Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-40906 PoC — CheckMK Raw Edition 跨站脚本漏洞

Source
Associated Vulnerability
Title:CheckMK Raw Edition 跨站脚本漏洞 (CVE-2021-40906)
Description:tribe29 CheckMK Raw Edition是德国tribe29公司的一个全面灵活的 IT 监控系统。 CheckMK Raw Edition 存在安全漏洞,该漏洞允许攻击者在设备上打开带有 HTML 内容并由浏览器解释(例如 JavaScript 或其他客户端脚本)的后门,或者窃取之前通过网络中的人进行身份验证的用户的会话 cookie。
Readme
# CVE-2021-40906 - Reflected XSS in an unauthenticated zone

**Application:** CheckMK Management Web Console

**Software Revision:** From 1.5.0 to 1.5.0p25

**Author:** Edgar Augusto Loyola Torres.

**Attack type:** Reflected XSS

**Solution:** Update to Software Revision 1.6.0p26 or later

**Summary:** CheckMK Raw Edition software (versions 1.5.0 to 1.6.0) does not sanitise the input of a web service parameter that is in an unauthenticated zone. This Reflected XSS allows an attacker to open a backdoor on the device with HTML content and interpreted by the browser (such as JavaScript or other client-side scripts) or to steal the session cookies of a user who has previously authenticated via a man in the middle. Successful exploitation requires access to the web service resource without authentication.

**Technical Description:** See CVE-2021-40906

**Timeline:**
   * 2021-09-01 Issues discovered.
   * 2021-09-06 First contact with vendor via e-mail.
   * 2021-09-08 Vendor response. XSS vulnerabilities were already detected, and would be patched in the next release.
   * 2021-09-30 New Software Version release(1.6.0p27) and Vulnerability patch confirmed.
  

**Reference:**
   * https://checkmk.com/werk/13192
   * https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-40906
   * https://nvd.nist.gov/vuln/detail/CVE-2021-40906

# DEMO
  **PoC CheckMk version 1.5.0p25 Raw Edition**
  
![Reflected XSS](https://raw.githubusercontent.com/Edgarloyola/CheckMK_Reflected_XSS/main/XSS_no_auth.png?token=AKM5DALLSIBJD5HXANVKUULBMVMTG)
File Snapshot

[4.0K] /data/pocs/87ad8e586518b2f513d4f9d0a2c09bbcbba9eb38 ├── [1.5K] README.md ├── [473K] XSS-noAuth.pdf └── [ 67K] XSS_no_auth.png 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.