - LSE-2014-05-21 - Check_MK - Arbitrary File Disclosure Vulnerability",
"tags": [
"mailing-list",
"x_refsource_FULLDISC"
],
"url": "http://seclists.org/fulldisclosure/2014/May/145"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://packetstormsecurity.com/files/126857/Check_MK-Arbitrary-File-Disclosure.html"
},
{
"name": "20140528 LSE Leading Security Experts GmbH - LSE-2014-05-21 - Check_MK - Arbitrary File Disclosure Vulnerability",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "https://www.securityfocus.com/archive/1/532224/100/0/threaded"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://git.mathias-kettner.de/git/?p=check_mk.git%3Ba=commit%3Bh=a2ef8d00c53ec9cbd05c4ae2f09b50761130e7ce"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2014-0243",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Check_MK through 1.2.5i2p1 allows local users to read arbitrary files via a symlink attack to a file in /var/lib/check_mk_agent/job."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "58536",
"refsource": "SECUNIA",
"url": "https://secuniaresearch.flexerasoftware.com/advisories/58536"
},
{
"name": "[oss-security] 20140528 LSE Leading Security Experts GmbH - LSE-2014-05-21 - Check_MK - Arbitrary File Disclosure Vulnerability",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2014/05/28/1"
},
{
"name": "67674",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/67674"
},
{
"name": "FEDORA-2014-6810",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134166.html"
},
{
"name": "http://git.mathias-kettner.de/git/?p=check_mk.git;a=commit;h=0426323df1641596c4f01ef5a716a3b65276f01c",
"refsource": "CONFIRM",
"url": "http://git.mathias-kettner.de/git/?p=check_mk.git;a=commit;h=0426323df1641596c4f01ef5a716a3b65276f01c"
},
{
"name": "FEDORA-2014-6818",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134160.html"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1101669",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1101669"
},
{
"name": "20140528 LSE Leading Security Experts GmbH - LSE-2014-05-21 - Check_MK - Arbitrary File Disclosure Vulnerability",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2014/May/145"
},
{
"name": "http://packetstormsecurity.com/files/126857/Check_MK-Arbitrary-File-Disclosure.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/126857/Check_MK-Arbitrary-File-Disclosure.html"
},
{
"name": "20140528 LSE Leading Security Experts GmbH - LSE-2014-05-21 - Check_MK - Arbitrary File Disclosure Vulnerability",
"refsource": "BUGTRAQ",
"url": "https://www.securityfocus.com/archive/1/532224/100/0/threaded"
},
{
"name": "http://git.mathias-kettner.de/git/?p=check_mk.git;a=commit;h=a2ef8d00c53ec9cbd05c4ae2f09b50761130e7ce",
"refsource": "CONFIRM",
"url": "http://git.mathias-kettner.de/git/?p=check_mk.git;a=commit;h=a2ef8d00c53ec9cbd05c4ae2f09b50761130e7ce"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2014-0243",
"datePublished": "2018-07-19T17:00:00",
"dateReserved": "2013-12-03T00:00:00",
"dateUpdated": "2024-08-06T09:05:39.316Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2017-11507 (GCVE-0-2017-11507)
Vulnerability from cvelistv5 – Published: 2017-12-11 16:00 – Updated: 2024-09-16 22:20
VLAI?
Summary
A cross site scripting (XSS) vulnerability exists in Check_MK versions 1.2.8x prior to 1.2.8p25 and 1.4.0x prior to 1.4.0p9, allowing an unauthenticated attacker to inject arbitrary HTML or JavaScript via the output_format parameter, and the username parameter of failed HTTP basic authentication attempts, which is returned unencoded in an internal server error page.
Severity ?
No CVSS data available.
CWE
- Stored and Reflected Cross Site Scripting (XSS)
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T18:12:40.193Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.tenable.com/security/research/tra-2017-20"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://mathias-kettner.com/check_mk_werks.php?werk_id=7661"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Check_MK",
"vendor": "Tenable",
"versions": [
{
"status": "affected",
"version": "1.2.8x prior to 1. 2.8p25"
},
{
"status": "affected",
"version": "1.4.0x prior to 1.4.0p9"
}
]
}
],
"datePublic": "2017-07-06T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "A cross site scripting (XSS) vulnerability exists in Check_MK versions 1.2.8x prior to 1.2.8p25 and 1.4.0x prior to 1.4.0p9, allowing an unauthenticated attacker to inject arbitrary HTML or JavaScript via the output_format parameter, and the username parameter of failed HTTP basic authentication attempts, which is returned unencoded in an internal server error page."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Stored and Reflected Cross Site Scripting (XSS)",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-12-11T15:57:01",
"orgId": "5ac1ecc2-367a-4d16-a0b2-35d495ddd0be",
"shortName": "tenable"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.tenable.com/security/research/tra-2017-20"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://mathias-kettner.com/check_mk_werks.php?werk_id=7661"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vulnreport@tenable.com",
"DATE_PUBLIC": "2017-07-06T00:00:00",
"ID": "CVE-2017-11507",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Check_MK",
"version": {
"version_data": [
{
"version_value": "1.2.8x prior to 1. 2.8p25"
},
{
"version_value": "1.4.0x prior to 1.4.0p9"
}
]
}
}
]
},
"vendor_name": "Tenable"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A cross site scripting (XSS) vulnerability exists in Check_MK versions 1.2.8x prior to 1.2.8p25 and 1.4.0x prior to 1.4.0p9, allowing an unauthenticated attacker to inject arbitrary HTML or JavaScript via the output_format parameter, and the username parameter of failed HTTP basic authentication attempts, which is returned unencoded in an internal server error page."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Stored and Reflected Cross Site Scripting (XSS)"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.tenable.com/security/research/tra-2017-20",
"refsource": "MISC",
"url": "https://www.tenable.com/security/research/tra-2017-20"
},
{
"name": "http://mathias-kettner.com/check_mk_werks.php?werk_id=7661",
"refsource": "CONFIRM",
"url": "http://mathias-kettner.com/check_mk_werks.php?werk_id=7661"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "5ac1ecc2-367a-4d16-a0b2-35d495ddd0be",
"assignerShortName": "tenable",
"cveId": "CVE-2017-11507",
"datePublished": "2017-12-11T16:00:00Z",
"dateReserved": "2017-07-21T00:00:00",
"dateUpdated": "2024-09-16T22:20:50.230Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2017-9781 (GCVE-0-2017-9781)
Vulnerability from cvelistv5 – Published: 2017-06-21 18:00 – Updated: 2024-08-05 17:18
VLAI?
