
Cloud Vulnerability DB
A community-led vulnerabilities database
Checkmk versions 2.0.0p19 and earlier (fixed in 2.0.0p20) and versions 1.6.0p27 and earlier (fixed in 1.6.0p28) were affected by a Cross-Site Scripting (XSS) vulnerability. The vulnerability was discovered on January 27, 2022, and was assigned CVE-2022-24565. The issue specifically involved the improper escaping of site aliases when displayed as conditions for notifications (Checkmk Werk).
The vulnerability is classified as a Persistent Cross-Site Scripting (XSS) vulnerability (CWE-79). The technical issue stems from the site alias not being properly escaped when shown as a condition for notifications. The vulnerability has been assigned a CVSS v3.1 score of 5.2 (medium) with the vector string CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:H/A:N (Checkmk Werk).
If exploited, this vulnerability could allow attackers to inject arbitrary HTML or JavaScript code to obtain sensitive information, including user information, session cookies, and valid credentials (Ubuntu Notice).
The vulnerability has been fixed in Checkmk versions 2.0.0p20 and 1.6.0p28. To mitigate this vulnerability, administrators should ensure that only trustworthy users have Notification configuration and Site management rights. System administrators can check for potential exploitation by examining etc/checkmk/multisite.d/sites.mk and etc/checkmk/conf.d/wato/notifications.mk files for HTML code, although attackers could potentially delete the code after an attack (Checkmk Werk).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."