From lm at mathias-kettner.de Tue Jun 30 09:32:18 2015
From: lm at mathias-kettner.de (Lars Michelsen)
Date: Tue, 30 Jun 2015 09:32:18 +0200 (CEST)
Subject: Check_MK Werk 2384: Prevent user passwords from being visible in
webserver log on user creation
Message-ID: <20150630073218.E7BA081FF5@mail.mathias-kettner.de>
ID: 2384
Title: Prevent user passwords from being visible in webserver log on user creation
Component: WATO
Level: 1
Class: Security Fix
Version: 1.2.7i3
When a user is created using WATO, the set values of the form fields were logged
directly into the webserver access log, because the form of this page used the
GET request method. Users which have access to the log files would be able to
see the initial passwords. If you use an older version of Check_MK it is a good
idea to set the "Change password at next login or access" to force the user
to change his password on first login.
We changed this form to perform a POST request now to prevent these information
being written to the logs.
From lm at mathias-kettner.de Tue Jun 30 09:50:02 2015
From: lm at mathias-kettner.de (Lars Michelsen)
Date: Tue, 30 Jun 2015 09:50:02 +0200 (CEST)
Subject: Check_MK Werk 2385: Fixed possible reflected XSS on all GUI pages
where users can produce unhandled exceptions
Message-ID: <20150630075002.691E58060F@mail.mathias-kettner.de>
ID: 2385
Title: Fixed possible reflected XSS on all GUI pages where users can produce unhandled exceptions
Component: Multisite
Level: 1
Class: Security Fix
Version: 1.2.7i3
On pages where an authenticated user can trigger an exception which is then displayed
to the user as "Internal error" dialog with details about the exception, it was possible
for the user to inject javascript code which was executed in the context of the authenticated
user.
This has been fixed that javascript/html code which is injected is being escaped correctly.
From lm at mathias-kettner.de Tue Jun 30 10:02:44 2015
From: lm at mathias-kettner.de (Lars Michelsen)
Date: Tue, 30 Jun 2015 10:02:44 +0200 (CEST)
Subject: Check_MK Werk 2386: Fixed possible XSS on WATO rule edit page
Message-ID: <20150630080244.104928146A@mail.mathias-kettner.de>
ID: 2386
Title: Fixed possible XSS on WATO rule edit page
Component: WATO
Level: 1
Class: Security Fix
Version: 1.2.7i3
A possible XSS injection has been fixed on the rule edit page of WATO. It was possible
to inject javascript code using the HTTP parameters the page is processing.
From lm at mathias-kettner.de Tue Jun 30 10:20:31 2015
From: lm at mathias-kettner.de (Lars Michelsen)
Date: Tue, 30 Jun 2015 10:20:31 +0200 (CEST)
Subject: Check_MK Werk 2387: Fixed XSS problem on all pages using confirm
dialogs outputting user provided parameters
Message-ID: <20150630082031.BD90E806EF@mail.mathias-kettner.de>
ID: 2387
Title: Fixed XSS problem on all pages using confirm dialogs outputting user provided parameters
Component: Multisite
Level: 1
Class: Security Fix
Version: 1.2.7i3
On some pages, like for example the host group management page of WATO, it was possible
to inject user provided HTML/Javascript code into the confirm messages. An attacker could
use this to let an authenticated user open a prepared URL for privilege escalation.
From lm at mathias-kettner.de Tue Jun 30 10:33:18 2015
From: lm at mathias-kettner.de (Lars Michelsen)
Date: Tue, 30 Jun 2015 10:33:18 +0200 (CEST)
Subject: Check_MK Werk 2388: Fixed reflected XSS on the index page using the
start_url parameter
Message-ID: <20150630083318.4C9E582370@mail.mathias-kettner.de>
ID: 2388
Title: Fixed reflected XSS on the index page using the start_url parameter
Component: Multisite
Level: 1
Class: Security Fix
Version: 1.2.7i3
From lm at mathias-kettner.de Tue Jun 30 10:43:01 2015
From: lm at mathias-kettner.de (Lars Michelsen)
Date: Tue, 30 Jun 2015 10:43:01 +0200 (CEST)
Subject: Check_MK Werk 2389: Fixed XSS using the _body_class parameter of views
Message-ID: <20150630084301.90E238019D@mail.mathias-kettner.de>
ID: 2389
Title: Fixed XSS using the _body_class parameter of views
Component: Multisite
Level: 1
Class: Security Fix
Version: 1.2.7i3
It was possible to use the _body_class parameter of the status GUI views
to inject HTML/Javascript code into the pages.
The _body_class parameter, which was only used for internal purposes, has
totally been removed now.
From lm at mathias-kettner.de Tue Jun 30 10:49:17 2015
From: lm at mathias-kettner.de (Lars Michelsen)
Date: Tue, 30 Jun 2015 10:49:17 +0200 (CEST)
Subject: Check_MK Werk 2390: Fixed possible XSS issue on views
Message-ID: <20150630084917.5CBDA8063B@mail.mathias-kettner.de>
ID: 2390
Title: Fixed possible XSS issue on views
Component: Multisite
Level: 1
Class: Security Fix
Version: 1.2.7i3
It was possible to use the view_name variable to inject HTML/Javascript
code into the status GUI views.
From lm at mathias-kettner.de Tue Jun 30 13:19:17 2015
From: lm at mathias-kettner.de (Lars Michelsen)
Date: Tue, 30 Jun 2015 13:19:17 +0200 (CEST)
Subject: Check_MK Werk 2391: Auth cookie is using "secure" flag when HTTPS
request detected
Message-ID: <20150630111917.AF87780622@mail.mathias-kettner.de>
ID: 2391
Title: Auth cookie is using "secure" flag when HTTPS request detected
Component: Multisite
Level: 1
Class: Security Fix
Version: 1.2.7i3
In previous versions the authentication cookie, which identifies an
authenticated user with the GUI, was never using the "secure" flag.
This means the cookie was sent to the webserver when doing HTTP and
HTTPS requests. In such a situation a user which authenticated using
HTTPS could access the GUI using HTTP and was still authenticated
becaus the browser sends the HTTPS related cookie via HTTP. This is
some kind of security risk since the information which should only
be transported using the encrypted HTTPS requests could be transported
in clear text over the network using HTTP.
The GUI tries now to detect the HTTPS requests. In case a HTTPS
request is detected, the cookies are set with the "secure" flag
which makes the cookies only used via HTTPS.
The HTTPS detection currently checks wether or not the HTTP request
header X-Forwarded-Proto is set to https.
From lm at mathias-kettner.de Tue Jun 30 13:46:52 2015
From: lm at mathias-kettner.de (Lars Michelsen)
Date: Tue, 30 Jun 2015 13:46:52 +0200 (CEST)
Subject: Check_MK Werk 2392: Auth cookie is always using "httponly" flag
Message-ID: <20150630114652.626AC81A22@mail.mathias-kettner.de>
ID: 2392
Title: Auth cookie is always using "httponly" flag
Component: Multisite
Level: 1
Class: Security Fix
Version: 1.2.7i3
All newly issued authentication cookies have the flag "httponly"
set now. This makes the cookie values inaccessible from scripts
executed in the browser, e.g. from Javascript. This secures the
cookie against some sorts of cookie stealing attempts.
See https://www.owasp.org/index.php/HttpOnly for details.