CVE-2017-11507

CVSS V2 Medium 4.3 CVSS V3 Medium 6.1
Description
A cross site scripting (XSS) vulnerability exists in Check_MK versions 1.2.8x prior to 1.2.8p25 and 1.4.0x prior to 1.4.0p9, allowing an unauthenticated attacker to inject arbitrary HTML or JavaScript via the output_format parameter, and the username parameter of failed HTTP basic authentication attempts, which is returned unencoded in an internal server error page.
Overview
  • CVE ID
  • CVE-2017-11507
  • Assigner
  • vulnreport@tenable.com
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2017-12-11T16:29:00
  • Last Modified Date
  • 2017-12-26T18:10:10
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:a:check_mk_project:check_mk:1.2.8:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:check_mk_project:check_mk:1.2.8:b1:*:*:*:*:*:* 1 OR
cpe:2.3:a:check_mk_project:check_mk:1.2.8:b10:*:*:*:*:*:* 1 OR
cpe:2.3:a:check_mk_project:check_mk:1.2.8:b11:*:*:*:*:*:* 1 OR
cpe:2.3:a:check_mk_project:check_mk:1.2.8:b2:*:*:*:*:*:* 1 OR
cpe:2.3:a:check_mk_project:check_mk:1.2.8:b3:*:*:*:*:*:* 1 OR
cpe:2.3:a:check_mk_project:check_mk:1.2.8:b4:*:*:*:*:*:* 1 OR
cpe:2.3:a:check_mk_project:check_mk:1.2.8:b5:*:*:*:*:*:* 1 OR
cpe:2.3:a:check_mk_project:check_mk:1.2.8:b6:*:*:*:*:*:* 1 OR
cpe:2.3:a:check_mk_project:check_mk:1.2.8:b7:*:*:*:*:*:* 1 OR
cpe:2.3:a:check_mk_project:check_mk:1.2.8:b8:*:*:*:*:*:* 1 OR
cpe:2.3:a:check_mk_project:check_mk:1.2.8:b9:*:*:*:*:*:* 1 OR
cpe:2.3:a:check_mk_project:check_mk:1.2.8:p1:*:*:*:*:*:* 1 OR
cpe:2.3:a:check_mk_project:check_mk:1.2.8:p10:*:*:*:*:*:* 1 OR
cpe:2.3:a:check_mk_project:check_mk:1.2.8:p11:*:*:*:*:*:* 1 OR
cpe:2.3:a:check_mk_project:check_mk:1.2.8:p12:*:*:*:*:*:* 1 OR
cpe:2.3:a:check_mk_project:check_mk:1.2.8:p13:*:*:*:*:*:* 1 OR
cpe:2.3:a:check_mk_project:check_mk:1.2.8:p14:*:*:*:*:*:* 1 OR
cpe:2.3:a:check_mk_project:check_mk:1.2.8:p15:*:*:*:*:*:* 1 OR
cpe:2.3:a:check_mk_project:check_mk:1.2.8:p16:*:*:*:*:*:* 1 OR
cpe:2.3:a:check_mk_project:check_mk:1.2.8:p17:*:*:*:*:*:* 1 OR
cpe:2.3:a:check_mk_project:check_mk:1.2.8:p18:*:*:*:*:*:* 1 OR
cpe:2.3:a:check_mk_project:check_mk:1.2.8:p19:*:*:*:*:*:* 1 OR
cpe:2.3:a:check_mk_project:check_mk:1.2.8:p2:*:*:*:*:*:* 1 OR
cpe:2.3:a:check_mk_project:check_mk:1.2.8:p20:*:*:*:*:*:* 1 OR
cpe:2.3:a:check_mk_project:check_mk:1.2.8:p21:*:*:*:*:*:* 1 OR
cpe:2.3:a:check_mk_project:check_mk:1.2.8:p22:*:*:*:*:*:* 1 OR
cpe:2.3:a:check_mk_project:check_mk:1.2.8:p23:*:*:*:*:*:* 1 OR
cpe:2.3:a:check_mk_project:check_mk:1.2.8:p24:*:*:*:*:*:* 1 OR
cpe:2.3:a:check_mk_project:check_mk:1.2.8:p25:*:*:*:*:*:* 1 OR
cpe:2.3:a:check_mk_project:check_mk:1.2.8:p3:*:*:*:*:*:* 1 OR
cpe:2.3:a:check_mk_project:check_mk:1.2.8:p4:*:*:*:*:*:* 1 OR
cpe:2.3:a:check_mk_project:check_mk:1.2.8:p5:*:*:*:*:*:* 1 OR