Summary
A cross site scripting (XSS) vulnerability exists in Check_MK versions 1.4.0x prior to 1.4.0p6, allowing an unauthenticated remote attacker to inject arbitrary HTML or JavaScript via the _username parameter when attempting authentication to webapi.py, which is returned unencoded with content type text/html.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T17:18:01.918Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://git.mathias-kettner.de/git/?p=check_mk.git%3Ba=blob%3Bf=.werks/4757%3Bhb=c248f0b6ff7b15ced9f07a3df8a80fad656ea5b1"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.tenable.com/security/research/tra-2017-21"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2017-06-21T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "A cross site scripting (XSS) vulnerability exists in Check_MK versions 1.4.0x prior to 1.4.0p6, allowing an unauthenticated remote attacker to inject arbitrary HTML or JavaScript via the _username parameter when attempting authentication to webapi.py, which is returned unencoded with content type text/html."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-11-03T09:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://git.mathias-kettner.de/git/?p=check_mk.git%3Ba=blob%3Bf=.werks/4757%3Bhb=c248f0b6ff7b15ced9f07a3df8a80fad656ea5b1"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.tenable.com/security/research/tra-2017-21"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2017-9781",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A cross site scripting (XSS) vulnerability exists in Check_MK versions 1.4.0x prior to 1.4.0p6, allowing an unauthenticated remote attacker to inject arbitrary HTML or JavaScript via the _username parameter when attempting authentication to webapi.py, which is returned unencoded with content type text/html."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://git.mathias-kettner.de/git/?p=check_mk.git;a=blob;f=.werks/4757;hb=c248f0b6ff7b15ced9f07a3df8a80fad656ea5b1",
"refsource": "CONFIRM",
"url": "http://git.mathias-kettner.de/git/?p=check_mk.git;a=blob;f=.werks/4757;hb=c248f0b6ff7b15ced9f07a3df8a80fad656ea5b1"
},
{
"name": "https://www.tenable.com/security/research/tra-2017-21",
"refsource": "MISC",
"url": "https://www.tenable.com/security/research/tra-2017-21"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2017-9781",
"datePublished": "2017-06-21T18:00:00",
"dateReserved": "2017-06-21T00:00:00",
"dateUpdated": "2024-08-05T17:18:01.918Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2014-2330 (GCVE-0-2014-2330)
Vulnerability from cvelistv5 – Published: 2015-08-31 18:00 – Updated: 2024-08-06 10:14
VLAI?
Summary
Multiple cross-site request forgery (CSRF) vulnerabilities in the Multisite GUI in Check_MK before 1.2.5i2 allow remote attackers to hijack the authentication of users for requests that (1) upload arbitrary snapshots, (2) delete arbitrary files, or possibly have other unspecified impact via unknown vectors.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T10:14:25.326Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://mathias-kettner.de/check_mk_werks.php?werk_id=0766"
},
{
"name": "20140324 Deutsche Telekom CERT Advisory [DTC-A-20140324-002] vulnerabilities in check_mk",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/531594"
},
{
"name": "66389",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/66389"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2014-03-24T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Multiple cross-site request forgery (CSRF) vulnerabilities in the Multisite GUI in Check_MK before 1.2.5i2 allow remote attackers to hijack the authentication of users for requests that (1) upload arbitrary snapshots, (2) delete arbitrary files, or possibly have other unspecified impact via unknown vectors."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2015-08-31T17:57:03",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://mathias-kettner.de/check_mk_werks.php?werk_id=0766"
},
{
"name": "20140324 Deutsche Telekom CERT Advisory [DTC-A-20140324-002] vulnerabilities in check_mk",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/531594"
},
{
"name": "66389",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/66389"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2014-2330",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Multiple cross-site request forgery (CSRF) vulnerabilities in the Multisite GUI in Check_MK before 1.2.5i2 allow remote attackers to hijack the authentication of users for requests that (1) upload arbitrary snapshots, (2) delete arbitrary files, or possibly have other unspecified impact via unknown vectors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://mathias-kettner.de/check_mk_werks.php?werk_id=0766",
"refsource": "CONFIRM",
"url": "http://mathias-kettner.de/check_mk_werks.php?werk_id=0766"
},
{
"name": "20140324 Deutsche Telekom CERT Advisory [DTC-A-20140324-002] vulnerabilities in check_mk",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/531594"
},
{
"name": "66389",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/66389"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2014-2330",
"datePublished": "2015-08-31T18:00:00",
"dateReserved": "2014-03-12T00:00:00",
"dateUpdated": "2024-08-06T10:14:25.326Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2014-2332 (GCVE-0-2014-2332)
Vulnerability from cvelistv5 – Published: 2015-08-31 18:00 – Updated: 2024-08-06 10:14
VLAI?
Summary
Check_MK before 1.2.2p3 and 1.2.3x before 1.2.3i5 allows remote authenticated users to delete arbitrary files via a request to an unspecified link, related to "Insecure Direct Object References." NOTE: this can be exploited by remote attackers by leveraging CVE-2014-2330.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T10:14:25.042Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20140328 Deutsche Telekom CERT Advisory [DTC-A-20140324-002] update140328",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/531656"
},
{
"name": "20140324 Deutsche Telekom CERT Advisory [DTC-A-20140324-002] vulnerabilities in check_mk",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/531594"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2014-03-24T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Check_MK before 1.2.2p3 and 1.2.3x before 1.2.3i5 allows remote authenticated users to delete arbitrary files via a request to an unspecified link, related to \"Insecure Direct Object References.\" NOTE: this can be exploited by remote attackers by leveraging CVE-2014-2330."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2015-08-31T17:57:03",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "20140328 Deutsche Telekom CERT Advisory [DTC-A-20140324-002] update140328",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/531656"
},
{
"name": "20140324 Deutsche Telekom CERT Advisory [DTC-A-20140324-002] vulnerabilities in check_mk",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/531594"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2014-2332",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Check_MK before 1.2.2p3 and 1.2.3x before 1.2.3i5 allows remote authenticated users to delete arbitrary files via a request to an unspecified link, related to \"Insecure Direct Object References.\" NOTE: this can be exploited by remote attackers by leveraging CVE-2014-2330."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20140328 Deutsche Telekom CERT Advisory [DTC-A-20140324-002] update140328",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/531656"
},
{
"name": "20140324 Deutsche Telekom CERT Advisory [DTC-A-20140324-002] vulnerabilities in check_mk",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/531594"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2014-2332",
"datePublished": "2015-08-31T18:00:00",
"dateReserved": "2014-03-12T00:00:00",
"dateUpdated": "2024-08-06T10:14:25.042Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2014-2329 (GCVE-0-2014-2329)
Vulnerability from cvelistv5 – Published: 2015-08-31 18:00 – Updated: 2024-08-06 10:14
VLAI?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in Check_MK before 1.2.2p3 and 1.2.3x before 1.2.3i5 allow remote authenticated users to inject arbitrary web script or HTML via the (1) agent string for a check_mk agent, a (2) crafted request to a monitored host, which is not properly handled by the logwatch module, or other unspecified vectors.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T10:14:25.040Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20140328 Deutsche Telekom CERT Advisory [DTC-A-20140324-002] update140328",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/531656"
},
{
"name": "20140324 Deutsche Telekom CERT Advisory [DTC-A-20140324-002] vulnerabilities in check_mk",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/531594"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2014-03-24T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Multiple cross-site scripting (XSS) vulnerabilities in Check_MK before 1.2.2p3 and 1.2.3x before 1.2.3i5 allow remote authenticated users to inject arbitrary web script or HTML via the (1) agent string for a check_mk agent, a (2) crafted request to a monitored host, which is not properly handled by the logwatch module, or other unspecified vectors."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2015-08-31T17:57:03",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "20140328 Deutsche Telekom CERT Advisory [DTC-A-20140324-002] update140328",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/531656"
},
{
"name": "20140324 Deutsche Telekom CERT Advisory [DTC-A-20140324-002] vulnerabilities in check_mk",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/531594"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2014-2329",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Multiple cross-site scripting (XSS) vulnerabilities in Check_MK before 1.2.2p3 and 1.2.3x before 1.2.3i5 allow remote authenticated users to inject arbitrary web script or HTML via the (1) agent string for a check_mk agent, a (2) crafted request to a monitored host, which is not properly handled by the logwatch module, or other unspecified vectors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20140328 Deutsche Telekom CERT Advisory [DTC-A-20140324-002] update140328",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/531656"
},
{
"name": "20140324 Deutsche Telekom CERT Advisory [DTC-A-20140324-002] vulnerabilities in check_mk",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/531594"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2014-2329",
"datePublished": "2015-08-31T18:00:00",
"dateReserved": "2014-03-12T00:00:00",
"dateUpdated": "2024-08-06T10:14:25.040Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2014-2331 (GCVE-0-2014-2331)
Vulnerability from cvelistv5 – Published: 2015-08-31 18:00 – Updated: 2024-08-06 10:14
VLAI?
