Lucene search

K
cveTenableCVE-2017-11507
HistoryDec 11, 2017 - 4:29 p.m.

CVE-2017-11507

2017-12-1116:29:00
CWE-79
tenable
web.nvd.nist.gov
37
cve-2017-11507
cross site scripting
xss
check_mk
security vulnerability
nvd

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

CVSS3

6.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

EPSS

0.001

Percentile

41.4%

A cross site scripting (XSS) vulnerability exists in Check_MK versions 1.2.8x prior to 1.2.8p25 and 1.4.0x prior to 1.4.0p9, allowing an unauthenticated attacker to inject arbitrary HTML or JavaScript via the output_format parameter, and the username parameter of failed HTTP basic authentication attempts, which is returned unencoded in an internal server error page.

Affected configurations

Nvd
Node
check_mk_projectcheck_mkMatch1.2.8
OR
check_mk_projectcheck_mkMatch1.2.8b1
OR
check_mk_projectcheck_mkMatch1.2.8b10
OR
check_mk_projectcheck_mkMatch1.2.8b11
OR
check_mk_projectcheck_mkMatch1.2.8b2
OR
check_mk_projectcheck_mkMatch1.2.8b3
OR
check_mk_projectcheck_mkMatch1.2.8b4
OR
check_mk_projectcheck_mkMatch1.2.8b5
OR
check_mk_projectcheck_mkMatch1.2.8b6
OR
check_mk_projectcheck_mkMatch1.2.8b7
OR
check_mk_projectcheck_mkMatch1.2.8b8
OR
check_mk_projectcheck_mkMatch1.2.8b9
OR
check_mk_projectcheck_mkMatch1.2.8p1
OR
check_mk_projectcheck_mkMatch1.2.8p10
OR
check_mk_projectcheck_mkMatch1.2.8p11
OR
check_mk_projectcheck_mkMatch1.2.8p12
OR
check_mk_projectcheck_mkMatch1.2.8p13
OR
check_mk_projectcheck_mkMatch1.2.8p14
OR
check_mk_projectcheck_mkMatch1.2.8p15
OR
check_mk_projectcheck_mkMatch1.2.8p16
OR
check_mk_projectcheck_mkMatch1.2.8p17
OR
check_mk_projectcheck_mkMatch1.2.8p18
OR
check_mk_projectcheck_mkMatch1.2.8p19
OR
check_mk_projectcheck_mkMatch1.2.8p2
OR
check_mk_projectcheck_mkMatch1.2.8p20
OR
check_mk_projectcheck_mkMatch1.2.8p21
OR
check_mk_projectcheck_mkMatch1.2.8p22
OR
check_mk_projectcheck_mkMatch1.2.8p23
OR
check_mk_projectcheck_mkMatch1.2.8p24
OR
check_mk_projectcheck_mkMatch1.2.8p25
OR
check_mk_projectcheck_mkMatch1.2.8p3
OR
check_mk_projectcheck_mkMatch1.2.8p4
OR
check_mk_projectcheck_mkMatch1.2.8p5
OR
check_mk_projectcheck_mkMatch1.2.8p6
OR
check_mk_projectcheck_mkMatch1.2.8p7
OR
check_mk_projectcheck_mkMatch1.2.8p8
OR
check_mk_projectcheck_mkMatch1.2.8p9
OR
check_mk_projectcheck_mkMatch1.4.0
OR
check_mk_projectcheck_mkMatch1.4.0b1
OR
check_mk_projectcheck_mkMatch1.4.0b2
OR
check_mk_projectcheck_mkMatch1.4.0b3
OR
check_mk_projectcheck_mkMatch1.4.0b4
OR
check_mk_projectcheck_mkMatch1.4.0b5
OR
check_mk_projectcheck_mkMatch1.4.0b6
OR
check_mk_projectcheck_mkMatch1.4.0b7
OR
check_mk_projectcheck_mkMatch1.4.0b8
OR
check_mk_projectcheck_mkMatch1.4.0b9
OR
check_mk_projectcheck_mkMatch1.4.0p1
OR
check_mk_projectcheck_mkMatch1.4.0p2
OR
check_mk_projectcheck_mkMatch1.4.0p3
OR
check_mk_projectcheck_mkMatch1.4.0p4
OR
check_mk_projectcheck_mkMatch1.4.0p5
OR
check_mk_projectcheck_mkMatch1.4.0p6
OR
check_mk_projectcheck_mkMatch1.4.0p7
OR
check_mk_projectcheck_mkMatch1.4.0p8
OR
check_mk_projectcheck_mkMatch1.4.0p9
VendorProductVersionCPE
check_mk_projectcheck_mk1.2.8cpe:2.3:a:check_mk_project:check_mk:1.2.8:*:*:*:*:*:*:*
check_mk_projectcheck_mk1.2.8cpe:2.3:a:check_mk_project:check_mk:1.2.8:b1:*:*:*:*:*:*
check_mk_projectcheck_mk1.2.8cpe:2.3:a:check_mk_project:check_mk:1.2.8:b10:*:*:*:*:*:*
check_mk_projectcheck_mk1.2.8cpe:2.3:a:check_mk_project:check_mk:1.2.8:b11:*:*:*:*:*:*
check_mk_projectcheck_mk1.2.8cpe:2.3:a:check_mk_project:check_mk:1.2.8:b2:*:*:*:*:*:*
check_mk_projectcheck_mk1.2.8cpe:2.3:a:check_mk_project:check_mk:1.2.8:b3:*:*:*:*:*:*
check_mk_projectcheck_mk1.2.8cpe:2.3:a:check_mk_project:check_mk:1.2.8:b4:*:*:*:*:*:*
check_mk_projectcheck_mk1.2.8cpe:2.3:a:check_mk_project:check_mk:1.2.8:b5:*:*:*:*:*:*
check_mk_projectcheck_mk1.2.8cpe:2.3:a:check_mk_project:check_mk:1.2.8:b6:*:*:*:*:*:*
check_mk_projectcheck_mk1.2.8cpe:2.3:a:check_mk_project:check_mk:1.2.8:b7:*:*:*:*:*:*
Rows per page:
1-10 of 561

CNA Affected

[
  {
    "product": "Check_MK",
    "vendor": "Tenable",
    "versions": [
      {
        "status": "affected",
        "version": "1.2.8x prior to 1. 2.8p25"
      },
      {
        "status": "affected",
        "version": "1.4.0x prior to 1.4.0p9"
      }
    ]
  }
]

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

CVSS3

6.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

EPSS

0.001

Percentile

41.4%