cpe:2.3:a:check_mk_project:check_mk:1.2.8:p6:*:*:*:*:*:* 1 OR
cpe:2.3:a:check_mk_project:check_mk:1.2.8:p7:*:*:*:*:*:* 1 OR
cpe:2.3:a:check_mk_project:check_mk:1.2.8:p8:*:*:*:*:*:* 1 OR
cpe:2.3:a:check_mk_project:check_mk:1.2.8:p9:*:*:*:*:*:* 1 OR
cpe:2.3:a:check_mk_project:check_mk:1.4.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:check_mk_project:check_mk:1.4.0:b1:*:*:*:*:*:* 1 OR
cpe:2.3:a:check_mk_project:check_mk:1.4.0:b2:*:*:*:*:*:* 1 OR
cpe:2.3:a:check_mk_project:check_mk:1.4.0:b3:*:*:*:*:*:* 1 OR
cpe:2.3:a:check_mk_project:check_mk:1.4.0:b4:*:*:*:*:*:* 1 OR
cpe:2.3:a:check_mk_project:check_mk:1.4.0:b5:*:*:*:*:*:* 1 OR
cpe:2.3:a:check_mk_project:check_mk:1.4.0:b6:*:*:*:*:*:* 1 OR
cpe:2.3:a:check_mk_project:check_mk:1.4.0:b7:*:*:*:*:*:* 1 OR
cpe:2.3:a:check_mk_project:check_mk:1.4.0:b8:*:*:*:*:*:* 1 OR
cpe:2.3:a:check_mk_project:check_mk:1.4.0:b9:*:*:*:*:*:* 1 OR
cpe:2.3:a:check_mk_project:check_mk:1.4.0:p1:*:*:*:*:*:* 1 OR
cpe:2.3:a:check_mk_project:check_mk:1.4.0:p2:*:*:*:*:*:* 1 OR
cpe:2.3:a:check_mk_project:check_mk:1.4.0:p3:*:*:*:*:*:* 1 OR
cpe:2.3:a:check_mk_project:check_mk:1.4.0:p4:*:*:*:*:*:* 1 OR
cpe:2.3:a:check_mk_project:check_mk:1.4.0:p5:*:*:*:*:*:* 1 OR
cpe:2.3:a:check_mk_project:check_mk:1.4.0:p6:*:*:*:*:*:* 1 OR
cpe:2.3:a:check_mk_project:check_mk:1.4.0:p7:*:*:*:*:*:* 1 OR
cpe:2.3:a:check_mk_project:check_mk:1.4.0:p8:*:*:*:*:*:* 1 OR
cpe:2.3:a:check_mk_project:check_mk:1.4.0:p9:*:*:*:*:*:* 1 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:M/Au:N/C:N/I:P/A:N
  • Access Vector
  • NETWORK
  • Access Compatibility
  • MEDIUM
  • Authentication
  • NONE
  • Confidentiality Impact
  • NONE
  • Integrity Impact
  • PARTIAL
  • Availability Impact
  • NONE
  • Base Score
  • 4.3
  • Severity
  • MEDIUM
  • Exploitability Score
  • 8.6
  • Impact Score
  • 2.9
CVSS Version 3
  • Version
  • 3.0
  • Vector String
  • CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
  • Attack Vector
  • NETWORK
  • Attack Compatibility
  • LOW
  • Privileges Required
  • NONE
  • User Interaction
  • REQUIRED
  • Scope
  • CHANGED
  • Confidentiality Impact
  • LOW
  • Availability Impact
  • NONE
  • Base Score
  • 6.1
  • Base Severity
  • MEDIUM
  • Exploitability Score
  • 2.8
  • Impact Score
  • 2.7
References
Reference URL Reference Tags
https://www.tenable.com/security/research/tra-2017-20 Exploit Third Party Advisory
http://mathias-kettner.com/check_mk_werks.php?werk_id=7661 Vendor Advisory
History
Created Old Value New Value Data Type Notes
2022-05-10 18:54:28 Added to TrackCVE
2022-12-02 23:53:09 2017-12-11T16:29Z 2017-12-11T16:29:00 CVE Published Date updated
2022-12-02 23:53:09 2017-12-26T18:10:10 CVE Modified Date updated
2022-12-02 23:53:09 Analyzed Vulnerability Status updated