Summary
Check_MK 1.2.2p2, 1.2.2p3, and 1.2.3i5 allows remote authenticated users to execute arbitrary Python code via a crafted rules.mk file in a snapshot. NOTE: this can be exploited by remote attackers by leveraging CVE-2014-2330.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T10:14:25.075Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20140328 Deutsche Telekom CERT Advisory [DTC-A-20140324-002] update140328",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/531656"
},
{
"name": "20140324 Deutsche Telekom CERT Advisory [DTC-A-20140324-002] vulnerabilities in check_mk",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/531594"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2014-03-24T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Check_MK 1.2.2p2, 1.2.2p3, and 1.2.3i5 allows remote authenticated users to execute arbitrary Python code via a crafted rules.mk file in a snapshot. NOTE: this can be exploited by remote attackers by leveraging CVE-2014-2330."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2015-08-31T17:57:03",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "20140328 Deutsche Telekom CERT Advisory [DTC-A-20140324-002] update140328",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/531656"
},
{
"name": "20140324 Deutsche Telekom CERT Advisory [DTC-A-20140324-002] vulnerabilities in check_mk",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/531594"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2014-2331",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Check_MK 1.2.2p2, 1.2.2p3, and 1.2.3i5 allows remote authenticated users to execute arbitrary Python code via a crafted rules.mk file in a snapshot. NOTE: this can be exploited by remote attackers by leveraging CVE-2014-2330."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20140328 Deutsche Telekom CERT Advisory [DTC-A-20140324-002] update140328",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/531656"
},
{
"name": "20140324 Deutsche Telekom CERT Advisory [DTC-A-20140324-002] vulnerabilities in check_mk",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/531594"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2014-2331",
"datePublished": "2015-08-31T18:00:00",
"dateReserved": "2014-03-12T00:00:00",
"dateUpdated": "2024-08-06T10:14:25.075Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2014-5340 (GCVE-0-2014-5340)
Vulnerability from cvelistv5 – Published: 2014-09-02 14:00 – Updated: 2024-08-06 11:41
VLAI?
Summary
The wato component in Check_MK before 1.2.4p4 and 1.2.5 before 1.2.5i4 uses the pickle Python module unsafely, which allows remote attackers to execute arbitrary code via a crafted serialized object, related to an automation URL.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T11:41:48.661Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20140820 Deutsche Telekom CERT Advisory [DTC-A-20140820-001] check_mk vulnerabilities",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/533180/100/0/threaded"
},
{
"name": "RHSA-2015:1495",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2015-1495.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://packetstormsecurity.com/files/127941/Deutsche-Telekom-CERT-Advisory-DTC-A-20140820-001.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://mathias-kettner.de/check_mk_werks.php?werk_id=984"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2014-08-20T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The wato component in Check_MK before 1.2.4p4 and 1.2.5 before 1.2.5i4 uses the pickle Python module unsafely, which allows remote attackers to execute arbitrary code via a crafted serialized object, related to an automation URL."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-09T18:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "20140820 Deutsche Telekom CERT Advisory [DTC-A-20140820-001] check_mk vulnerabilities",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/533180/100/0/threaded"
},
{
"name": "RHSA-2015:1495",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2015-1495.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://packetstormsecurity.com/files/127941/Deutsche-Telekom-CERT-Advisory-DTC-A-20140820-001.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://mathias-kettner.de/check_mk_werks.php?werk_id=984"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2014-5340",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The wato component in Check_MK before 1.2.4p4 and 1.2.5 before 1.2.5i4 uses the pickle Python module unsafely, which allows remote attackers to execute arbitrary code via a crafted serialized object, related to an automation URL."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20140820 Deutsche Telekom CERT Advisory [DTC-A-20140820-001] check_mk vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/533180/100/0/threaded"
},
{
"name": "RHSA-2015:1495",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-1495.html"
},
{
"name": "http://packetstormsecurity.com/files/127941/Deutsche-Telekom-CERT-Advisory-DTC-A-20140820-001.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/127941/Deutsche-Telekom-CERT-Advisory-DTC-A-20140820-001.html"
},
{
"name": "http://mathias-kettner.de/check_mk_werks.php?werk_id=984",
"refsource": "CONFIRM",
"url": "http://mathias-kettner.de/check_mk_werks.php?werk_id=984"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2014-5340",
"datePublished": "2014-09-02T14:00:00",
"dateReserved": "2014-08-18T00:00:00",
"dateUpdated": "2024-08-06T11:41:48.661Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2014-5339 (GCVE-0-2014-5339)
Vulnerability from cvelistv5 – Published: 2014-09-02 14:00 – Updated: 2024-08-06 11:41
VLAI?
