From lm at mathias-kettner.de Fri Sep 18 10:08:50 2015 From: lm at mathias-kettner.de (Lars Michelsen) Date: Fri, 18 Sep 2015 10:08:50 +0200 (CEST) Subject: Check_MK Werk 2612: Fixed possible XSS on service detail page using the long service output Message-ID: <20150918080850.E4E3C83EC5@mail.mathias-kettner.de> ID: 2612 Title: Fixed possible XSS on service detail page using the long service output Component: Multisite Level: 2 Class: Security Fix Version: 1.2.7i3 Normaly all check results displayed in the GUI are HTML escaped by default. The escaping was missing for the long service output of the service detail page. So one could create multi line check results containing HTML/Javascript code which would be executed when a user opens the service detail page of the service with the check result containing the injected code. The issue has been fixed by escaping the long output exactly like the normal plugin output. One difference is left: newline characters are replaced by HTML newlines to make displaying of multiple lines still possible. If you want the old behaviour back, you can disable the plugin output escaping using the global settings. But please note that an attacker might be able to inject javascript code. From lm at mathias-kettner.de Fri Sep 18 10:44:46 2015 From: lm at mathias-kettner.de (Lars Michelsen) Date: Fri, 18 Sep 2015 10:44:46 +0200 (CEST) Subject: Check_MK Werk 2613: Additional fix for refleced XSS on index page using start_url Message-ID: <20150918084446.67B34807FB@mail.mathias-kettner.de> ID: 2613 Title: Additional fix for refleced XSS on index page using start_url Component: Multisite Level: 1 Class: Security Fix Version: 1.2.7i3 The issue has already been addressed in werk #2388, but was not really fixing the problem for all cases.