Summary
Check_MK before 1.2.4p4 and 1.2.5 before 1.2.5i4 allows remote authenticated users to write check_mk config files (.mk files) to arbitrary locations via vectors related to row selections.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T11:41:48.576Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20140820 Deutsche Telekom CERT Advisory [DTC-A-20140820-001] check_mk vulnerabilities",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/533180/100/0/threaded"
},
{
"name": "RHSA-2015:1495",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2015-1495.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://packetstormsecurity.com/files/127941/Deutsche-Telekom-CERT-Advisory-DTC-A-20140820-001.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://mathias-kettner.de/check_mk_werks.php?werk_id=983"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2014-08-20T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Check_MK before 1.2.4p4 and 1.2.5 before 1.2.5i4 allows remote authenticated users to write check_mk config files (.mk files) to arbitrary locations via vectors related to row selections."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-09T18:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "20140820 Deutsche Telekom CERT Advisory [DTC-A-20140820-001] check_mk vulnerabilities",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/533180/100/0/threaded"
},
{
"name": "RHSA-2015:1495",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2015-1495.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://packetstormsecurity.com/files/127941/Deutsche-Telekom-CERT-Advisory-DTC-A-20140820-001.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://mathias-kettner.de/check_mk_werks.php?werk_id=983"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2014-5339",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Check_MK before 1.2.4p4 and 1.2.5 before 1.2.5i4 allows remote authenticated users to write check_mk config files (.mk files) to arbitrary locations via vectors related to row selections."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20140820 Deutsche Telekom CERT Advisory [DTC-A-20140820-001] check_mk vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/533180/100/0/threaded"
},
{
"name": "RHSA-2015:1495",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-1495.html"
},
{
"name": "http://packetstormsecurity.com/files/127941/Deutsche-Telekom-CERT-Advisory-DTC-A-20140820-001.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/127941/Deutsche-Telekom-CERT-Advisory-DTC-A-20140820-001.html"
},
{
"name": "http://mathias-kettner.de/check_mk_werks.php?werk_id=983",
"refsource": "CONFIRM",
"url": "http://mathias-kettner.de/check_mk_werks.php?werk_id=983"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2014-5339",
"datePublished": "2014-09-02T14:00:00",
"dateReserved": "2014-08-18T00:00:00",
"dateUpdated": "2024-08-06T11:41:48.576Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2014-5338 (GCVE-0-2014-5338)
Vulnerability from cvelistv5 – Published: 2014-08-22 14:00 – Updated: 2024-08-06 11:41
VLAI?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in the multisite component in Check_MK before 1.2.4p4 and 1.2.5 before 1.2.5i4 allow remote authenticated users to inject arbitrary web script or HTML via unspecified vectors to the (1) render_status_icons function in htmllib.py or (2) ajax_action function in actions.py.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T11:41:48.644Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20140820 Deutsche Telekom CERT Advisory [DTC-A-20140820-001] check_mk vulnerabilities",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/533180/100/0/threaded"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://mathias-kettner.de/check_mk_werks.php?werk_id=0982\u0026HTML=yes"
},
{
"name": "69312",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/69312"
},
{
"name": "RHSA-2015:1495",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2015-1495.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://packetstormsecurity.com/files/127941/Deutsche-Telekom-CERT-Advisory-DTC-A-20140820-001.html"
},
{
"name": "checkmk-cve20145338-xss(95383)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95383"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2014-08-20T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Multiple cross-site scripting (XSS) vulnerabilities in the multisite component in Check_MK before 1.2.4p4 and 1.2.5 before 1.2.5i4 allow remote authenticated users to inject arbitrary web script or HTML via unspecified vectors to the (1) render_status_icons function in htmllib.py or (2) ajax_action function in actions.py."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-09T18:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "20140820 Deutsche Telekom CERT Advisory [DTC-A-20140820-001] check_mk vulnerabilities",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/533180/100/0/threaded"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://mathias-kettner.de/check_mk_werks.php?werk_id=0982\u0026HTML=yes"
},
{
"name": "69312",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/69312"
},
{
"name": "RHSA-2015:1495",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2015-1495.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://packetstormsecurity.com/files/127941/Deutsche-Telekom-CERT-Advisory-DTC-A-20140820-001.html"
},
{
"name": "checkmk-cve20145338-xss(95383)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95383"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2014-5338",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Multiple cross-site scripting (XSS) vulnerabilities in the multisite component in Check_MK before 1.2.4p4 and 1.2.5 before 1.2.5i4 allow remote authenticated users to inject arbitrary web script or HTML via unspecified vectors to the (1) render_status_icons function in htmllib.py or (2) ajax_action function in actions.py."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20140820 Deutsche Telekom CERT Advisory [DTC-A-20140820-001] check_mk vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/533180/100/0/threaded"
},
{
"name": "http://mathias-kettner.de/check_mk_werks.php?werk_id=0982\u0026HTML=yes",
"refsource": "CONFIRM",
"url": "http://mathias-kettner.de/check_mk_werks.php?werk_id=0982\u0026HTML=yes"
},
{
"name": "69312",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/69312"
},
{
"name": "RHSA-2015:1495",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-1495.html"
},
{
"name": "http://packetstormsecurity.com/files/127941/Deutsche-Telekom-CERT-Advisory-DTC-A-20140820-001.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/127941/Deutsche-Telekom-CERT-Advisory-DTC-A-20140820-001.html"
},
{
"name": "checkmk-cve20145338-xss(95383)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95383"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2014-5338",
"datePublished": "2014-08-22T14:00:00",
"dateReserved": "2014-08-18T00:00:00",
"dateUpdated": "2024-08-06T11:41:48.644Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2014-0243 (GCVE-0-2014-0243)
Vulnerability from nvd – Published: 2018-07-19 17:00 – Updated: 2024-08-06 09:05
VLAI?
Summary
Check_MK through 1.2.5i2p1 allows local users to read arbitrary files via a symlink attack to a file in /var/lib/check_mk_agent/job.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T09:05:39.316Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "58536",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "https://secuniaresearch.flexerasoftware.com/advisories/58536"
},
{
"name": "[oss-security] 20140528 LSE Leading Security Experts GmbH - LSE-2014-05-21 - Check_MK - Arbitrary File Disclosure Vulnerability",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2014/05/28/1"
},
{
"name": "67674",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/67674"
},
{
"name": "FEDORA-2014-6810",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134166.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://git.mathias-kettner.de/git/?p=check_mk.git%3Ba=commit%3Bh=0426323df1641596c4f01ef5a716a3b65276f01c"
},
{
"name": "FEDORA-2014-6818",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134160.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1101669"
},
{
"name": "20140528 LSE Leading Security Experts GmbH - LSE-2014-05-21 - Check_MK - Arbitrary File Disclosure Vulnerability",
"tags": [
"mailing-list",
"x_refsource_FULLDISC",
"x_transferred"
],
"url": "http://seclists.org/fulldisclosure/2014/May/145"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://packetstormsecurity.com/files/126857/Check_MK-Arbitrary-File-Disclosure.html"
},
{
"name": "20140528 LSE Leading Security Experts GmbH - LSE-2014-05-21 - Check_MK - Arbitrary File Disclosure Vulnerability",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "https://www.securityfocus.com/archive/1/532224/100/0/threaded"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://git.mathias-kettner.de/git/?p=check_mk.git%3Ba=commit%3Bh=a2ef8d00c53ec9cbd05c4ae2f09b50761130e7ce"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2014-05-27T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Check_MK through 1.2.5i2p1 allows local users to read arbitrary files via a symlink attack to a file in /var/lib/check_mk_agent/job."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-07-19T16:57:02",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"name": "58536",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "https://secuniaresearch.flexerasoftware.com/advisories/58536"
},
{
"name": "[oss-security] 20140528 LSE Leading Security Experts GmbH - LSE-2014-05-21 - Check_MK - Arbitrary File Disclosure Vulnerability",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2014/05/28/1"
},
{
"name": "67674",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/67674"
},
{
"name": "FEDORA-2014-6810",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134166.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://git.mathias-kettner.de/git/?p=check_mk.git%3Ba=commit%3Bh=0426323df1641596c4f01ef5a716a3b65276f01c"
},
{
"name": "FEDORA-2014-6818",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134160.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1101669"
},
{
"name": "20140528 LSE Leading Security Experts GmbH - LSE-2014-05-21 - Check_MK - Arbitrary File Disclosure Vulnerability",
"tags": [
"mailing-list",
"x_refsource_FULLDISC"
],
"url": "http://seclists.org/fulldisclosure/2014/May/145"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://packetstormsecurity.com/files/126857/Check_MK-Arbitrary-File-Disclosure.html"
},
{
"name": "20140528 LSE Leading Security Experts GmbH - LSE-2014-05-21 - Check_MK - Arbitrary File Disclosure Vulnerability",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "https://www.securityfocus.com/archive/1/532224/100/0/threaded"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://git.mathias-kettner.de/git/?p=check_mk.git%3Ba=commit%3Bh=a2ef8d00c53ec9cbd05c4ae2f09b50761130e7ce"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2014-0243",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Check_MK through 1.2.5i2p1 allows local users to read arbitrary files via a symlink attack to a file in /var/lib/check_mk_agent/job."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "58536",
"refsource": "SECUNIA",
"url": "https://secuniaresearch.flexerasoftware.com/advisories/58536"
},
{
"name": "[oss-security] 20140528 LSE Leading Security Experts GmbH - LSE-2014-05-21 - Check_MK - Arbitrary File Disclosure Vulnerability",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2014/05/28/1"
},
{
"name": "67674",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/67674"
},
{
"name": "FEDORA-2014-6810",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134166.html"
},
{
"name": "http://git.mathias-kettner.de/git/?p=check_mk.git;a=commit;h=0426323df1641596c4f01ef5a716a3b65276f01c",
"refsource": "CONFIRM",
"url": "http://git.mathias-kettner.de/git/?p=check_mk.git;a=commit;h=0426323df1641596c4f01ef5a716a3b65276f01c"
},
{
"name": "FEDORA-2014-6818",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134160.html"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1101669",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1101669"
},
{
"name": "20140528 LSE Leading Security Experts GmbH - LSE-2014-05-21 - Check_MK - Arbitrary File Disclosure Vulnerability",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2014/May/145"
},
{
"name": "http://packetstormsecurity.com/files/126857/Check_MK-Arbitrary-File-Disclosure.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/126857/Check_MK-Arbitrary-File-Disclosure.html"
},
{
"name": "20140528 LSE Leading Security Experts GmbH - LSE-2014-05-21 - Check_MK - Arbitrary File Disclosure Vulnerability",
"refsource": "BUGTRAQ",
"url": "https://www.securityfocus.com/archive/1/532224/100/0/threaded"
},
{
"name": "http://git.mathias-kettner.de/git/?p=check_mk.git;a=commit;h=a2ef8d00c53ec9cbd05c4ae2f09b50761130e7ce",
"refsource": "CONFIRM",
"url": "http://git.mathias-kettner.de/git/?p=check_mk.git;a=commit;h=a2ef8d00c53ec9cbd05c4ae2f09b50761130e7ce"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2014-0243",
"datePublished": "2018-07-19T17:00:00",
"dateReserved": "2013-12-03T00:00:00",
"dateUpdated": "2024-08-06T09:05:39.316Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2017-11507 (GCVE-0-2017-11507)
Vulnerability from nvd – Published: 2017-12-11 16:00 – Updated: 2024-09-16 22:20
VLAI?
Summary
A cross site scripting (XSS) vulnerability exists in Check_MK versions 1.2.8x prior to 1.2.8p25 and 1.4.0x prior to 1.4.0p9, allowing an unauthenticated attacker to inject arbitrary HTML or JavaScript via the output_format parameter, and the username parameter of failed HTTP basic authentication attempts, which is returned unencoded in an internal server error page.
Severity ?
No CVSS data available.
CWE
- Stored and Reflected Cross Site Scripting (XSS)
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T18:12:40.193Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.tenable.com/security/research/tra-2017-20"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://mathias-kettner.com/check_mk_werks.php?werk_id=7661"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Check_MK",
"vendor": "Tenable",
"versions": [
{
"status": "affected",
"version": "1.2.8x prior to 1. 2.8p25"
},
{
"status": "affected",
"version": "1.4.0x prior to 1.4.0p9"
}
]
}
],
"datePublic": "2017-07-06T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "A cross site scripting (XSS) vulnerability exists in Check_MK versions 1.2.8x prior to 1.2.8p25 and 1.4.0x prior to 1.4.0p9, allowing an unauthenticated attacker to inject arbitrary HTML or JavaScript via the output_format parameter, and the username parameter of failed HTTP basic authentication attempts, which is returned unencoded in an internal server error page."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Stored and Reflected Cross Site Scripting (XSS)",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-12-11T15:57:01",
"orgId": "5ac1ecc2-367a-4d16-a0b2-35d495ddd0be",
"shortName": "tenable"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.tenable.com/security/research/tra-2017-20"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://mathias-kettner.com/check_mk_werks.php?werk_id=7661"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "vulnreport@tenable.com",
"DATE_PUBLIC": "2017-07-06T00:00:00",
"ID": "CVE-2017-11507",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Check_MK",
"version": {
"version_data": [
{
"version_value": "1.2.8x prior to 1. 2.8p25"
},
{
"version_value": "1.4.0x prior to 1.4.0p9"
}
]
}
}
]
},
"vendor_name": "Tenable"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A cross site scripting (XSS) vulnerability exists in Check_MK versions 1.2.8x prior to 1.2.8p25 and 1.4.0x prior to 1.4.0p9, allowing an unauthenticated attacker to inject arbitrary HTML or JavaScript via the output_format parameter, and the username parameter of failed HTTP basic authentication attempts, which is returned unencoded in an internal server error page."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Stored and Reflected Cross Site Scripting (XSS)"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.tenable.com/security/research/tra-2017-20",
"refsource": "MISC",
"url": "https://www.tenable.com/security/research/tra-2017-20"
},
{
"name": "http://mathias-kettner.com/check_mk_werks.php?werk_id=7661",
"refsource": "CONFIRM",
"url": "http://mathias-kettner.com/check_mk_werks.php?werk_id=7661"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "5ac1ecc2-367a-4d16-a0b2-35d495ddd0be",
"assignerShortName": "tenable",
"cveId": "CVE-2017-11507",
"datePublished": "2017-12-11T16:00:00Z",
"dateReserved": "2017-07-21T00:00:00",
"dateUpdated": "2024-09-16T22:20:50.230Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2017-9781 (GCVE-0-2017-9781)
Vulnerability from nvd – Published: 2017-06-21 18:00 – Updated: 2024-08-05 17:18
VLAI?
Summary
A cross site scripting (XSS) vulnerability exists in Check_MK versions 1.4.0x prior to 1.4.0p6, allowing an unauthenticated remote attacker to inject arbitrary HTML or JavaScript via the _username parameter when attempting authentication to webapi.py, which is returned unencoded with content type text/html.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T17:18:01.918Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://git.mathias-kettner.de/git/?p=check_mk.git%3Ba=blob%3Bf=.werks/4757%3Bhb=c248f0b6ff7b15ced9f07a3df8a80fad656ea5b1"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.tenable.com/security/research/tra-2017-21"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2017-06-21T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "A cross site scripting (XSS) vulnerability exists in Check_MK versions 1.4.0x prior to 1.4.0p6, allowing an unauthenticated remote attacker to inject arbitrary HTML or JavaScript via the _username parameter when attempting authentication to webapi.py, which is returned unencoded with content type text/html."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-11-03T09:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://git.mathias-kettner.de/git/?p=check_mk.git%3Ba=blob%3Bf=.werks/4757%3Bhb=c248f0b6ff7b15ced9f07a3df8a80fad656ea5b1"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.tenable.com/security/research/tra-2017-21"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2017-9781",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A cross site scripting (XSS) vulnerability exists in Check_MK versions 1.4.0x prior to 1.4.0p6, allowing an unauthenticated remote attacker to inject arbitrary HTML or JavaScript via the _username parameter when attempting authentication to webapi.py, which is returned unencoded with content type text/html."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://git.mathias-kettner.de/git/?p=check_mk.git;a=blob;f=.werks/4757;hb=c248f0b6ff7b15ced9f07a3df8a80fad656ea5b1",
"refsource": "CONFIRM",
"url": "http://git.mathias-kettner.de/git/?p=check_mk.git;a=blob;f=.werks/4757;hb=c248f0b6ff7b15ced9f07a3df8a80fad656ea5b1"
},
{
"name": "https://www.tenable.com/security/research/tra-2017-21",
"refsource": "MISC",
"url": "https://www.tenable.com/security/research/tra-2017-21"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2017-9781",
"datePublished": "2017-06-21T18:00:00",
"dateReserved": "2017-06-21T00:00:00",
"dateUpdated": "2024-08-05T17:18:01.918Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2014-2330 (GCVE-0-2014-2330)
Vulnerability from nvd – Published: 2015-08-31 18:00 – Updated: 2024-08-06 10:14
VLAI?
Summary
Multiple cross-site request forgery (CSRF) vulnerabilities in the Multisite GUI in Check_MK before 1.2.5i2 allow remote attackers to hijack the authentication of users for requests that (1) upload arbitrary snapshots, (2) delete arbitrary files, or possibly have other unspecified impact via unknown vectors.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T10:14:25.326Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://mathias-kettner.de/check_mk_werks.php?werk_id=0766"
},
{
"name": "20140324 Deutsche Telekom CERT Advisory [DTC-A-20140324-002] vulnerabilities in check_mk",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/531594"
},
{
"name": "66389",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/66389"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2014-03-24T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Multiple cross-site request forgery (CSRF) vulnerabilities in the Multisite GUI in Check_MK before 1.2.5i2 allow remote attackers to hijack the authentication of users for requests that (1) upload arbitrary snapshots, (2) delete arbitrary files, or possibly have other unspecified impact via unknown vectors."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2015-08-31T17:57:03",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://mathias-kettner.de/check_mk_werks.php?werk_id=0766"
},
{
"name": "20140324 Deutsche Telekom CERT Advisory [DTC-A-20140324-002] vulnerabilities in check_mk",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/531594"
},
{
"name": "66389",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/66389"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2014-2330",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Multiple cross-site request forgery (CSRF) vulnerabilities in the Multisite GUI in Check_MK before 1.2.5i2 allow remote attackers to hijack the authentication of users for requests that (1) upload arbitrary snapshots, (2) delete arbitrary files, or possibly have other unspecified impact via unknown vectors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://mathias-kettner.de/check_mk_werks.php?werk_id=0766",
"refsource": "CONFIRM",
"url": "http://mathias-kettner.de/check_mk_werks.php?werk_id=0766"
},
{
"name": "20140324 Deutsche Telekom CERT Advisory [DTC-A-20140324-002] vulnerabilities in check_mk",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/531594"
},
{
"name": "66389",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/66389"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2014-2330",
"datePublished": "2015-08-31T18:00:00",
"dateReserved": "2014-03-12T00:00:00",
"dateUpdated": "2024-08-06T10:14:25.326Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2014-2332 (GCVE-0-2014-2332)
Vulnerability from nvd – Published: 2015-08-31 18:00 – Updated: 2024-08-06 10:14
VLAI?
Summary
Check_MK before 1.2.2p3 and 1.2.3x before 1.2.3i5 allows remote authenticated users to delete arbitrary files via a request to an unspecified link, related to "Insecure Direct Object References." NOTE: this can be exploited by remote attackers by leveraging CVE-2014-2330.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T10:14:25.042Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20140328 Deutsche Telekom CERT Advisory [DTC-A-20140324-002] update140328",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/531656"
},
{
"name": "20140324 Deutsche Telekom CERT Advisory [DTC-A-20140324-002] vulnerabilities in check_mk",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/531594"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2014-03-24T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Check_MK before 1.2.2p3 and 1.2.3x before 1.2.3i5 allows remote authenticated users to delete arbitrary files via a request to an unspecified link, related to \"Insecure Direct Object References.\" NOTE: this can be exploited by remote attackers by leveraging CVE-2014-2330."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2015-08-31T17:57:03",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "20140328 Deutsche Telekom CERT Advisory [DTC-A-20140324-002] update140328",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/531656"
},
{
"name": "20140324 Deutsche Telekom CERT Advisory [DTC-A-20140324-002] vulnerabilities in check_mk",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/531594"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2014-2332",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Check_MK before 1.2.2p3 and 1.2.3x before 1.2.3i5 allows remote authenticated users to delete arbitrary files via a request to an unspecified link, related to \"Insecure Direct Object References.\" NOTE: this can be exploited by remote attackers by leveraging CVE-2014-2330."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20140328 Deutsche Telekom CERT Advisory [DTC-A-20140324-002] update140328",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/531656"
},
{
"name": "20140324 Deutsche Telekom CERT Advisory [DTC-A-20140324-002] vulnerabilities in check_mk",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/531594"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2014-2332",
"datePublished": "2015-08-31T18:00:00",
"dateReserved": "2014-03-12T00:00:00",
"dateUpdated": "2024-08-06T10:14:25.042Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2014-2329 (GCVE-0-2014-2329)
Vulnerability from nvd – Published: 2015-08-31 18:00 – Updated: 2024-08-06 10:14
VLAI?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in Check_MK before 1.2.2p3 and 1.2.3x before 1.2.3i5 allow remote authenticated users to inject arbitrary web script or HTML via the (1) agent string for a check_mk agent, a (2) crafted request to a monitored host, which is not properly handled by the logwatch module, or other unspecified vectors.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T10:14:25.040Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20140328 Deutsche Telekom CERT Advisory [DTC-A-20140324-002] update140328",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/531656"
},
{
"name": "20140324 Deutsche Telekom CERT Advisory [DTC-A-20140324-002] vulnerabilities in check_mk",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/531594"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2014-03-24T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Multiple cross-site scripting (XSS) vulnerabilities in Check_MK before 1.2.2p3 and 1.2.3x before 1.2.3i5 allow remote authenticated users to inject arbitrary web script or HTML via the (1) agent string for a check_mk agent, a (2) crafted request to a monitored host, which is not properly handled by the logwatch module, or other unspecified vectors."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2015-08-31T17:57:03",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "20140328 Deutsche Telekom CERT Advisory [DTC-A-20140324-002] update140328",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/531656"
},
{
"name": "20140324 Deutsche Telekom CERT Advisory [DTC-A-20140324-002] vulnerabilities in check_mk",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/531594"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2014-2329",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Multiple cross-site scripting (XSS) vulnerabilities in Check_MK before 1.2.2p3 and 1.2.3x before 1.2.3i5 allow remote authenticated users to inject arbitrary web script or HTML via the (1) agent string for a check_mk agent, a (2) crafted request to a monitored host, which is not properly handled by the logwatch module, or other unspecified vectors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20140328 Deutsche Telekom CERT Advisory [DTC-A-20140324-002] update140328",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/531656"
},
{
"name": "20140324 Deutsche Telekom CERT Advisory [DTC-A-20140324-002] vulnerabilities in check_mk",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/531594"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2014-2329",
"datePublished": "2015-08-31T18:00:00",
"dateReserved": "2014-03-12T00:00:00",
"dateUpdated": "2024-08-06T10:14:25.040Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2014-2331 (GCVE-0-2014-2331)
Vulnerability from nvd – Published: 2015-08-31 18:00 – Updated: 2024-08-06 10:14
VLAI?
Summary
Check_MK 1.2.2p2, 1.2.2p3, and 1.2.3i5 allows remote authenticated users to execute arbitrary Python code via a crafted rules.mk file in a snapshot. NOTE: this can be exploited by remote attackers by leveraging CVE-2014-2330.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T10:14:25.075Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20140328 Deutsche Telekom CERT Advisory [DTC-A-20140324-002] update140328",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/531656"
},
{
"name": "20140324 Deutsche Telekom CERT Advisory [DTC-A-20140324-002] vulnerabilities in check_mk",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/531594"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2014-03-24T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Check_MK 1.2.2p2, 1.2.2p3, and 1.2.3i5 allows remote authenticated users to execute arbitrary Python code via a crafted rules.mk file in a snapshot. NOTE: this can be exploited by remote attackers by leveraging CVE-2014-2330."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2015-08-31T17:57:03",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "20140328 Deutsche Telekom CERT Advisory [DTC-A-20140324-002] update140328",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/531656"
},
{
"name": "20140324 Deutsche Telekom CERT Advisory [DTC-A-20140324-002] vulnerabilities in check_mk",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/531594"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2014-2331",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Check_MK 1.2.2p2, 1.2.2p3, and 1.2.3i5 allows remote authenticated users to execute arbitrary Python code via a crafted rules.mk file in a snapshot. NOTE: this can be exploited by remote attackers by leveraging CVE-2014-2330."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20140328 Deutsche Telekom CERT Advisory [DTC-A-20140324-002] update140328",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/531656"
},
{
"name": "20140324 Deutsche Telekom CERT Advisory [DTC-A-20140324-002] vulnerabilities in check_mk",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/531594"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2014-2331",
"datePublished": "2015-08-31T18:00:00",
"dateReserved": "2014-03-12T00:00:00",
"dateUpdated": "2024-08-06T10:14:25.075Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2014-5340 (GCVE-0-2014-5340)
Vulnerability from nvd – Published: 2014-09-02 14:00 – Updated: 2024-08-06 11:41
VLAI?
Summary
The wato component in Check_MK before 1.2.4p4 and 1.2.5 before 1.2.5i4 uses the pickle Python module unsafely, which allows remote attackers to execute arbitrary code via a crafted serialized object, related to an automation URL.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T11:41:48.661Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20140820 Deutsche Telekom CERT Advisory [DTC-A-20140820-001] check_mk vulnerabilities",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/533180/100/0/threaded"
},
{
"name": "RHSA-2015:1495",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2015-1495.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://packetstormsecurity.com/files/127941/Deutsche-Telekom-CERT-Advisory-DTC-A-20140820-001.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://mathias-kettner.de/check_mk_werks.php?werk_id=984"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2014-08-20T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The wato component in Check_MK before 1.2.4p4 and 1.2.5 before 1.2.5i4 uses the pickle Python module unsafely, which allows remote attackers to execute arbitrary code via a crafted serialized object, related to an automation URL."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-09T18:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "20140820 Deutsche Telekom CERT Advisory [DTC-A-20140820-001] check_mk vulnerabilities",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/533180/100/0/threaded"
},
{
"name": "RHSA-2015:1495",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2015-1495.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://packetstormsecurity.com/files/127941/Deutsche-Telekom-CERT-Advisory-DTC-A-20140820-001.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://mathias-kettner.de/check_mk_werks.php?werk_id=984"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2014-5340",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The wato component in Check_MK before 1.2.4p4 and 1.2.5 before 1.2.5i4 uses the pickle Python module unsafely, which allows remote attackers to execute arbitrary code via a crafted serialized object, related to an automation URL."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20140820 Deutsche Telekom CERT Advisory [DTC-A-20140820-001] check_mk vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/533180/100/0/threaded"
},
{
"name": "RHSA-2015:1495",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-1495.html"
},
{
"name": "http://packetstormsecurity.com/files/127941/Deutsche-Telekom-CERT-Advisory-DTC-A-20140820-001.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/127941/Deutsche-Telekom-CERT-Advisory-DTC-A-20140820-001.html"
},
{
"name": "http://mathias-kettner.de/check_mk_werks.php?werk_id=984",
"refsource": "CONFIRM",
"url": "http://mathias-kettner.de/check_mk_werks.php?werk_id=984"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2014-5340",
"datePublished": "2014-09-02T14:00:00",
"dateReserved": "2014-08-18T00:00:00",
"dateUpdated": "2024-08-06T11:41:48.661Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2014-5339 (GCVE-0-2014-5339)
Vulnerability from nvd – Published: 2014-09-02 14:00 – Updated: 2024-08-06 11:41
VLAI?
Summary
Check_MK before 1.2.4p4 and 1.2.5 before 1.2.5i4 allows remote authenticated users to write check_mk config files (.mk files) to arbitrary locations via vectors related to row selections.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T11:41:48.576Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20140820 Deutsche Telekom CERT Advisory [DTC-A-20140820-001] check_mk vulnerabilities",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/533180/100/0/threaded"
},
{
"name": "RHSA-2015:1495",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2015-1495.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://packetstormsecurity.com/files/127941/Deutsche-Telekom-CERT-Advisory-DTC-A-20140820-001.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://mathias-kettner.de/check_mk_werks.php?werk_id=983"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2014-08-20T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Check_MK before 1.2.4p4 and 1.2.5 before 1.2.5i4 allows remote authenticated users to write check_mk config files (.mk files) to arbitrary locations via vectors related to row selections."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-09T18:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "20140820 Deutsche Telekom CERT Advisory [DTC-A-20140820-001] check_mk vulnerabilities",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/533180/100/0/threaded"
},
{
"name": "RHSA-2015:1495",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2015-1495.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://packetstormsecurity.com/files/127941/Deutsche-Telekom-CERT-Advisory-DTC-A-20140820-001.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://mathias-kettner.de/check_mk_werks.php?werk_id=983"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2014-5339",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Check_MK before 1.2.4p4 and 1.2.5 before 1.2.5i4 allows remote authenticated users to write check_mk config files (.mk files) to arbitrary locations via vectors related to row selections."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20140820 Deutsche Telekom CERT Advisory [DTC-A-20140820-001] check_mk vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/533180/100/0/threaded"
},
{
"name": "RHSA-2015:1495",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-1495.html"
},
{
"name": "http://packetstormsecurity.com/files/127941/Deutsche-Telekom-CERT-Advisory-DTC-A-20140820-001.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/127941/Deutsche-Telekom-CERT-Advisory-DTC-A-20140820-001.html"
},
{
"name": "http://mathias-kettner.de/check_mk_werks.php?werk_id=983",
"refsource": "CONFIRM",
"url": "http://mathias-kettner.de/check_mk_werks.php?werk_id=983"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2014-5339",
"datePublished": "2014-09-02T14:00:00",
"dateReserved": "2014-08-18T00:00:00",
"dateUpdated": "2024-08-06T11:41:48.576Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2014-5338 (GCVE-0-2014-5338)
Vulnerability from nvd – Published: 2014-08-22 14:00 – Updated: 2024-08-06 11:41
VLAI?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in the multisite component in Check_MK before 1.2.4p4 and 1.2.5 before 1.2.5i4 allow remote authenticated users to inject arbitrary web script or HTML via unspecified vectors to the (1) render_status_icons function in htmllib.py or (2) ajax_action function in actions.py.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T11:41:48.644Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20140820 Deutsche Telekom CERT Advisory [DTC-A-20140820-001] check_mk vulnerabilities",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/533180/100/0/threaded"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://mathias-kettner.de/check_mk_werks.php?werk_id=0982\u0026HTML=yes"
},
{
"name": "69312",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/69312"
},
{
"name": "RHSA-2015:1495",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2015-1495.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://packetstormsecurity.com/files/127941/Deutsche-Telekom-CERT-Advisory-DTC-A-20140820-001.html"
},
{
"name": "checkmk-cve20145338-xss(95383)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95383"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2014-08-20T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Multiple cross-site scripting (XSS) vulnerabilities in the multisite component in Check_MK before 1.2.4p4 and 1.2.5 before 1.2.5i4 allow remote authenticated users to inject arbitrary web script or HTML via unspecified vectors to the (1) render_status_icons function in htmllib.py or (2) ajax_action function in actions.py."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-09T18:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "20140820 Deutsche Telekom CERT Advisory [DTC-A-20140820-001] check_mk vulnerabilities",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/533180/100/0/threaded"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://mathias-kettner.de/check_mk_werks.php?werk_id=0982\u0026HTML=yes"
},
{
"name": "69312",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/69312"
},
{
"name": "RHSA-2015:1495",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2015-1495.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://packetstormsecurity.com/files/127941/Deutsche-Telekom-CERT-Advisory-DTC-A-20140820-001.html"
},
{
"name": "checkmk-cve20145338-xss(95383)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95383"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2014-5338",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Multiple cross-site scripting (XSS) vulnerabilities in the multisite component in Check_MK before 1.2.4p4 and 1.2.5 before 1.2.5i4 allow remote authenticated users to inject arbitrary web script or HTML via unspecified vectors to the (1) render_status_icons function in htmllib.py or (2) ajax_action function in actions.py."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20140820 Deutsche Telekom CERT Advisory [DTC-A-20140820-001] check_mk vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/533180/100/0/threaded"
},
{
"name": "http://mathias-kettner.de/check_mk_werks.php?werk_id=0982\u0026HTML=yes",
"refsource": "CONFIRM",
"url": "http://mathias-kettner.de/check_mk_werks.php?werk_id=0982\u0026HTML=yes"
},
{
"name": "69312",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/69312"
},
{
"name": "RHSA-2015:1495",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2015-1495.html"
},
{
"name": "http://packetstormsecurity.com/files/127941/Deutsche-Telekom-CERT-Advisory-DTC-A-20140820-001.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/127941/Deutsche-Telekom-CERT-Advisory-DTC-A-20140820-001.html"
},
{
"name": "checkmk-cve20145338-xss(95383)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/95383"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2014-5338",
"datePublished": "2014-08-22T14:00:00",
"dateReserved": "2014-08-18T00:00:00",
"dateUpdated": "2024-08-06T11:41:48.644Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}